Skip to content

Commit 9f8c0b4

Browse files
committed
Detail front running and realize we cannot mitigate this
1 parent fb0667c commit 9f8c0b4

File tree

1 file changed

+25
-21
lines changed

1 file changed

+25
-21
lines changed

docs/threat-model.md

Lines changed: 25 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -308,27 +308,29 @@ Notable threats to the system that could impact assets.
308308

309309
**Assets Affected**: High Throughput, Operational Sustainability
310310

311-
#### T9: Transaction Front-Running
312-
**Description**: EB producers observe profitable transactions and reorder or insert their own transactions to extract value before the original transaction executes.
311+
#### T9: Front-Running
312+
**Description**: Block producers observe profitable transactions and reorder or insert their own transactions to extract value before the original transaction executes.
313313

314314
**Prerequisites**:
315-
- EB creation eligibility
315+
- Block production eligibility (RB + EB creation)
316316
- MEV (Maximal Extractable Value) opportunities in transaction sets
317317
- Knowledge of transaction dependencies and profitable patterns
318318

319319
**Attack Vector**:
320320
1. Monitor mempool for profitable transaction patterns
321-
2. Create competing or parasitic transactions
322-
3. Include both in EB with favorable ordering for attacker
321+
2. Create front-running transactions
322+
3. Replace target transactions with front-runing transactions in EB
323323
4. Extract value through arbitrage, sandwich attacks, or liquidations
324324

325-
**Cost**: LOW - Opportunity cost only, plus normal EB creation requirements
325+
**Cost**: LOW - Opportunity cost only, since already producing the block
326+
327+
**Likelihood**: MEDIUM-HIGH - Every RB producer gets EB opportunity with larger transaction capacity, creating more MEV opportunities, especially with lucky leader schedules
326328

327329
**Impact**:
328330
- **Value Extraction**: Users receive worse execution prices
329-
- **Market Inefficiency**: Creates unfair advantages for EB producers
331+
- **Market Inefficiency**: Creates unfair advantages for block producers
332+
- **Increased Opportunity**: Larger EBs and frequent production create more MEV extraction opportunities (than with Praos already)
330333
- **Detectable**: Transaction patterns can reveal front-running behavior
331-
- **Existing Issue**: Already present with RB producers, Leios increases frequency
332334

333335
**Assets Affected**: Transaction Validity/Availability/Determinism, Decentralization
334336

@@ -465,7 +467,7 @@ Notable threats to the system that could impact assets.
465467

466468
**Validation**: Simulation testing with network partitions
467469

468-
**Cost**: Medium - Protocol changes and monitoring infrastructure
470+
**Cost**: MEDIUM - Protocol changes and monitoring infrastructure
469471

470472
**Accepted Impact**: Temporary throughput reduction and resource waste from conflicting transactions, as long as perpetual storage costs are contained
471473

@@ -484,7 +486,7 @@ Notable threats to the system that could impact assets.
484486

485487
**Validation**: Penetration testing and network analysis
486488

487-
**Cost**: Medium - Monitoring infrastructure and operational procedures
489+
**Cost**: MEDIUM - Monitoring infrastructure and operational procedures
488490

489491
#### M3: Vote Flooding Protection
490492
**Addressing threats**: T3
@@ -501,7 +503,7 @@ Notable threats to the system that could impact assets.
501503

502504
**Validation**: Load testing with malicious vote patterns
503505

504-
**Cost**: Low - Protocol design already provides protection
506+
**Cost**: LOW - Protocol design already provides protection
505507

506508
#### M4: Transaction Availability Enforcement
507509
**Decision**: MITIGATE
@@ -516,12 +518,12 @@ Notable threats to the system that could impact assets.
516518

517519
**Validation**: Testing with unavailable transaction scenarios and peer timeouts
518520

519-
**Cost**: Low - Protocol enforcement mechanism
521+
**Cost**: LOW - Protocol enforcement mechanism
520522

521523
**Addressing threats**: T8
522524

523525
#### M5: Over-Parameterization
524-
**Addressing threats**: T4, T8
526+
**Addressing threats**: T4, T8, T9
525527

526528
**Decision**: MITIGATE
527529

@@ -530,12 +532,12 @@ Notable threats to the system that could impact assets.
530532
**Implementation**:
531533
- Parameterize EB opportunities and sizes for adversarial stake assumptions
532534
- Example: Assume 30% adversarial stake, produce 2 EBs per stage on average
533-
- Size EBs 15% larger to compensate for potential withholding
535+
- Size EBs 15% larger to compensate for potential withholding or front-running
534536
- Bound throughput loss to guaranteed capacity levels
535537

536538
**Validation**: Game-theoretic analysis and simulation with various adversarial stake percentages
537539

538-
**Cost**: Low - Protocol parameterization only
540+
**Cost**: LOW - Protocol parameterization only
539541

540542
#### M6: Double Voting Response
541543
**Addressing threats**: T5
@@ -567,10 +569,10 @@ Notable threats to the system that could impact assets.
567569

568570
**Accepted Impact**: Prerequisites too high (cryptographic breakthrough or massive capital) and likelihood too low to justify mitigation effort
569571

570-
#### M8: Front-Running Response
572+
#### M8: Front-Running Monitoring
571573
**Addressing threats**: T9
572574

573-
**Decision**: ACCEPT + MITIGATE
575+
**Decision**: ACCEPT
574576

575577
**Control type**: Detective
576578

@@ -582,9 +584,11 @@ Notable threats to the system that could impact assets.
582584

583585
**Validation**: Pattern analysis on historical transaction data
584586

585-
**Cost**: Low - Monitoring and analysis infrastructure
587+
**Cost**: MEDIUM - Monitoring and analysis infrastructure
586588

587-
**Accepted Impact**: Front-running will occur but detection helps maintain transparency and potential future governance responses
589+
**Accepted Impact**:
590+
- Front-running will occur but detection helps maintain transparency and potential future governance responses
591+
- Cannot mitigate because EB opportunities are tied to RB opportunities and cannot be parameterized separately
588592

589593
#### M9: Hard Fork Coordination Protection
590594
**Addressing threats**: T10
@@ -603,7 +607,7 @@ Notable threats to the system that could impact assets.
603607

604608
**Validation**: Stakeholder surveys, adoption metrics, testnet participation rates
605609

606-
**Cost**: Medium - Extensive coordination and communication effort
610+
**Cost**: MEDIUM - Extensive coordination and communication effort
607611

608612
#### M10: Backward Compatibility Protection
609613
**Addressing threats**: T11
@@ -620,7 +624,7 @@ Notable threats to the system that could impact assets.
620624

621625
**Validation**: Integration testing with various client versions and protocol combinations
622626

623-
**Cost**: Medium - Testing infrastructure and compatibility analysis
627+
**Cost**: MEDIUM - Testing infrastructure and compatibility analysis
624628

625629
## Review and Maintenance
626630

0 commit comments

Comments
 (0)