Skip to content

Commit b66aaf6

Browse files
committed
site: add front running concern page
1 parent cd65326 commit b66aaf6

File tree

1 file changed

+70
-0
lines changed

1 file changed

+70
-0
lines changed
Lines changed: 70 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,70 @@
1+
---
2+
sidebar_position: 4
3+
---
4+
5+
# Frontrunning and Attack Vectors
6+
7+
## Concern
8+
9+
Community feedback raised concerns about potential attack vectors in the proposed Leios protocol, specifically regarding frontrunning opportunities and resource waste attacks through empty or minimal blocks.
10+
11+
> "Empty blocks have value in Praos (chain length) but empty EBs are negative value in Leios... [this creates] frontrunning concerns."
12+
13+
<div style={{display: 'flex', justifyContent: 'center', margin: '20px 0'}}>
14+
<iframe
15+
width="900"
16+
height="506"
17+
src="https://www.youtube.com/embed/XPwDkHsGYO8?start=1285&end=1405"
18+
title="Community Discussion on Leios Attack Vectors"
19+
frameBorder="0"
20+
allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share"
21+
allowFullScreen
22+
style={{maxWidth: '100%', minHeight: '400px', aspectRatio: '16/9'}}
23+
/>
24+
</div>
25+
26+
## Analysis
27+
28+
The concerns about frontrunning and resource waste attacks require examination within the broader context of blockchain security and the existing Praos system.
29+
30+
### Frontrunning Context
31+
32+
Frontrunning opportunities in proposed Leios are fundamentally similar to those in the current Praos system:
33+
34+
**Current Praos**: Block producers can selectively include transactions from the mempool, enabling frontrunning through transaction ordering or exclusion.
35+
36+
**Proposed Leios**: Similar selective inclusion capabilities exist, but with increased throughput providing more opportunities overall. This represents a **quantitative** rather than **qualitative** change in frontrunning potential.
37+
38+
### Empty Block Analysis
39+
40+
The concern about "empty EBs having negative value" requires clarification:
41+
42+
- **Empty EBs**: Have zero bytes in length and trigger no diffusion or voting when announced
43+
- **Minimal EBs**: Could theoretically waste voting resources relative to transaction throughput
44+
- **Mitigation**: Protocol can enforce minimum EB size requirements to address disproportionate voting costs
45+
46+
### Resource Waste Attack Vectors
47+
48+
The potential for adversarial resource waste exists but must be evaluated against:
49+
50+
1. **Attack Cost**: Producing EBs requires winning sortition, limiting attack frequency
51+
2. **Waste Magnitude**: Voting verification represents minimal computational cost (~600ms total across all validators)
52+
3. **Existing Vulnerabilities**: Current Praos system has similar attack surfaces through mempool manipulation
53+
54+
### Comparative Security Analysis
55+
56+
Proposed Leios does not introduce fundamentally new attack vectors but may amplify existing ones due to increased throughput. However:
57+
58+
- **Detection**: Malicious behavior patterns are observable and can trigger community response
59+
- **Cost-Benefit**: Attack costs generally exceed potential benefits
60+
- **Mitigation**: Protocol parameters can be adjusted to minimize attack effectiveness
61+
62+
## Conclusion
63+
64+
While proposed Leios may increase the scale of certain attack opportunities due to higher throughput, it does not introduce qualitatively new vulnerabilities. The protocol includes mechanisms to mitigate resource waste attacks, and the increased frontrunning potential is a natural consequence of improved scalability rather than a design flaw.
65+
66+
Comprehensive security analysis and potential parameter adjustments can further minimize these risks while preserving the protocol's scalability benefits.
67+
68+
---
69+
70+
**References**: [CIP Leios Specification](https://github.com/cardano-scaling/CIPs/blob/leios/CIP-0164/README.md#specification)

0 commit comments

Comments
 (0)