Skip to content

Commit 927c5de

Browse files
committed
Detail front running and realize we cannot mitigate this
1 parent b954617 commit 927c5de

File tree

1 file changed

+25
-21
lines changed

1 file changed

+25
-21
lines changed

docs/threat-model.md

Lines changed: 25 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -310,27 +310,29 @@ Notable threats to the system that could impact assets.
310310

311311
**Assets Affected**: High Throughput, Operational Sustainability
312312

313-
#### T9: Transaction Front-Running
314-
**Description**: EB producers observe profitable transactions and reorder or insert their own transactions to extract value before the original transaction executes.
313+
#### T9: Front-Running
314+
**Description**: Block producers observe profitable transactions and reorder or insert their own transactions to extract value before the original transaction executes.
315315

316316
**Prerequisites**:
317-
- EB creation eligibility
317+
- Block production eligibility (RB + EB creation)
318318
- MEV (Maximal Extractable Value) opportunities in transaction sets
319319
- Knowledge of transaction dependencies and profitable patterns
320320

321321
**Attack Vector**:
322322
1. Monitor mempool for profitable transaction patterns
323-
2. Create competing or parasitic transactions
324-
3. Include both in EB with favorable ordering for attacker
323+
2. Create front-running transactions
324+
3. Replace target transactions with front-running transactions in EB
325325
4. Extract value through arbitrage, sandwich attacks, or liquidations
326326

327-
**Cost**: LOW - Opportunity cost only, plus normal EB creation requirements
327+
**Cost**: LOW - Opportunity cost only, since already producing the block
328+
329+
**Likelihood**: MEDIUM-HIGH - Every RB producer gets EB opportunity with larger transaction capacity, creating more MEV opportunities, especially with lucky leader schedules
328330

329331
**Impact**:
330332
- **Value Extraction**: Users receive worse execution prices
331-
- **Market Inefficiency**: Creates unfair advantages for EB producers
333+
- **Market Inefficiency**: Creates unfair advantages for block producers
334+
- **Increased Opportunity**: Larger EBs and frequent production create more MEV extraction opportunities (than with Praos already)
332335
- **Detectable**: Transaction patterns can reveal front-running behavior
333-
- **Existing Issue**: Already present with RB producers, Leios increases frequency
334336

335337
**Assets Affected**: Transaction Validity/Availability/Determinism, Decentralization
336338

@@ -467,7 +469,7 @@ Notable threats to the system that could impact assets.
467469

468470
**Validation**: Simulation testing with network partitions
469471

470-
**Cost**: Medium - Protocol changes and monitoring infrastructure
472+
**Cost**: MEDIUM - Protocol changes and monitoring infrastructure
471473

472474
**Accepted Impact**: Temporary throughput reduction and resource waste from conflicting transactions, as long as perpetual storage costs are contained
473475

@@ -486,7 +488,7 @@ Notable threats to the system that could impact assets.
486488

487489
**Validation**: Penetration testing and network analysis
488490

489-
**Cost**: Medium - Monitoring infrastructure and operational procedures
491+
**Cost**: MEDIUM - Monitoring infrastructure and operational procedures
490492

491493
#### M3: Vote Flooding Protection
492494
**Addressing threats**: T3
@@ -503,7 +505,7 @@ Notable threats to the system that could impact assets.
503505

504506
**Validation**: Load testing with malicious vote patterns
505507

506-
**Cost**: Low - Protocol design already provides protection
508+
**Cost**: LOW - Protocol design already provides protection
507509

508510
#### M4: Transaction Availability Enforcement
509511
**Decision**: MITIGATE
@@ -518,12 +520,12 @@ Notable threats to the system that could impact assets.
518520

519521
**Validation**: Testing with unavailable transaction scenarios and peer timeouts
520522

521-
**Cost**: Low - Protocol enforcement mechanism
523+
**Cost**: LOW - Protocol enforcement mechanism
522524

523525
**Addressing threats**: T8
524526

525527
#### M5: Over-Parameterization
526-
**Addressing threats**: T4, T8
528+
**Addressing threats**: T4, T8, T9
527529

528530
**Decision**: MITIGATE
529531

@@ -532,12 +534,12 @@ Notable threats to the system that could impact assets.
532534
**Implementation**:
533535
- Parameterize EB opportunities and sizes for adversarial stake assumptions
534536
- Example: Assume 30% adversarial stake, produce 2 EBs per stage on average
535-
- Size EBs 15% larger to compensate for potential withholding
537+
- Size EBs 15% larger to compensate for potential withholding or front-running
536538
- Bound throughput loss to guaranteed capacity levels
537539

538540
**Validation**: Game-theoretic analysis and simulation with various adversarial stake percentages
539541

540-
**Cost**: Low - Protocol parameterization only
542+
**Cost**: LOW - Protocol parameterization only
541543

542544
#### M6: Double Voting Response
543545
**Addressing threats**: T5
@@ -569,10 +571,10 @@ Notable threats to the system that could impact assets.
569571

570572
**Accepted Impact**: Prerequisites too high (cryptographic breakthrough or massive capital) and likelihood too low to justify mitigation effort
571573

572-
#### M8: Front-Running Response
574+
#### M8: Front-Running Monitoring
573575
**Addressing threats**: T9
574576

575-
**Decision**: ACCEPT + MITIGATE
577+
**Decision**: ACCEPT
576578

577579
**Control type**: Detective
578580

@@ -584,9 +586,11 @@ Notable threats to the system that could impact assets.
584586

585587
**Validation**: Pattern analysis on historical transaction data
586588

587-
**Cost**: Low - Monitoring and analysis infrastructure
589+
**Cost**: MEDIUM - Monitoring and analysis infrastructure
588590

589-
**Accepted Impact**: Front-running will occur but detection helps maintain transparency and potential future governance responses
591+
**Accepted Impact**:
592+
- Front-running will occur but detection helps maintain transparency and potential future governance responses
593+
- Cannot mitigate because EB opportunities are tied to RB opportunities and cannot be parameterized separately
590594

591595
#### M9: Hard Fork Coordination Protection
592596
**Addressing threats**: T10
@@ -605,7 +609,7 @@ Notable threats to the system that could impact assets.
605609

606610
**Validation**: Stakeholder surveys, adoption metrics, testnet participation rates
607611

608-
**Cost**: Medium - Extensive coordination and communication effort
612+
**Cost**: MEDIUM - Extensive coordination and communication effort
609613

610614
#### M10: Backward Compatibility Protection
611615
**Addressing threats**: T11
@@ -622,7 +626,7 @@ Notable threats to the system that could impact assets.
622626

623627
**Validation**: Integration testing with various client versions and protocol combinations
624628

625-
**Cost**: Medium - Testing infrastructure and compatibility analysis
629+
**Cost**: MEDIUM - Testing infrastructure and compatibility analysis
626630

627631
## Review and Maintenance
628632

0 commit comments

Comments
 (0)