Doyeon Park

42 posts

Doyeon Park banner
Doyeon Park

Doyeon Park

@ehdus829

Security Researcher l @cysecschool | prev @zellic_io

대한민국 성북구 Katılım Temmuz 2022
168 Takip Edilen694 Takipçiler
sakura
sakura@eternalsakura13·
@l33d0hyun I usually point out such issues during security audits, yet they are generally not accepted as valid vulnerabilities in bug bounty programs.
English
1
0
6
1K
Doyeon Park
Doyeon Park@ehdus829·
@escrow_ If it can be mitigated by blocking, then it wouldn’t be considered a vulnerability. However, malicious attackers are not removed.
English
0
0
8
4.4K
escrow
escrow@escrow_·
@p6rkdoye0n But you can just ban the malicious peer that is providing falsified heights and sync w/o an issue post-ban? Plus, the attacker can't do much with this if the workaround is so easy - even if they scale. I also see an informational, and not a 0day or a 7.1 to be honest.
English
3
0
12
5.1K
Doyeon Park
Doyeon Park@ehdus829·
I’m disclosing a 0-day vulnerability in the Cosmos consensus layer (CometBFT). This is a CVSS 7.1 (High) severity issue that can cause nodes in the Cosmos ecosystem—which secures over $8B+ in assets—to stall during the block synchronization phase. However, direct asset theft is not possible using this vulnerability. I made every effort to follow Coordinated Vulnerability Disclosure (CVD) for the safety of the ecosystem; however, due to the vendor’s lack of cooperation and irresponsible decisions, I have decided to proceed with disclosure. This action is taken in accordance with the vendor’s final decision. All resulting security risks are solely the responsibility of the vendor, and I will therefore disclose both the vendor’s irresponsible handling and the detailed vulnerability information in this thread.
English
67
143
1.3K
219.5K
Facundo Medica
Facundo Medica@FacundoMedica·
@yongjoojung @p6rkdoye0n Agree, it's being presented in a very exaggerated manner. It does make sense in a lab environment but in real life validators run with fixed peers and behind sentinel nodes. Also saying that it "can lead to a deadlock, making it impossible for the node to rejoin" is false.
English
1
0
1
170
Doyeon Park
Doyeon Park@ehdus829·
안녕하세요. 말씀하신 것처럼 검증자 노드와 릴레이 노드는 기본적으로 검증된 고정 피어만 사용합니다. 네 그래서 대부분 Sentry 노드 사용을 권장하며, Sentry 노드가 외부와 통신을 진행하는데 만약 해당 노드가 블록 동기화 중 교착된다면 검증자 노드나 릴레이 노드 전부 고립되게 됩니다. 그래서 이때는 공격 타겟을 Sentry 노드로 잡으면 공격을 성공시킬 수 있습니다. 주소록은 하나의 rpc url에다가 `net_info` 메소드를 한번 날려보세요. 쉽게 peer들의 rpc를 구할 수 있으며 구한 rpc들에게 `status`를 보내는 방식으로 네트워크에 있는 주소록을 리스트업할 수 있습니다.
한국어
0
0
4
3.3K
yongjoo
yongjoo@yongjoojung·
@p6rkdoye0n 기술적으로는 충분히 의미 있는 지적이라고 생각합니다. 다만 현실적인 운영 환경까지 고려하면, 일반적인 Cosmos 계열 검증인 세팅에서는 실제로 발생하기는 쉽지 않아 보입니다. 검증인노드나 릴레이노드는 확인된 고정피어만 사용하고, 어드래스북은 공유안하는게 기본이라서요.
한국어
2
0
4
4K
Doyeon Park retweetledi
Doyeon Park
Doyeon Park@ehdus829·
@link_vector thank you for your kind words. It occurs in the Cosmos consensus layer (CometBFT)
English
0
0
23
5.6K
Link Vector
Link Vector@link_vector·
@p6rkdoye0n Dude great job and you handled this proper - ignore the idiots that don't read - we need more sec. researchers like u Shame on the vendor .. is it Cosmos hub in this case??
English
1
0
60
6.7K
PCEF
PCEF@PerkinsFund·
@p6rkdoye0n Who told you this was a 7.1? The practicality of using this is very low.
English
1
0
2
1.2K
Doyeon Park retweetledi
Doyeon Park
Doyeon Park@ehdus829·
@0xphilipp Please review the text. I did not intend for this to be disclosed. I made every effort within my control, and this disclosure is solely the result of the chain team’s final decision.
English
3
0
75
5.9K
philipp
philipp@0xphilipp·
@p6rkdoye0n Disclosing security issues publicly without first reaching out to chains is never responsible. All resulting security risks are solely on you.
English
8
0
4
6.3K
Doyeon Park
Doyeon Park@ehdus829·
@PerkinsFund yes, an attack can be carried out against the entire network with knowledge of just a single rpc url
English
1
0
19
6.3K
Doyeon Park
Doyeon Park@ehdus829·
The purpose of this disclosure is to protect the ecosystem, not to harm it. Therefore, with consideration for ecosystem safety, I will disclose only the technical details of the vulnerability and video evidence, and will not release the fully exploitable attack code (full PoC).
English
2
2
36
11.2K
Doyeon Park retweetledi
BlockchainValley
BlockchainValley@blockchainkor·
Blockchain Valley X DeFiHackLabs Offline Session (📅 May 27) This session was made possible with the support of @DeFiHackLabs, a global Web3 security community. We would like to express our sincere gratitude to @DeFiHackLabs for their efforts in supporting university blockchain society in South Korea ❣ We are genuinely committed to researching Web3 security, and this session focused on the security of smart contracts. The presenters led the session with a focus on how vulnerabilities in smart contracts occur, covering both theoretical concepts and hands-on exercises 🌟 Participants engaged in lectures explaining how vulnerabilities arise in smart contracts, followed by practical sessions. Additionally, the security team members conducted a group audit of a previously completed real-world smart contract audit, allowing those unfamiliar with auditing to gain experience through discussion and collaborative practice 🫧 Also for those still new to Web3 security, the presenters — who had previously participated in development projects — were able to provide a variety of insights, making the session valuable and informative for everyone involved 🙏 Once again, we would like to express our deepest gratitude to @DeFiHackLabs for providing the most significant support for this session 🚀
BlockchainValley tweet mediaBlockchainValley tweet mediaBlockchainValley tweet mediaBlockchainValley tweet media
English
1
7
26
4.5K
Doyeon Park retweetledi
Zellic
Zellic@zellic_io·
Zellic proudly announces the EVM trackooor, a modular tool for monitoring arbitrary actions on chain. With the amount of data that blockchains contain, it’s difficult to query and process anything that isn’t indexed event fields. This is why we built EVM trackooor 🧵👇
GIF
English
8
33
209
32.1K
Doyeon Park retweetledi
Zellic
Zellic@zellic_io·
Zellic and @immunefi are partnering to build a more secure Web3! This partnership will enable our customers to strengthen their security posture with a holistic security suite. For more details on this partnership join our Twitter Spaces with Scroll on Thursday at 2:30pm EST!
Zellic tweet media
English
2
9
44
7.9K