GGP 0011: Minimum Curation Amount for Indexing Rewards Eligibility
GGP: 0011 Scope: RewardsManager contract Created: 2022-05-07 GIPs-Repo-Latest-Commit: 7f427b25a84391032e15193e323997e37967eb75
GIPs
GIP: 0030 Title: Minimum Curation Amount for Indexing Rewards Eligibility Authors: Ricky Esclapon ricky@edgeandnode.com, Craig Tutterow craig@edgeandnode.com Created: 2022-04-19 Stage: Candidate Discussions-To: https://forum.thegraph.com/t/gip-0030-minimum-curation-amount-for-indexing-rewards-eligibility/3290
Abstract
To mitigate economic security risks to the protocol, we propose initializing a new protocol parameter: minimum_signal, to an amount of 500 GRT in order for a subgraph to become eligible for receiving indexing rewards. We present a sensitivity analysis that indicates that a minimum curation parameter will make the proof of indexing spoofing attack identified in the protocol’s OpenZeppelin security audit unprofitable under specified economic conditions.
Motivation
The OpenZeppelin audit identified an economic attack vector (C02) wherein a dishonest Indexer could:
- Minimize self-staking to reduce value at risk of slashing.
- Maximize self-delegation, which is eligible for receiving indexing rewards without slashing risk.
- Forego infrastructure and labor costs of indexing by spoofing PoIs, thereby taking on slashing risk while claiming indexing rewards.
Prysm Group, a team of economists specializing in mechanism design and game theory, received a grant from The Graph Foundation to develop a model and conduct an analysis of the viability of this strategy, as well as develop recommendations for mitigating the risk of such an attack. Edge & Node data scientists subsequently performed a numerical and sensitivity analysis to extend the Prysm models and identify values for protocol parameters that are capable of preventing this attack under different economic circumstances.
References
- The OpenZeppelin Audit (Issue C02) provided a qualitative description of the proof of indexing spoofing attack.
- Prysm Group was contracted to develop a formal model and design a mechanism to protect against such an attack: Initial Analysis of PoI Spoofing Attack Viability, PoI Spoofing Profitability Model and Analysis.
- Development work for implementing the minimum curation signal protocol parameter was completed in December and subsequently audited, but establishing a value that would prevent the attack required further analysis based on the Prysm Group models. See: Github PR for graphprotocol/contracts.
- Edge & Node Data Science did a parameter search based on the Prysm analysis. This was presented in slides on the March 31 Core Dev call and code for the analysis can be found in the notebook here.
- Implementations: https://github.com/graphprotocol/contracts/pull/528/
Graph Governance Proposal-0011
This proposal is to upgrade The Graph’s protocol smart contracts running on Ethereum mainnet with the changes described in Graph Improvement Proposal (GIP) 0030, including the motivation and scope of the changes described in this proposal.
The code deployed that implements GIP-0030 must correspond to the commit hash included in the front matter of this governance proposal.
Following a successful “yes” vote, the protocol upgrade should be carried out at the earliest convenience using The Graph Council’s Gnosis Multisig. Following the upgrade, the Council should subsequently set the minimum_signal parameter to 500 GRT, as proposed in the GIP.
| Voter | Cast Power | Vote & Rationale |
|---|---|---|
0xd201...0722aA | 1 | Yes |
0xB02c...6b80b0 | 1 | Yes |
0x38FA...8d4Da8 | 1 | Yes |
0x1711...Ee2C21 | 1 | Yes |
VOTE POWER
Proposal Status
- Sat May 07 2022, 01:05 pmVoting Period Starts
- Sat May 14 2022, 03:00 pmEnd Voting Period
Current Results
1-Yes
4
