-
Notifications
You must be signed in to change notification settings - Fork 0
/
camp2023-57069-eng-DONT_PANIC_opus.srt
2812 lines (2109 loc) · 53.7 KB
/
camp2023-57069-eng-DONT_PANIC_opus.srt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1
00:00:00,000 --> 00:00:29,980
[ Music ]
2
00:00:30,960 --> 00:00:33,780
>> Ladies and gentlemen, we're going to have an interesting talk
3
00:00:33,780 --> 00:00:38,060
about bugs in the blockchain brought to you by Louis and Gabi.
4
00:00:38,060 --> 00:00:42,860
[ Applause ]
5
00:00:42,860 --> 00:00:43,780
>> Hello everybody.
6
00:00:43,780 --> 00:00:45,540
Yeah, thanks a lot for coming.
7
00:00:45,540 --> 00:00:47,140
It's still early.
8
00:00:47,140 --> 00:00:49,020
I'm glad everyone could make it.
9
00:00:49,020 --> 00:00:53,320
So our talk is called Don't Panic, Bites, Blocks, Bugs.
10
00:00:53,320 --> 00:00:55,620
And I'm Louis.
11
00:00:55,620 --> 00:00:57,120
I'm a security researcher.
12
00:00:57,120 --> 00:01:00,020
I've been working on this topic of finding bugs in blockchain
13
00:01:00,020 --> 00:01:02,880
for almost two years now.
14
00:01:02,880 --> 00:01:07,200
And I also focused a lot in the past two years
15
00:01:07,200 --> 00:01:12,600
on tool development around our audit efforts.
16
00:01:12,600 --> 00:01:14,940
>> Yeah. Good morning everyone.
17
00:01:14,940 --> 00:01:15,660
I'm Gabi.
18
00:01:15,660 --> 00:01:18,060
Thank you for making it this morning.
19
00:01:18,060 --> 00:01:20,680
We know it can be a bit difficult after like three,
20
00:01:20,680 --> 00:01:21,960
four days of camp.
21
00:01:21,960 --> 00:01:24,120
I'm a security researcher.
22
00:01:24,260 --> 00:01:27,660
And currently I'm focusing on finding bugs in blockchains.
23
00:01:27,660 --> 00:01:30,620
>> All right.
24
00:01:30,620 --> 00:01:31,540
So blockchains.
25
00:01:31,540 --> 00:01:33,640
They've been in the news quite a lot
26
00:01:33,640 --> 00:01:35,740
in the past couple of years.
27
00:01:35,740 --> 00:01:38,880
Not always for the good reasons.
28
00:01:38,880 --> 00:01:41,180
A lot of times it's because a lot of money gets stolen
29
00:01:41,180 --> 00:01:43,460
from somewhere or a lot of money gets lost.
30
00:01:43,460 --> 00:01:46,680
And it seems like a lot
31
00:01:46,680 --> 00:01:50,140
of attackers have a big advantage in the field.
32
00:01:50,140 --> 00:01:52,920
So as security researchers we're kind of trying to be proactive.
33
00:01:53,340 --> 00:01:56,680
And we want to share with you today the knowledge
34
00:01:56,680 --> 00:01:59,920
of how we find bugs and which kind of bugs we find
35
00:01:59,920 --> 00:02:01,420
in those blockchain systems.
36
00:02:01,420 --> 00:02:07,940
So that, you know, everybody can learn from our work.
37
00:02:07,940 --> 00:02:12,480
So today we'll be going through five common types of bugs
38
00:02:12,480 --> 00:02:14,800
that we find in a specific framework that we'll talk
39
00:02:14,800 --> 00:02:17,780
about a bit later and how to find those bugs.
40
00:02:17,780 --> 00:02:21,780
So this is kind of a small shocker bug that I want
41
00:02:21,780 --> 00:02:26,660
to quickly present to show you how important this auditing
42
00:02:26,660 --> 00:02:28,200
process can be for blockchain systems.
43
00:02:28,200 --> 00:02:31,980
So this was an Ethereum project that because
44
00:02:31,980 --> 00:02:35,620
of this one line basically crumbled on itself.
45
00:02:35,620 --> 00:02:37,140
This wasn't a hack per se.
46
00:02:37,140 --> 00:02:38,900
It wasn't like an attacker stealing money or something.
47
00:02:38,900 --> 00:02:42,920
It was just one line that made the whole project collapse
48
00:02:42,920 --> 00:02:45,400
on itself and everybody that had put money
49
00:02:45,400 --> 00:02:48,840
into the project just basically lost everything.
50
00:02:49,200 --> 00:02:52,760
And the code was brand new, unaudited.
51
00:02:52,760 --> 00:02:56,160
The developers said, "Guys, please don't put your money in yet.
52
00:02:56,160 --> 00:02:58,640
We want to, you know, finish up stuff."
53
00:02:58,640 --> 00:03:02,640
And people still put way too much money in there
54
00:03:02,640 --> 00:03:04,720
and basically lost everything.
55
00:03:04,720 --> 00:03:08,480
So yeah, just because of this one line, which is an overflow
56
00:03:08,480 --> 00:03:11,280
in a multiplication, that made it so that the developers
57
00:03:11,280 --> 00:03:15,260
or I mean the community lost control over the governance
58
00:03:15,260 --> 00:03:18,660
of the contract and yeah, made it impossible to recover.
59
00:03:18,860 --> 00:03:21,920
Everybody lost funds.
60
00:03:21,920 --> 00:03:27,520
So as an attacker, what can you gain from blockchains?
61
00:03:27,520 --> 00:03:32,260
The first obvious way is just like stealing funds.
62
00:03:32,260 --> 00:03:35,940
If you are able to find some kind of a bug that allows you
63
00:03:35,940 --> 00:03:39,420
to steal funds from one address or a contract or whatever,
64
00:03:39,420 --> 00:03:42,760
you can just take those funds or these assets,
65
00:03:42,760 --> 00:03:46,980
put them on an exchange, exchange them for real money
66
00:03:46,980 --> 00:03:51,480
and then, you know, walk away with your gains.
67
00:03:51,480 --> 00:03:55,920
Then the other way that we'll also be looking at today
68
00:03:55,920 --> 00:03:58,680
is that if you are able to mess with the availability
69
00:03:58,680 --> 00:04:03,200
of the chain or, you know, mess with people's expectations
70
00:04:03,200 --> 00:04:05,960
of what the project should act like,
71
00:04:05,960 --> 00:04:09,000
then you can diminish the overall value of the chain.
72
00:04:09,000 --> 00:04:11,240
And if as an attacker you knew that in advance
73
00:04:11,240 --> 00:04:13,800
and you shorted the token in some way,
74
00:04:14,080 --> 00:04:18,060
then you can also gain some money this way
75
00:04:18,060 --> 00:04:20,680
and this actually might be even harder to trace
76
00:04:20,680 --> 00:04:23,800
than the first way.
77
00:04:23,800 --> 00:04:28,460
There are a few other ways an attacker can gain money
78
00:04:28,460 --> 00:04:29,780
from attacking blockchains.
79
00:04:29,780 --> 00:04:32,140
We are not going to cover them today, but these include,
80
00:04:32,140 --> 00:04:34,800
for example, DeFi attacks, so decentralized finance.
81
00:04:34,800 --> 00:04:38,780
Also, you know, attacking the underlying IT infrastructure,
82
00:04:38,780 --> 00:04:42,460
which, you know, can happen of course.
83
00:04:42,460 --> 00:04:44,500
Social engineering, which has happened a lot
84
00:04:44,500 --> 00:04:45,940
in the past couple of years.
85
00:04:45,940 --> 00:04:48,240
And yeah, also just, you know,
86
00:04:48,240 --> 00:04:55,020
a rock pool from the developers' financial scams.
87
00:04:55,020 --> 00:05:01,980
So yeah, we'll first be giving you an intro
88
00:05:01,980 --> 00:05:03,500
of these blockchains.
89
00:05:03,500 --> 00:05:09,220
Then we'll explain the five types of bugs
90
00:05:09,220 --> 00:05:11,100
that we wanted to outline to you today.
91
00:05:11,100 --> 00:05:13,340
These are not exhaustive, it's just five types
92
00:05:13,340 --> 00:05:14,820
that we find interesting and that we think
93
00:05:14,820 --> 00:05:18,180
that you might enjoy learning about.
94
00:05:18,180 --> 00:05:21,260
We'll be showing you examples of real world bugs
95
00:05:21,260 --> 00:05:23,940
that we found in the past couple of years.
96
00:05:23,940 --> 00:05:26,500
And then we'll show you how we can use fuzzing
97
00:05:26,500 --> 00:05:30,220
to actually find those bugs proactively and effectively.
98
00:05:30,220 --> 00:05:33,500
And yeah, go ahead, Gabi.
99
00:05:33,500 --> 00:05:34,980
Thank you.
100
00:05:34,980 --> 00:05:37,620
So today we are going to focus on the latest blockchain
101
00:05:37,620 --> 00:05:41,260
technology, which is called the third generation.
102
00:05:41,260 --> 00:05:44,700
But let's just quickly go back and check the other two ones.
103
00:05:44,700 --> 00:05:48,140
So the first generation, it's the Bitcoin.
104
00:05:48,140 --> 00:05:50,460
Basically, you all know it.
105
00:05:50,460 --> 00:05:55,140
It allows you to transfer assets from one party to the other.
106
00:05:55,140 --> 00:05:57,420
And compared with the other two generations,
107
00:05:57,420 --> 00:06:01,380
it has quite a simplicity, let's say.
108
00:06:01,380 --> 00:06:03,500
Also, currently there are not too many bugs
109
00:06:03,500 --> 00:06:05,500
that are being found in Bitcoin.
110
00:06:05,500 --> 00:06:08,420
And probably this is also because it's quite simple,
111
00:06:08,420 --> 00:06:09,980
let's say.
112
00:06:09,980 --> 00:06:12,300
Then the second generation came out
113
00:06:12,300 --> 00:06:15,100
and it introduced the concept of smart contracts.
114
00:06:15,100 --> 00:06:19,460
So basically now you are able to execute code
115
00:06:19,460 --> 00:06:20,500
on top of the blockchain.
116
00:06:20,500 --> 00:06:24,260
So you can write your contracts, your agreements,
117
00:06:24,260 --> 00:06:26,580
and they are going to be executed and stored
118
00:06:26,580 --> 00:06:27,980
in the blockchain.
119
00:06:27,980 --> 00:06:30,300
This also introduces the possibility
120
00:06:30,300 --> 00:06:32,180
of creating business logic.
121
00:06:32,180 --> 00:06:34,420
So basically, companies actually started
122
00:06:34,420 --> 00:06:38,460
to develop themselves on the blockchain.
123
00:06:38,460 --> 00:06:40,120
Now, the idea with the second generation
124
00:06:40,120 --> 00:06:42,540
is that you have the smart contracts that are all
125
00:06:42,540 --> 00:06:44,780
being run on the same core.
126
00:06:44,780 --> 00:06:48,180
The third generation comes out and says, OK,
127
00:06:48,180 --> 00:06:52,300
instead of having one core and a bunch of smart contracts,
128
00:06:52,300 --> 00:06:56,460
let's empower the developers to actually create
129
00:06:56,460 --> 00:07:00,980
their own blockchains so they can define the core themselves.
130
00:07:00,980 --> 00:07:04,580
And in this case, basically, we are
131
00:07:04,580 --> 00:07:08,220
going to end up with a bunch of smaller blockchains,
132
00:07:08,220 --> 00:07:11,660
each one of them targeting a specific use case.
133
00:07:11,660 --> 00:07:14,420
But now the question is, how do you make all of them
134
00:07:14,420 --> 00:07:19,100
communicate with each other and actually being an ecosystem?
135
00:07:19,100 --> 00:07:21,340
So the third generation also introduces
136
00:07:21,340 --> 00:07:25,940
the interoperability so all of these smaller blockchains
137
00:07:25,940 --> 00:07:29,580
can communicate with each other.
138
00:07:29,580 --> 00:07:34,380
Also, there are multiple frameworks
139
00:07:34,380 --> 00:07:37,860
that are built on the third generation.
140
00:07:37,860 --> 00:07:42,340
And today, we are actually going to focus on one of them.
141
00:07:42,340 --> 00:07:45,020
And it is called Substrate.
142
00:07:45,020 --> 00:07:48,300
And we are going to focus on it because basically, we have--
143
00:07:48,300 --> 00:07:50,460
our experience is the most with Substrate.
144
00:07:50,460 --> 00:07:54,020
So it's just easier for us to give you real-life examples
145
00:07:54,020 --> 00:07:56,100
of bugs and attacks.
146
00:07:56,100 --> 00:07:59,380
But all the things that we are going to present you here
147
00:07:59,380 --> 00:08:02,980
can be applied to other blockchains as well.
148
00:08:02,980 --> 00:08:04,520
The thing that is building Substrate,
149
00:08:04,520 --> 00:08:07,580
they are also running two blockchains, Polkadot
150
00:08:07,580 --> 00:08:08,260
and Kusama.
