Prepared by:
HALBORN
Last Updated 04/26/2024
Date of Engagement by: June 1st, 2022 - August 31st, 2022
0% of all REPORTED Findings have been addressed
All findings
15
Critical
0
High
0
Medium
0
Low
0
Informational
15
Taraxa
engaged Halborn to conduct a security assessment on taraxa-node
and Taraxa-EVM
codebase from June 1st, 2022 to August 31st.
The team at Halborn was provided a timeline for the engagement and assigned two full-time security engineers to audit the security of the assets in scope. The engineers are blockchain and smart contract security experts with advanced penetration testing, smart contract hacking, and in-depth knowledge of multiple blockchain protocols.
The purpose of this audit is to achieve the following:
Identify potential security issues within taraxa-node
and Taraxa-EVM
.
In summary, Halborn identified multiple security risks that were mostly addressed by the Taraxa team
.
The assessment was scoped for the following projects details:
Taraxa-node (commit ID: d091acbb20853c629a8b04ea11dcf32241e1c897)
Taraxa-EVM (commit ID: a23dbf14f9cf8513f1bde13757e2d9b27cf2db8c)
The main particular components and libraries under review were: - RPC - P2P - Cryptography Signatures - Keys Management - Accounts and transactions - Consensus - Storage
EXPLOITABILIY METRIC () | METRIC VALUE | NUMERICAL VALUE |
---|---|---|
Attack Origin (AO) | Arbitrary (AO:A) Specific (AO:S) | 1 0.2 |
Attack Cost (AC) | Low (AC:L) Medium (AC:M) High (AC:H) | 1 0.67 0.33 |
Attack Complexity (AX) | Low (AX:L) Medium (AX:M) High (AX:H) | 1 0.67 0.33 |
IMPACT METRIC () | METRIC VALUE | NUMERICAL VALUE |
---|---|---|
Confidentiality (C) | None (I:N) Low (I:L) Medium (I:M) High (I:H) Critical (I:C) | 0 0.25 0.5 0.75 1 |
Integrity (I) | None (I:N) Low (I:L) Medium (I:M) High (I:H) Critical (I:C) | 0 0.25 0.5 0.75 1 |
Availability (A) | None (A:N) Low (A:L) Medium (A:M) High (A:H) Critical (A:C) | 0 0.25 0.5 0.75 1 |
Deposit (D) | None (D:N) Low (D:L) Medium (D:M) High (D:H) Critical (D:C) | 0 0.25 0.5 0.75 1 |
Yield (Y) | None (Y:N) Low (Y:L) Medium (Y:M) High (Y:H) Critical (Y:C) | 0 0.25 0.5 0.75 1 |
SEVERITY COEFFICIENT () | COEFFICIENT VALUE | NUMERICAL VALUE |
---|---|---|
Reversibility () | None (R:N) Partial (R:P) Full (R:F) | 1 0.5 0.25 |
Scope () | Changed (S:C) Unchanged (S:U) | 1.25 1 |
Severity | Score Value Range |
---|---|
Critical | 9 - 10 |
High | 7 - 8.9 |
Medium | 4.5 - 6.9 |
Low | 2 - 4.4 |
Informational | 0 - 1.9 |
Critical
0
High
0
Medium
0
Low
0
Informational
15
Security analysis | Risk level | Remediation Date |
---|---|---|
VOTES - DENIAL OF SERVICE | Informational | - |
RPC - NO AUTHENTICATION REQUIRED | Informational | - |
BLOCK QUEUE WARNING WILL BLOCK INSTEAD OF WARNING | Informational | - |
UNFILTERED PARAMETER ALLOWED TO EXECUTE COMMANDS ON THE HOST | Informational | - |
LACK OF RETURN ERROR | Informational | - |
LACK OF SIZE CHECK - OUT-OF-BOUNDS | Informational | - |
INCORRECT `NIL` VALUE RETURNED ON AN ERROR | Informational | - |
MULTIPLE OUTDATED MODULES | Informational | - |
ERROR VALUE EVALUATED BUT NOT APPLIED | Informational | - |
NO `ERR` VARIABLE EVALUATION PRIOR TO AN OPERATION | Informational | - |
IMPLICIT MEMORY ALIASING IN LOOP | Informational | - |
LACK OF DEFAULT CLAUSE ON SWITCH STATEMENT | Informational | - |
INSECURE RANDOM NUMBER GENERATOR | Informational | - |
COMPARE INSTEAD OF EQUAL | Informational | - |
MULTIPLE TO-DO COMMENTS FOUND ON THE CODE | Informational | - |
// Informational
// Informational
// Informational
// Informational
// Informational
// Informational
// Informational
// Informational
// Informational
// Informational
// Informational
// Informational
// Informational
// Informational
// Informational
Halborn strongly recommends conducting a follow-up assessment of the project either within six months or immediately following any material changes to the codebase, whichever comes first. This approach is crucial for maintaining the project’s integrity and addressing potential vulnerabilities introduced by code modifications.
// Download the full report
* Use Google Chrome for best results
** Check "Background Graphics" in the print settings if needed