-
Notifications
You must be signed in to change notification settings - Fork 224
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
double check old audit issues #6869
Comments
Reviewing TARI-001 to TARI-010
pub type PowData = MaxSizeBytes<{ NOT_BEFORE_PROOF_BYTES_SIZE }>
pub type PowData = MaxSizeBytes<{ NOT_BEFORE_PROOF_BYTES_SIZE }> |
Reviewing TARI-011 to TARI-020
|
I disagree about TARI-004 (Attackers can spam mempool at no cost) The issue is about providing a spam amount of 0 fee transactions. And thus flooding the mempool with valid transactions. The Tari network has limits on the number of messages that can be sent and a min fee for transactions. Beyond that a node has to validate the tx before it can be propagated to the network. |
Is your min fee for transactions a consensus parameter or a mempool policy? |
Reviewing TARI-021 to TARI-030
|
We need to revisit the audit and ensure that we have not reintroduced any of the same findings they had
https://www.coinspect.com/blog/tari-security-audit/
Report in pdf format
The text was updated successfully, but these errors were encountered: