Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Relayer suggestions #115

Closed
wants to merge 1 commit into from
Closed

Relayer suggestions #115

wants to merge 1 commit into from

Conversation

ggawryal
Copy link
Contributor

@ggawryal ggawryal commented Mar 1, 2024

No description provided.

Comment on lines +165 to +172
// [Audit] Have we considered checking somehow type of the signed transaction,
// or even changing the interface to accept only transactions that are calls
// to Most or Advisory contracts? Don't know how enclaves exactly work, but I
// assume that if an attacker can broke into the EC2 instance, then they
// could create extra connection to the enclave on which the signer is running,
// and sing anything they want, including draining all AZero and ETH from the guardian.
// This already isn't that bad, compared to having the key compromised, as at least we'd
// have some tracks of the incident probably, but maybe we could add that extra layer of security?
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I specifically didn't want to do that to keep the signer as simple as possible to limit other possible bugs. So my choice was to have it be an abstract signer of bytes. From what I understand it would also be quite unwieldy to deploy - any change to the signer (not the relayer) requires rebuilding the enclave, giving it access to the signing keys, etc. - relatively high-security operations. So if anything simple happened where we needed to sign a new kind of transaction (like in fact we're planning to do when we finally add the ability for the relayer to pay out fees) we would have to go through that painful process.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants