Skip to content

Security Sprint: bridge proof verification, signed transfer nonce ledger, and safer trust boundaries #726

@Scottcjn

Description

@Scottcjn

Summary

This umbrella tracks the next security-hardening pass for RustChain’s money-moving and trust-sensitive surfaces.

Why This Matters

RustChain now has enough real user flow that soft trust assumptions are the biggest risk. The bridge, signed transfer path, and admin-controlled flows need stronger verification and replay resistance before more growth features sit on top of them.

Scope

  • harden /bridge/lock so user-supplied claims are not accepted without verifiable proof
  • persist nonce/idempotency state for /wallet/transfer/signed
  • tighten proxy/IP trust assumptions where request metadata influences accounting or anti-abuse logic
  • document the exact trust boundaries and failure behavior
  • land tests for replay, duplicate processing, and invalid proof paths

Candidate Child Work

  • bridge lock proof verification or signed lock receipt validation
  • signed transfer nonce ledger and replay rejection
  • trusted proxy enforcement and header handling review
  • admin key reduction or service-signing follow-up

Acceptance Criteria

  • bridge lock acceptance requires verifiable proof or signed receipt, not raw user claims
  • signed transfer path rejects nonce replay across process restarts
  • trust assumptions around request metadata are explicit and test-covered
  • operator docs explain the security model and deployment expectations

Non-Goals

  • Phase 2 fully trustless bridge architecture
  • unrelated wallet UI work
  • bounty queue cleanup

Routing

Use this umbrella to coordinate the hardening sprint. Implementation should land in child issues or PRs linked back here.

Metadata

Metadata

Assignees

No one assigned

    Labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions