If you discover a security vulnerability in the Norn Protocol, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, please email security concerns to: security@norn.to
- Description of the vulnerability
- Steps to reproduce
- Potential impact assessment
- Suggested fix (if you have one)
- Acknowledgment: Within 48 hours
- Initial assessment: Within 1 week
- Fix and disclosure: Coordinated with reporter, typically within 30 days
The following are in scope:
- Consensus safety violations (double-spend, equivocation bypass)
- Cryptographic weaknesses (key derivation, signature verification, hash collisions)
- Fraud proof bypass or suppression
- Wallet keystore vulnerabilities (key extraction, password bypass)
- Denial of service against validator nodes
- P2P network attacks (eclipse, partition)
- Testnet-only functionality (faucet endpoint, dev mode)
- Social engineering attacks
- Issues in dependencies (report upstream, but let us know)
We appreciate responsible disclosure. Security researchers who report valid vulnerabilities will be acknowledged in release notes (unless anonymity is preferred).
| Version | Supported |
|---|---|
| 0.3.x | Yes |
| 0.2.x | Yes |
| 0.1.x | No |
Norn's security model is documented in the Protocol Specification and White Paper. Key properties:
- Ed25519 signatures (via
ed25519-dalek) for all authentication - BLAKE3 for hashing and key derivation
- Argon2id with per-wallet random salt for keystore encryption
- XChaCha20-Poly1305 for authenticated encryption
- Zero
unsafeblocks across the entire codebase - Fraud proofs as the economic security mechanism