Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: adding Rafiki's First Security Audit blog post #95

Merged
merged 11 commits into from
Oct 25, 2024

Conversation

mkurapov
Copy link
Contributor

@mkurapov mkurapov commented Oct 20, 2024

Changes

Adds blog post for Rafiki's security audit.
Original draft.

@mkurapov mkurapov changed the title adding Rafiki's First Security Audit blog post feat: adding Rafiki's First Security Audit blog post Oct 20, 2024

At the beginning of the year, we were in contact with a security and penetration testing company to do an audit of Rafiki. Even though the software is still in its early stages, it is essential to gather feedback early to build a strong foundation for the software's security. The primary goals of the assessment were to evaluate several Rafiki components: the GraphQL Admin APIs, the frontend Admin UI component, as well as our underlying ILPv4 protocol.

The assessment was done using Rafiki’s local playground, based on the Open Source Security Testing Methodology Manual (OSSTMM) and Open Source Web Application Security Project (OWASP) methodologies. Given all of the source code for Rafiki and the local playground is readily available, this was deemed as a “crystal-box” test, meaning all of the source code, endpoints, architecture, etc. was known in-advance to the testers.
Copy link
Contributor

@BlairCurrey BlairCurrey Oct 23, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

maybe add links for OSSTMM and OWASP and "crystal -box"?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

edited the section a bit, removed reference to crystal box since it didn't really involve the testers going deep into the code and testing branching logic etc

@mkurapov mkurapov force-pushed the mk/rafikis-first-security-audit branch from e0af7bf to 462c944 Compare October 23, 2024 11:50
@mkurapov mkurapov force-pushed the mk/rafikis-first-security-audit branch from 462c944 to 120ef7c Compare October 23, 2024 11:54
@mkurapov mkurapov force-pushed the mk/rafikis-first-security-audit branch from 7cffe45 to efc03fe Compare October 23, 2024 12:00
- audit
---

At the beginning of the year, we were in contact with a security and penetration testing company to do an audit of Rafiki. Even though the software is still in its early stages, it is essential to gather feedback early to build a strong foundation for the software's security. The primary goals of the assessment were to evaluate several Rafiki components: the GraphQL Admin APIs, the frontend Admin UI component, as well as our underlying [ILPv4 protocol](https://interledger.org/developers/get-started/). The assessment was done using Rafiki’s local playground, based on the [Open Source Security Testing Methodology Manual (OSSTMM)](https://www.isecom.org/research.html) and [Open Source Web Application Security Project (OWASP)](https://owasp.org/) methodologies.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Didn't we also get our Open Payments implementation tested or did that happen afterwards?


At the beginning of the year, we were in contact with a security and penetration testing company to do an audit of Rafiki. Even though the software is still in its early stages, it is essential to gather feedback early to build a strong foundation for the software's security. The primary goals of the assessment were to evaluate several Rafiki components: the GraphQL Admin APIs, the frontend Admin UI component, as well as our underlying [ILPv4 protocol](https://interledger.org/developers/get-started/). The assessment was done using Rafiki’s local playground, based on the [Open Source Security Testing Methodology Manual (OSSTMM)](https://www.isecom.org/research.html) and [Open Source Web Application Security Project (OWASP)](https://owasp.org/) methodologies.

![Inspected ILP Packet](/developers/img/blog/2024-10-25/results.png)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You should update the alt text here 😉

![Results of the assessment](/developers/img/blog/2024-10-25/results.png)

The audit presented eight vulnerabilities in total. However, two items were not applicable to us:
Two items were not applicable to us:
Copy link
Contributor

@njlie njlie Oct 25, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

extreme nit: "two of the eight items..." might be good to reinforce the context of what the reader is looking at but it's not blocking to me

@mkurapov mkurapov merged commit 9eed069 into main Oct 25, 2024
1 check passed
@mkurapov mkurapov deleted the mk/rafikis-first-security-audit branch October 25, 2024 14:10
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants