ICP minimum attack vector

Honestly, I think the “easiest” or minimum attack vector would come through a social engineering attack.

Currently, more than 99% of NNS voting power auto-follows the DFINITY neuron for all proposals that mutate/upgrade the network (i.e. code change proposals).

The DFINITY neuron is controlled by 11-12 individuals at DFINITY (from my understanding).

I would imagine that it would be incredibly burdensome time wise for every one of those 11 or 12 people to verify every single code change proposal/wasm that is sent out, and so there is probably only one or two of the neurons that verify the wasm, and then communicate via a slack channel the “A ok” for everyone else to vote.

This system would be easily compromised in a few ways.

  1. Bribe the DFINITY employee or employees that have the responsibility of verifying the replica to say that it checks out.
  2. Compromise the slack accounts of the employees responsible for verifying wasms and falsely communicate that the wasm is legitimate and ready to be voted on.
  3. Compromise the slack account of the CEO or CTO of DFINITY and send out a message requesting the other neurons to vote immediately on a (false) hotfix issue.
  4. Blackmail the CEO or CTO of DFINITY to compromise themselves and perform the actions listed in step 3.

This is another reason why having the community take part in verification of non-governance proposals and actively voting on them is an incredibly important step towards the decentralization, improved security, and overall success of the IC.

If you want to get involved, I recommended taking part in the Voting Challenge Proposal brought forth by @wpb. Right now there’s even an ICP reward for doing so!

4 Likes