-
Notifications
You must be signed in to change notification settings - Fork 37
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
EIPIP Meeting 87 #255
Comments
Hello @poojaranjan , wanted to discuss ethereum/EIPs#7231, please consider adding this to review process. |
Hi @xuxinlai2002, |
I'd like to throw this on before the ERC/EIP split please! |
There's also the special number assignments for: |
Any manual number assignment should be limited to discouraging number sniping. |
I would like to escalate a security issueThere is a flaw in ERC-20 token standard: it does not implement "transaction handling" but it is a critical part of the token logic. Here is the description: known problems of ERC-20. This leads to monetary losses in the Ethereum ecosystem, and at least $130,000,000 worth of tokens are lost due to this vulnerability today. I discovered this problem in 2017 and I reported it multiple times.
Ethereum Foundation didn't make any statement about this so far. This issue fits in "critical severity security vulnerability" according to OpenZeppelin bug bounty criteria OpenZeppelin/openzeppelin-contracts#4474 I think this is a precedent of "Security Vulnerability Discovery in a 'final' EIP"
Other related publicationsHere is a security statement on ERC-20: https://callisto.network/erc-20-standard-callisto-network-security-department-statement/ It is considered a "Vulnerability Disclosure" by r/Cybersecurity: https://www.reddit.com/r/cybersecurity/comments/15ejbjs/erc20_standard_callisto_security_department/ It is censored by r/ethereum with a reason "It is not related to Ethereum ecosystem": https://www.reddit.com/r/ethereum/comments/15ej9zk/erc20_standard_callisto_security_department/ You can find a full history of all the related discussions under "Events Timeline" at ERC-223 page here: https://dexaran.github.io/erc223/ |
Generally, no. We do document management, and not vulnerability disclosure. Even if we did put a warning on ERC-20 like "there are known weaknesses in this standard" it wouldn't force anyone to migrate to a new token.
I mean... I'm employed by the Ethereum Foundation. What are you looking for from the EF? I can pass the message on to the relevant person. |
Summary1. Discuss Open Issues/PRs, and other topicsEthereum Improvement Proposal Charter
Special number assignment
2. Discussion continued or updates from past meetingsEIP-ERC GitHub repositories
ethereum/EIPs#7230@SamWilsn @gcolvin will have a meeting to split the PR and bring new/updated PRs to be shared with the rest of the editors in the next meeting. Any editors interested to join the meeting may reach Sam or Greg. 3. EIPs Insight - Monthly EIPs status reporting.
|
So we have a process that doesn't allow changes upon vulnerability disclosures? Like... nobody ever expected that there can be a security vulnerability in any of the existing EIPs?
Yes it will not force anyone to do anything but I believe it is really important to let developers and community members know about the problem. If the problem becomes more publicly known, then more people will be able to avoid losing funds. As the amount of funds lost due to this problem is at least $130M which exceeds the recent Curve hack twitce and there is no potential limit on how much damage it can cause in the future - I believe it is necessary to publicly highlight the problem. I think that:
https://en.wikipedia.org/wiki/Security_through_obscurity#Criticism
|
The EIP process isn't built for that, no. For example, changing ERC-20 today can't change all the existing ERC-20 implementations on-chain. Many of them are not upgradeable. ERC-20 remains as it was when it was finalized to capture the specification those contracts were written against. New tokens can use whatever standard they want, be it ERC-223, ERC-777, or ERC-1155.
I do agree we need a process for this, but one doesn't really exist today.
This part is certainly something we can discuss on the next EIPIP call, which is on August 23rd at 10:00 am ET. It would be best if you're able to make it, but I'll mention it either way.
These are somewhat out of scope for the EIP project.
This is something you'll need to take up with the mods of /r/ethereum. I don't think the EF has a direct hand in the management of that subreddit (but I might be mistaken.) For 2, 3, and 4: I've forwarded your concerns.
This is something you could write an EIP for (see EIP-779 for a somewhat outdated example.) You'd still need to raise support for the proposal on AllCoreDevs. It is my understanding that hardforks to undo problems on the application layer are unlikely to gain traction nowadays, but YMMV. |
Thank you for a reply @SamWilsn
This certainly needs to be created
I will try to assign my team member to this and let them represent me on a call.
Could you also escalate it to Ethereum Foundation if possible? |
AllCoreDevs is the correct place to escalate fork proposals. |
Closing in favor of #257 |
Date and Time
Aug 09, 2023 at 14:00 UTC
Location
Zoom: TBA in the Discord #eip-editing channel
YouTube Live Stream/Recording: https://www.youtube.com/playlist?list=PL4cwHXAawZxpLrRIkDlBjDUUrGgF91pQw
Agenda
1. Discuss Open Issues/PRs, and other topics
Changes to
Final
proposals(None)
2. Discussion continued or updates from past meetings
Ref: Task list for ERC/EIP Split
3. EIPs Insight - Monthly EIPs status reporting.
4. EIP Editing Office Hour
5. Review action items from earlier meetings
The text was updated successfully, but these errors were encountered: