Security Analysis

Defense in Depth.
Layered Deterrence.

Sequential PoW dependency chains, memory-hard mining, consensus-enforced integer arithmetic, layered bond deterrence, entropy-derived audits, and dual-gate emergency authorization. Security is structural, not promised.

CONSENSUS | 100% integer arithmetic · Zero floating-point
SECTION 01

51% Attack Resistance

Sequential Dependency
CONVERGENCEX

Each ConvergenceX attempt requires 4 GB RAM and 100,000 sequential rounds. Even an attacker with unlimited CPUs cannot speed up a single attempt — parallelism only adds more independent attempts.

PropertyValue
RAM per attempt4 GB (scratchpad)
Rounds per attempt100,000 (strictly sequential)
Intra-attempt parallelismEliminated by state dependency
Inter-attempt parallelismMultiple cores = multiple independent attempts
ASIC advantage estimateLow multiples over modern CPUs
Difficulty adjustmentASERT per-block, stable regardless of hashrate
Key insight: An attacker with 1,000 cores runs 1,000 parallel attempts, not 1,000× faster on a single attempt. The sequential dependency chain is the fundamental defense. As mining becomes profitable, network hashrate grows naturally, continuously raising the attack threshold.
SECTION 02

Bond Deterrence

The bond does not make fraud impossible — it makes it costly. Four layers of deterrence combine to make large-scale systematic fraud economically irrational.

LAYER 1

Financial Bond

Up to 30% of gold value locked as SOST bond. Immediate financial cost on slash. Bond is fully lost and redistributed to PoPC Pool and Gold Vault.

LAYER 2

Reputation Destruction

Permanent record. Stars reset to zero. Future contracts blocked at all levels. Rebuilding reputation requires starting from scratch with 0.5 oz limits.

LAYER 3

Wallet Blacklist

Known fraudulent wallets excluded at the application layer. This is not consensus and does not affect the base chain — it is PoPC policy enforcement.

LAYER 4

Size Limits

New users (0 stars) can only commit 0.5 oz maximum. Large commitments require proven track record (5 stars = max 10 oz). Slow unlock prevents mass fraud.

SECTION 03

Audit & Oracle Resistance

Audit Manipulation Resistance
ENTROPY-DERIVED
PropertyAnalysis
Audit sourceConvergenceX block entropy triple (block_id, commit, checkpoints_root)
PredictabilityNone — depends on 100K-round PoW that hasn't occurred
InfluenceNo party can predict or influence the schedule
Post-audit fraud windowNext random audit within the period (5-30% probability)
Detection costFull bond slash
Continuous custodyHistorical balance sampling at deterministic checkpoints
Oracle Manipulation Resistance
NO ON-CHAIN ORACLE
PropertyAnalysis
Consensus oracle dependencyNone — all consensus uses chain-internal data only
Bond price source7-day TWAP of CEX prices (resistant to single-block manipulation)
Price data roleAdvisory for PoPC bond sizing, not consensus-critical
User consentRequired — user signs exact bond terms before submission
Malicious bulletinUsers simply refuse to sign — no funds at risk
SECTION 04

cASERT Security

Asymmetric Defense
ANTI-WEAPONIZATION

The asymmetric cASERT policy prevents attackers from exploiting difficulty relaxation.

ScenarioSignalcASERT Response
Attacker with high hashrateChain fast (negative signal)NORMAL mode — no relaxation
Genuine hashrate dropChain slow (positive signal)Relaxed stability — liveness preserved
Attacker benefitNone — stability requirements remain at maximum

Relaxed stability is only available when the chain needs help (hashrate dropped), never when an attacker is dominating. This is the correct security trade-off.

SECTION 05

Emergency Procedures

Incident Response
SCENARIO TABLE
ScenarioResponse
Critical bugFoundation pauses new PoPC contracts. Existing contracts continue unaffected.
Exchange hackGold Vault is a cold wallet with no exchange connection. Independent and safe.
XAUT/PAXG issuer riskEmergency Catastrophe: rotate (E1) or liquidate-buy-redistribute (E2). Requires dual gate.
Issuer risk (future only)Foundation redirects future purchases without consensus. Existing assets sealed.
Chain death (90 days)Dead-man switch. 60-day dissolution notice. Reserve stays Heritage if no prior emergency.
Key Hygiene
OPERATIONAL
PracticeDetail
Institutional keysOffline (cold), never on public nodes
Public nodesLow-balance hot wallets, no reserve keys
Address rotationPublished with full traceability and proofs
Wallet encryptionAES-256-GCM + scrypt (N=32768, r=8, p=1)
SECTION 06

Implementation Status

Security Components
CURRENT STATUS
ComponentStatus
Transaction signing (libsecp256k1)Complete
Consensus validation (R1-R14, S1-S12, CB1-CB10)Complete
ASERT + cASERT difficulty (L1-L5, k=4)Complete
Mempool validation and relayComplete
Transaction confirmation in blocksComplete
RPC authentication (--rpc-user/--rpc-pass)Complete
Coinbase maturity filter (1000 blocks)Complete
Dynamic fee calculation (CLI v1.3)Complete
Wallet encryption (AES-256-GCM + scrypt)Complete
P2P DoS protection (ban scoring, peer limits)Complete
Checkpoints + reorg limit (100 blocks)Complete
P2P encryptionPost-launch
SECTION 07

Vulnerability Reporting

Responsible Disclosure
PRIVATE ONLY

Do not open a public issue for security vulnerabilities. Use GitHub's private vulnerability reporting.

ChannelURL
Private vulnerability reportgithub.com/Neob1844/sost-core/security/advisories/new
General issuesgithub.com/Neob1844/sost-core/issues
Scope
IN / OUT
In ScopeOut of Scope
Consensus rule bypassSocial engineering
Private key exposureAttacks requiring physical access
Remote code executionThird-party dependencies (report upstream)
P2P protocol exploitsDenial of service via network flooding
RPC authentication bypassExplorer HTML (client-side only)
Wallet encryption weakness
Response time: Receipt acknowledged within 72 hours. Critical vulnerabilities (consensus bypass, key compromise, remote code execution) are prioritized for immediate fix. A public advisory will be published after the fix is released.
License: SOST Protocol is licensed under the MIT License. The source code is fully open-source and free to use, modify, and distribute. See the LICENSE file for full terms.