Summary
This umbrella tracks the next security-hardening pass for RustChain’s money-moving and trust-sensitive surfaces.
Why This Matters
RustChain now has enough real user flow that soft trust assumptions are the biggest risk. The bridge, signed transfer path, and admin-controlled flows need stronger verification and replay resistance before more growth features sit on top of them.
Scope
- harden
/bridge/lock so user-supplied claims are not accepted without verifiable proof
- persist nonce/idempotency state for
/wallet/transfer/signed
- tighten proxy/IP trust assumptions where request metadata influences accounting or anti-abuse logic
- document the exact trust boundaries and failure behavior
- land tests for replay, duplicate processing, and invalid proof paths
Candidate Child Work
- bridge lock proof verification or signed lock receipt validation
- signed transfer nonce ledger and replay rejection
- trusted proxy enforcement and header handling review
- admin key reduction or service-signing follow-up
Acceptance Criteria
Non-Goals
- Phase 2 fully trustless bridge architecture
- unrelated wallet UI work
- bounty queue cleanup
Routing
Use this umbrella to coordinate the hardening sprint. Implementation should land in child issues or PRs linked back here.
Summary
This umbrella tracks the next security-hardening pass for RustChain’s money-moving and trust-sensitive surfaces.
Why This Matters
RustChain now has enough real user flow that soft trust assumptions are the biggest risk. The bridge, signed transfer path, and admin-controlled flows need stronger verification and replay resistance before more growth features sit on top of them.
Scope
/bridge/lockso user-supplied claims are not accepted without verifiable proof/wallet/transfer/signedCandidate Child Work
Acceptance Criteria
Non-Goals
Routing
Use this umbrella to coordinate the hardening sprint. Implementation should land in child issues or PRs linked back here.