|
| 1 | +--- |
| 2 | +sidebar_position: 4 |
| 3 | +--- |
| 4 | + |
| 5 | +# Frontrunning and Attack Vectors |
| 6 | + |
| 7 | +## Concern |
| 8 | + |
| 9 | +Community feedback raised concerns about potential attack vectors in the proposed Leios protocol, specifically regarding frontrunning opportunities and resource waste attacks through empty or minimal blocks. |
| 10 | + |
| 11 | +> "Empty blocks have value in Praos (chain length) but empty EBs are negative value in Leios... [this creates] frontrunning concerns." |
| 12 | +
|
| 13 | +<div style={{display: 'flex', justifyContent: 'center', margin: '20px 0'}}> |
| 14 | + <iframe |
| 15 | + width="900" |
| 16 | + height="506" |
| 17 | + src="https://www.youtube.com/embed/XPwDkHsGYO8?start=1285&end=1405" |
| 18 | + title="Community Discussion on Leios Attack Vectors" |
| 19 | + frameBorder="0" |
| 20 | + allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" |
| 21 | + allowFullScreen |
| 22 | + style={{maxWidth: '100%', minHeight: '400px', aspectRatio: '16/9'}} |
| 23 | + /> |
| 24 | +</div> |
| 25 | + |
| 26 | +## Analysis |
| 27 | + |
| 28 | +The concerns about frontrunning and resource waste attacks require examination within the broader context of blockchain security and the existing Praos system. |
| 29 | + |
| 30 | +### Frontrunning Context |
| 31 | + |
| 32 | +Frontrunning opportunities in proposed Leios are fundamentally similar to those in the current Praos system: |
| 33 | + |
| 34 | +**Current Praos**: Block producers can selectively include transactions from the mempool, enabling frontrunning through transaction ordering or exclusion. |
| 35 | + |
| 36 | +**Proposed Leios**: Similar selective inclusion capabilities exist, but with increased throughput providing more opportunities overall. This represents a **quantitative** rather than **qualitative** change in frontrunning potential. |
| 37 | + |
| 38 | +### Empty Block Analysis |
| 39 | + |
| 40 | +The concern about "empty EBs having negative value" requires clarification: |
| 41 | + |
| 42 | +- **Empty EBs**: Have zero bytes in length and trigger no diffusion or voting when announced |
| 43 | +- **Minimal EBs**: Could theoretically waste voting resources relative to transaction throughput |
| 44 | +- **Mitigation**: Protocol can enforce minimum EB size requirements to address disproportionate voting costs |
| 45 | + |
| 46 | +### Resource Waste Attack Vectors |
| 47 | + |
| 48 | +The potential for adversarial resource waste exists but must be evaluated against: |
| 49 | + |
| 50 | +1. **Attack Cost**: Producing EBs requires winning sortition, limiting attack frequency |
| 51 | +2. **Waste Magnitude**: Voting verification represents minimal computational cost (~600ms total across all validators) |
| 52 | +3. **Existing Vulnerabilities**: Current Praos system has similar attack surfaces through mempool manipulation |
| 53 | + |
| 54 | +### Comparative Security Analysis |
| 55 | + |
| 56 | +Proposed Leios does not introduce fundamentally new attack vectors but may amplify existing ones due to increased throughput. However: |
| 57 | + |
| 58 | +- **Detection**: Malicious behavior patterns are observable and can trigger community response |
| 59 | +- **Cost-Benefit**: Attack costs generally exceed potential benefits |
| 60 | +- **Mitigation**: Protocol parameters can be adjusted to minimize attack effectiveness |
| 61 | + |
| 62 | +## Conclusion |
| 63 | + |
| 64 | +While proposed Leios may increase the scale of certain attack opportunities due to higher throughput, it does not introduce qualitatively new vulnerabilities. The protocol includes mechanisms to mitigate resource waste attacks, and the increased frontrunning potential is a natural consequence of improved scalability rather than a design flaw. |
| 65 | + |
| 66 | +Comprehensive security analysis and potential parameter adjustments can further minimize these risks while preserving the protocol's scalability benefits. |
| 67 | + |
| 68 | +--- |
| 69 | + |
| 70 | +**References**: [CIP Leios Specification](https://github.com/cardano-scaling/CIPs/blob/leios/CIP-0164/README.md#specification) |
0 commit comments