You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Since the batch_update_compass message is treated like very other message going to compass, the current architecture in Paloma would allow a hostile network takeover by an attacker modifying the Paloma code base to inject an EVM message with the batch_update_compass action.
I can think of two ways to avoid this:
check for valid outstanding deployment when this message is entered on a queue
check during the BytesToSign building
The latter would more secure (maybe), but there is no infrastructure there at all.
Looking into the first.
The text was updated successfully, but these errors were encountered:
# Related Github tickets
- VolumeFi#1960
- VolumeFi#1951
- VolumeFi#1956
- VolumeFi#2043
# Background
This change makes use of the atomic handover endpoint on compass,
re-enables the token relink and ensures ownership of fee manager is
transferred as well.
# Testing completed
- [x] test coverage exists or has been added/updated
- [x] tested in a private testnet
# Breaking changes
- [x] I have checked my code for breaking changes
- [x] If there are breaking changes, there is a supporting migration.
# Related Github tickets
- VolumeFi#1960
- VolumeFi#1951
- VolumeFi#1956
- VolumeFi#2043
# Background
This change makes use of the atomic handover endpoint on compass,
re-enables the token relink and ensures ownership of fee manager is
transferred as well.
# Testing completed
- [x] test coverage exists or has been added/updated
- [x] tested in a private testnet
# Breaking changes
- [x] I have checked my code for breaking changes
- [x] If there are breaking changes, there is a supporting migration.
Since the
batch_update_compass
message is treated like very other message going to compass, the current architecture in Paloma would allow a hostile network takeover by an attacker modifying the Paloma code base to inject an EVM message with thebatch_update_compass
action.I can think of two ways to avoid this:
The latter would more secure (maybe), but there is no infrastructure there at all.
Looking into the first.
The text was updated successfully, but these errors were encountered: