You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/threat-model.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -384,7 +384,7 @@ Notable threats to the system that could impact assets.
384
384
385
385
**Assets Affected**: Operational Sustainability, High Throughput
386
386
387
-
#### T?: Honey Pot Contract
387
+
#### T12: Honey Pot Contract
388
388
389
389
**Description**: An attacker deliberately makes ADA available on-chain so anyone races to claim it with the goal of producing many conflicting transactions. This is very similar to T1, but uses cryptocurrency instead of network resources.
390
390
@@ -408,7 +408,7 @@ Notable threats to the system that could impact assets.
408
408
409
409
**Assets Affected**: High Throughput, Operational Sustainability
410
410
411
-
#### T?: Delayed Praos Blocks
411
+
#### T13: Delayed Praos Blocks
412
412
413
413
> [!WARN]
414
414
> Is this a threat or rather part of the Blockchain Safety asset?
@@ -420,7 +420,7 @@ Notable threats to the system that could impact assets.
420
420
421
421
**Assets Affected**: Blockchain Safety
422
422
423
-
#### T?: Excessive Chain Growth
423
+
#### T14: Excessive Chain Growth
424
424
425
425
> [!WARN]
426
426
> TODO and how do we describe threats that are not attacks?
0 commit comments