-
Notifications
You must be signed in to change notification settings - Fork 1
Wanted: Security Audit of Key Rotation Semantics #3
Copy link
Copy link
Open
Labels
help wantedExtra attention is neededExtra attention is neededsecuritySecurity review or vulnerabilitySecurity review or vulnerability
Description
TRAIL DIDs use EdDSA (Ed25519) with JSON Canonicalization Scheme (JCS). We need a security review of:
- Key rotation mechanism - How agents update their verification methods without breaking existing trust chains.
- Revocation propagation timing - How fast does a revoked key become untrusted across the network?
- Recovery scenarios - Compromised agent key, compromised registry key, partial network partition.
Threat model:
- Malicious agent impersonation
- Registry compromise
- MITM during DID resolution
- Replay attacks with stale DID documents
If you have cryptographic protocol review experience, this is a high-impact contribution.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
help wantedExtra attention is neededExtra attention is neededsecuritySecurity review or vulnerabilitySecurity review or vulnerability