FeedProjects
Developers
Settings
🎉 A new chapter begins: Boardroom has joined Agora
Learn more
protocol logo
Explore / Projects
TheGraphCouncil

Proposals

Members

Information

Create Proposal

TheGraphCouncil

ProposalsMembersInformation
Proposal
Back to Proposals
closedEnded 4 years ago · Snapshot (Offchain)

GGP 0011: Minimum Curation Amount for Indexing Rewards Eligibility

By 0xd201...0722aA

GGP: 0011 Scope: RewardsManager contract Created: 2022-05-07 GIPs-Repo-Latest-Commit: 7f427b25a84391032e15193e323997e37967eb75

GIPs

GIP: 0030 Title: Minimum Curation Amount for Indexing Rewards Eligibility Authors: Ricky Esclapon ricky@edgeandnode.com, Craig Tutterow craig@edgeandnode.com Created: 2022-04-19 Stage: Candidate Discussions-To: https://forum.thegraph.com/t/gip-0030-minimum-curation-amount-for-indexing-rewards-eligibility/3290

Abstract

To mitigate economic security risks to the protocol, we propose initializing a new protocol parameter: minimum_signal, to an amount of 500 GRT in order for a subgraph to become eligible for receiving indexing rewards. We present a sensitivity analysis that indicates that a minimum curation parameter will make the proof of indexing spoofing attack identified in the protocol’s OpenZeppelin security audit unprofitable under specified economic conditions.

Motivation

The OpenZeppelin audit identified an economic attack vector (C02) wherein a dishonest Indexer could:

  • Minimize self-staking to reduce value at risk of slashing.
  • Maximize self-delegation, which is eligible for receiving indexing rewards without slashing risk.
  • Forego infrastructure and labor costs of indexing by spoofing PoIs, thereby taking on slashing risk while claiming indexing rewards.

Prysm Group, a team of economists specializing in mechanism design and game theory, received a grant from The Graph Foundation to develop a model and conduct an analysis of the viability of this strategy, as well as develop recommendations for mitigating the risk of such an attack. Edge & Node data scientists subsequently performed a numerical and sensitivity analysis to extend the Prysm models and identify values for protocol parameters that are capable of preventing this attack under different economic circumstances.

References

  • The OpenZeppelin Audit (Issue C02) provided a qualitative description of the proof of indexing spoofing attack.
  • Prysm Group was contracted to develop a formal model and design a mechanism to protect against such an attack: Initial Analysis of PoI Spoofing Attack Viability, PoI Spoofing Profitability Model and Analysis.
  • Development work for implementing the minimum curation signal protocol parameter was completed in December and subsequently audited, but establishing a value that would prevent the attack required further analysis based on the Prysm Group models. See: Github PR for graphprotocol/contracts.
  • Edge & Node Data Science did a parameter search based on the Prysm analysis. This was presented in slides on the March 31 Core Dev call and code for the analysis can be found in the notebook here.
  • Implementations: https://github.com/graphprotocol/contracts/pull/528/

Graph Governance Proposal-0011

This proposal is to upgrade The Graph’s protocol smart contracts running on Ethereum mainnet with the changes described in Graph Improvement Proposal (GIP) 0030, including the motivation and scope of the changes described in this proposal.

The code deployed that implements GIP-0030 must correspond to the commit hash included in the front matter of this governance proposal.

Following a successful “yes” vote, the protocol upgrade should be carried out at the earliest convenience using The Graph Council’s Gnosis Multisig. Following the upgrade, the Council should subsequently set the minimum_signal parameter to 500 GRT, as proposed in the GIP.

Continue Reading
Connect Wallet to Add Note
0
Votes 4
VoterCast PowerVote & Rationale
0xd201...0722aA
1

Yes

0xB02c...6b80b0
1

Yes

0x38FA...8d4Da8
1

Yes

0x1711...Ee2C21
1

Yes

VOTE POWER
0
Connect Wallet
Proposal Status
  • Sat May 07 2022, 01:05 pmVoting Period Starts
  • Sat May 14 2022, 03:00 pmEnd Voting Period
Current Results

1-Yes

4

DocumentationBrandingContact Us
Home
This Project is Currently Disabled

If you would like to enable it, please checkout below.

Boardroom Subscription

Sign up for an individual subscription (access all projects on the platform)

Subscribe
Enable Project

Enable the entire project for every user

Enable Project
Contact Us