| Version | Supported | Status |
|---|---|---|
| 0.2.0-poc | Yes | Current (PoC) |
| < 0.2.0 | No | Deprecated |
Note: This is a Proof of Concept. Not recommended for production without professional security audit.
DO NOT open public issues for security vulnerabilities.
- Email: fboiero@frvm.utn.edu.ar
- Subject:
[SECURITY] OpenZKTool Vulnerability Report - Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Initial response: Within 48 hours
- Status update: Within 7 days
- Fix timeline: Depends on severity
- Critical: 7-14 days
- High: 14-30 days
- Medium: 30-60 days
- Low: Next release
- Algorithm: Groth16 proof system
- Curve: BN254 (alt_bn128)
- Security level: ~128-bit security
- Assumption: Computational Discrete Logarithm hardness
- Status: Using Powers of Tau ceremony
- Participants: Single-party (PoC only)
- Production: Multi-party ceremony required (100+ participants)
- Risk: Current setup is for testing only
WARNING: The current trusted setup is NOT secure for production. A multi-party ceremony is required before mainnet deployment.
- Language: Rust (no_std)
- Version: 4 (Complete BN254 pairing)
- Testing: 49 unit tests
- Audit status: Not audited
- Network: Testnet only
- Language: Solidity 0.8+
- Framework: Foundry
- Testing: Forge tests
- Audit status: Not audited
- Network: Local/testnet only
-
Trusted Setup
- Single-party ceremony (NOT production-safe)
- Toxic waste not destroyed
- Multi-party ceremony required
-
No Security Audit
- Contracts not audited by third party
- Cryptographic implementation not formally verified
- Use at your own risk
-
Test Networks Only
- Deployed on testnets only
- Not recommended for mainnet
- No real assets should be used
-
Limited Testing
- ~50% code coverage
- No fuzzing tests
- No formal verification
-
Field Arithmetic
- Montgomery form used
- Overflow checks in place
- No constant-time guarantees (timing attacks possible)
-
Pairing Implementation
- Miller loop implemented
- Final exponentiation optimized
- Not reviewed by cryptography experts
-
Input Validation
- Basic validation only
- No advanced sanitization
- Malicious inputs not extensively tested
- Increase test coverage to 95%
- Add fuzzing tests
- Implement constant-time operations where needed
- Multi-party trusted setup ceremony
- Third-party code review
- Professional security audit by UTN FRVM Blockchain Lab
- Francisco Anuar Ardúh (Principal Researcher)
- Joel Edgar Dellamaggiore Kuns (Blockchain Specialist)
- Formal verification of critical functions
- Penetration testing
- Gas optimization audit
- Address all audit findings
- Public bug bounty program
- Continuous security monitoring
- Incident response plan
- Private reporting: 90 days before public disclosure
- Coordinated disclosure: Work with team on fix
- Public disclosure: After fix deployed
- CVE assignment: For critical vulnerabilities
We will publicly acknowledge security researchers who:
- Report valid vulnerabilities
- Follow responsible disclosure
- Allow time for fixes
Hall of Fame: (Empty - be the first!)
- Never use production keys with PoC contracts
- Test on testnets only
- Review all code before integrating
- Use official repositories only
- Keep dependencies updated
- Conduct own security review
- Use multi-party trusted setup
- Deploy to testnet first
- Monitor for unusual activity
- Have incident response plan
- Only interact with audited contracts
- Verify contract addresses
- Start with small amounts
- Understand risks
- Keep wallets secure
- Slither - Solidity static analyzer
- Mythril - Security analysis tool
- cargo-audit - Rust dependency auditor
- Foundry - Ethereum testing framework
In case of security incident:
- Assess severity (Critical/High/Medium/Low)
- Contain the issue (pause contracts if needed)
- Notify affected parties
- Develop and test fix
- Deploy fix and verify
- Post-mortem analysis
- Public disclosure (after fix)
None reported (project is new).
- Security Email: fboiero@frvm.utn.edu.ar
- GitHub Security Advisories: Create Advisory
- PGP Key: (To be added)
| Version | Date | Changes |
|---|---|---|
| 1.0 | 2025-01-14 | Initial security policy |
DISCLAIMER: This is a Proof of Concept project. Use in production at your own risk. No warranties provided. See LICENSE for full terms.
Last updated: 2025-01-14 Next review: 2025-02-14