IBC security #6974
Unanswered
tdnguyenND
asked this question in
Q&A
IBC security
#6974
Replies: 1 comment
-
For future readers |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hi everyone
I'm researching IBC and wondering how IBC ensure security cross chain.
As fas as I understand in IBC model, relayer will track transaction in source chain and perform an IBC transaction (IBC receive or IBC acknowldege) in destination chain. Then, dest chain can verify the packet using its palyload and proof, which will basically produce a merkle tree, which root must be equal to consensus root (which is tracked by light client) -> This is quite clear to me. However, the consensus root is assigned to
AppHash
in message update client, which is not be validated at all (Dest chain only validate the commit & signatures of validators) -> So how does IBC ensure that theAppHash
, or theConsensus root
is correct? Hacker can use a correct commitment proof along with a fakeAppHash
, then he can send any packet he wants?Beta Was this translation helpful? Give feedback.
All reactions