151
00:08:08,260 --> 00:08:12,740
And probably a lot of you know more about Polkadot
152
00:08:12,740 --> 00:08:15,660
than the name of Substrate, let's say.
153
00:08:15,660 --> 00:08:19,260
But besides these two projects, in the ecosystem,
154
00:08:19,260 --> 00:08:23,460
there are another 150 projects that are using the framework.
155
00:08:23,460 --> 00:08:27,020
So basically, now we are faced with the research question
156
00:08:27,020 --> 00:08:32,300
on how do we actually make sure that all these 150 projects are
157
00:08:32,300 --> 00:08:33,820
actually secure?
158
00:08:33,820 --> 00:08:37,460
And how can we automate this in a way?
159
00:08:37,460 --> 00:08:40,800
Because at this scale, basically, you
160
00:08:40,800 --> 00:08:44,300
need to automate as much as possible.
161
00:08:44,300 --> 00:08:47,900
Let's have a quick look at the architecture of Substrate.
162
00:08:47,900 --> 00:08:51,620
It has all the usual components like peer-to-peer networking,
163
00:08:51,620 --> 00:08:53,940
RPC, telemetry, and so on.
164
00:08:53,940 --> 00:08:59,180
But today, we are going to focus on the WASM runtime, which
165
00:08:59,180 --> 00:09:03,700
basically, it's the core of the blockchain.
166
00:09:03,700 --> 00:09:07,660
And in Substrate-- basically, this runtime,
167
00:09:07,660 --> 00:09:10,580
it's being built using modules.
168
00:09:10,580 --> 00:09:14,060
These modules in Substrate are being called palettes.
169
00:09:14,060 --> 00:09:15,520
Throughout the presentation, we're
170
00:09:15,520 --> 00:09:17,180
going to try to use the term "modules"
171
00:09:17,180 --> 00:09:20,780
so we don't introduce too many new terms for you.
172
00:09:20,780 --> 00:09:24,460
And the idea is that, basically, when a developer wants
173
00:09:24,460 --> 00:09:30,340
to create a blockchain, they can either use--
174
00:09:30,340 --> 00:09:32,980
like Cherry Pick, actually-- a bunch of these palettes
175
00:09:32,980 --> 00:09:35,900
that are already provided by Substrate.
176
00:09:35,900 --> 00:09:37,500
So you can choose your consensus.
177
00:09:37,500 --> 00:09:39,460
You can choose if your blockchain
178
00:09:39,460 --> 00:09:42,140
will be able to run smart contracts or not,
179
00:09:42,140 --> 00:09:44,380
randomness, and so on.
180
00:09:44,380 --> 00:09:46,220
And on top of this, you are going to come up
181
00:09:46,220 --> 00:09:50,760
with your own modules that are going to bring, basically,
182
00:09:50,760 --> 00:09:53,420
your own business logic.
183
00:09:53,420 --> 00:09:58,820
OK, so now, let's just quickly look, actually--
184
00:09:58,820 --> 00:10:02,060
I suppose all of you came here for seeing
185
00:10:02,060 --> 00:10:03,180
the attacks and the bugs.
186
00:10:03,180 --> 00:10:06,100
So let's just dive into that.
187
00:10:06,100 --> 00:10:07,660
Yeah, let's go.
188
00:10:07,660 --> 00:10:10,260
So we'll be looking at five major classes of bugs
189
00:10:10,260 --> 00:10:12,060
that we've defined today.
190
00:10:12,060 --> 00:10:17,300
So bug type A would be wrongly priced transactions.
191
00:10:17,300 --> 00:10:20,660
So if a transaction doesn't have the right gas associated
192
00:10:20,660 --> 00:10:22,660
with it, then maybe we can exhaust the resources
193
00:10:22,660 --> 00:10:26,900
of the chain, causing some kind of a denial of service.
194
00:10:26,900 --> 00:10:30,420
Bug type B is-- we're going to look at logic bugs
195
00:10:30,420 --> 00:10:33,100
and unsafe arithmetic to manipulate the actual program
196
00:10:33,100 --> 00:10:33,820
flow.
197
00:10:33,820 --> 00:10:36,900
This will hinder, of course, the integrity of the chain,
198
00:10:36,900 --> 00:10:39,980
because you might be able to tweak a number that you weren't
199
00:10:39,980 --> 00:10:41,380
supposed to be able to tweak.
200
00:10:41,380 --> 00:10:44,420
But as we'll see, it can also impact availability,
201
00:10:44,420 --> 00:10:48,140
because those numbers might be associated with availability,
202
00:10:48,140 --> 00:10:50,420
the numbers that you tweak.
203
00:10:50,420 --> 00:10:52,940
Bug type C will be looking at the reachable panics.
204
00:10:52,940 --> 00:10:55,980
This is a very rust-specific bug type
205
00:10:55,980 --> 00:10:59,020
that we'll be taking a look at.
206
00:10:59,020 --> 00:11:03,140
And bug type D, encourage usage of standard patterns,
207
00:11:03,140 --> 00:11:08,020
so basically misconfigurations in the blockchain code,
208
00:11:08,020 --> 00:11:10,880
because we said that there were quite a lot of things
209
00:11:10,880 --> 00:11:11,580
you could import.
210
00:11:11,580 --> 00:11:14,140
And if you import stuff with the wrong configuration,
211
00:11:14,140 --> 00:11:19,180
then you might be vulnerable to any kind of misbehavior.
212
00:11:19,180 --> 00:11:21,340
And bug type E will be looking at storage bloating.
213
00:11:21,340 --> 00:11:24,260
So that's like inserting a whole lot of data
214
00:11:24,260 --> 00:11:29,100
into the blockchain storage and cause some availability
215
00:11:29,100 --> 00:11:31,740
mishaps.
216
00:11:31,740 --> 00:11:34,780
So first, wrongly priced transactions.
217
00:11:34,780 --> 00:11:38,740
The idea here is that operations on those substrate-based
218
00:11:38,740 --> 00:11:41,500
blockchains are benchmarked.
219
00:11:41,500 --> 00:11:44,780
And then the benchmark time basically
220
00:11:44,780 --> 00:11:50,740
is translated into a gas fee that you
221
00:11:50,740 --> 00:11:54,500
have to pay in order to run the operation on the network.
222
00:11:54,500 --> 00:11:56,900
So whenever I want to run an operation A,
223
00:11:56,900 --> 00:12:00,260
it has an associated gas fee of N.
224
00:12:00,260 --> 00:12:03,180
And I have to pay N in order to run A.
225
00:12:03,180 --> 00:12:06,780
And if A was not well benchmarked,
226
00:12:06,780 --> 00:12:08,980
then I might be able to spam it.
227
00:12:08,980 --> 00:12:13,860
And then the node that tries to run the whole block
228
00:12:13,860 --> 00:12:17,020
might just not finish running it in time,
229
00:12:17,020 --> 00:12:23,060
because it estimated how much time it would need beforehand.
230
00:12:23,060 --> 00:12:25,580
And if it wrongly estimated because the benchmark was
231
00:12:25,580 --> 00:12:29,860
wrong, then you might be able to make it basically--
232
00:12:29,860 --> 00:12:32,040
it's not a timeout, but at least you're
233
00:12:32,040 --> 00:12:34,100
going to slow the whole thing down and maybe cause
234
00:12:34,100 --> 00:12:39,820
some people to be blamed for slowing it down.
235
00:12:39,820 --> 00:12:42,800
That were not you.
236
00:12:42,800 --> 00:12:47,220
So I'm going to talk about a very cool bug that
237
00:12:47,220 --> 00:12:49,500
is related to what I just mentioned,
238
00:12:49,500 --> 00:12:51,800
but not exactly what I just mentioned.
239
00:12:51,800 --> 00:12:53,980
Because this bug that we found--
240
00:12:53,980 --> 00:12:56,420
I mean, our fuzzer found it, actually--
241
00:12:56,420 --> 00:13:01,740
it applies not during the running of the actual operation,
242
00:13:01,740 --> 00:13:05,300
but during the computing of the weight of the gas
243
00:13:05,300 --> 00:13:06,620
cost of the function.
244
00:13:06,620 --> 00:13:11,100
So you can see on the left, this is the gas computation
245
00:13:11,100 --> 00:13:14,180
of an operation that's called sudo as.
246
00:13:14,180 --> 00:13:19,940
And this sudo as takes, as an argument, another operation
247
00:13:19,940 --> 00:13:23,700
to run as sudo, to run as root.
248
00:13:23,700 --> 00:13:28,060
And of course, this sudo as can only be run by, for example,
249
00:13:28,060 --> 00:13:30,300
a governance call.
250
00:13:30,300 --> 00:13:31,740
It cannot be run just by anybody.