Skip to content

Commit 943d1c1

Browse files
committed
feat(actions): add lychee
1 parent 2c98e7e commit 943d1c1

File tree

2 files changed

+81
-18
lines changed

2 files changed

+81
-18
lines changed

.github/workflows/links.yml

Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
name: Links
2+
3+
on:
4+
push:
5+
branches:
6+
- main
7+
pull_request:
8+
branches:
9+
- main
10+
11+
jobs:
12+
linkChecker:
13+
runs-on: ubuntu-latest
14+
permissions:
15+
issues: write
16+
steps:
17+
- name: Restore lychee cache
18+
uses: actions/cache@v4
19+
with:
20+
path: .lycheecache
21+
key: cache-lychee-${{ github.sha }}
22+
restore-keys: cache-lychee-
23+
- uses: actions/checkout@v4
24+
- name: Link Checker
25+
id: lychee
26+
uses: lycheeverse/lychee-action@v2
27+
with:
28+
args: |
29+
--cache
30+
--verbose
31+
--accept '100..=103,200..=299,400,403'
32+
--no-progress
33+
README.md
34+
fail: true
35+
env:
36+
GITHUB_TOKEN: ${{secrets.GITHUB_TOKEN}}
37+
- name: Create Issue From File
38+
if: steps.lychee.outputs.exit_code != 0
39+
uses: peter-evans/create-issue-from-file@v5
40+
with:
41+
title: Link Checker Report
42+
content-filepath: ./lychee/out.md
43+
labels: report, automated issue

README.md

Lines changed: 38 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,7 @@
11
# Awesome TEE Blockchain [![Awesome](https://awesome.re/badge.svg)](https://awesome.re)
22

3+
[![Check Links](https://github.com/dineshpinto/awesome-tee-blockchain/actions/workflows/links.yml/badge.svg)](https://github.com/dineshpinto/awesome-tee-blockchain/actions/workflows/links.yml)
4+
35
A curated list of resources for learning about Trusted Execution Environments (TEEs) and their applications in the blockchain space.
46

57
_Contributions are welcome! See [CONTRIBUTING.md](CONTRIBUTING.md)._
@@ -16,6 +18,7 @@ _Contributions are welcome! See [CONTRIBUTING.md](CONTRIBUTING.md)._
1618
- [CPP](#cpp)
1719
- [C](#c)
1820
- [Others](#others)
21+
- [Major TEE Attacks](#major-tee-attacks)
1922
- [Social Media & Community](#social-media--community)
2023
- [Additional Resources](#additional-resources)
2124

@@ -28,7 +31,6 @@ _Articles, talks and presentations to help you get started with TEEs._
2831
- [What is a Trusted Execution Environment (TEE)? - Halborn](https://www.halborn.com/blog/post/what-is-a-trusted-execution-environment-tee)
2932
- [Trustless Execution Environments - David Atterman](https://omnida.substack.com/p/trustless-execution-environments?r=nvn5c&utm_campaign=post&utm_medium=web&triedRedirect=true)
3033
- [Why trusted execution environments will be integral to proof-of-stake blockchains](https://venturebeat.com/datadecisionmakers/why-trusted-execution-environments-will-be-integral-to-proof-of-stake-blockchains/)
31-
- [Blockchain Privacy and Security in Data Computation](https://www.zkon.xyz/blog/blockchain-privacy-mpc-zk-tee-explained)
3234
- [Blockchain x TEE: Why Various Forefront Projects are Adopting TEE - TOKI](https://medium.com/@tokifinance/blockchain-projects-adapting-tee-bed9550db9c5)
3335
- [4 Ways to Compare Trusted Execution Environments and Zero-Knowledge Proofs](https://oasisprotocol.org/blog/comparing-zkp-tee-privacy)
3436
- [Blockchains in Trusted Execution Environments (TEEs)](https://medium.com/@nadeem.bhati/blockchains-in-trusted-execution-environments-tees-9343b6c3f9e8)
@@ -39,7 +41,7 @@ _Articles, talks and presentations to help you get started with TEEs._
3941
- [Protected Order Flow for Fair Transaction-Ordering in a Profit-Seeking World - Kushal Babel, MEV-SBC 2023](https://youtu.be/v1TkocRScJg)
4042
- [Enabling Cross Chain Transfers Using SGX - Michael Kaplan, Avalanche Summit 2022](https://youtu.be/f2bU55ngO_c)
4143
- [Trusted Execution Environments Meet the Blockchain - Ittay Eyal, Simons Institute 2019](https://youtu.be/J-8RdvvpUzM)
42-
- **Technical Presentations**
44+
- **Presentations**
4345
- [DEVMOS 2024: Dylan Kawalec (Osmosis), 'Building Decentralized Frontends', Modular Summit 2024](https://youtu.be/o1TY6sjMOek)
4446
- [What apps are unlocked by the TEE stack - Xinyuan Sun, Modular Summit 2024](https://x.com/modular_summit/status/1814653436090327161)
4547
- [Parallelized Confidential Computing - Yannik Schrade, Fil Dev Summit 2024](https://youtu.be/k0Uxl71Lj_g)
@@ -55,20 +57,23 @@ _Articles, talks and presentations to help you get started with TEEs._
5557
### Articles
5658

5759
- **Advanced**
60+
- [Block Building inside SGX - Flashbots Writings](https://writings.flashbots.net/block-building-inside-sgx)
61+
- [Running Geth within SGX: Our Experience, Learnings and Code - Flashbots Writings](https://writings.flashbots.net/geth-inside-sgx)
62+
- [SGX-Based Backrunning and Covert Channels - Flashbots Writings](https://writings.flashbots.net/backrunning-private-txs-MPC#sgx-based-backrunning-and-covert-channels)
63+
- [MEV-SGX - A sealed bid MEV auction design - Eth Research](https://ethresear.ch/t/mev-sgx-a-sealed-bid-mev-auction-design/9677)
5864
- [Proprietary binary provisioning within TEEs - fnerdman](https://collective.flashbots.net/t/proprietary-binary-provisioning-within-tees/3394)
5965
- [We call this kernel saunters: How Apple rearranged its XNU core with exclaves - The Register](https://www.theregister.com/2025/03/08/kernel_sanders_apple_rearranges_xnu/)
6066
- [Building Secure Ethereum Blocks on Minimal Intel TDX Confidential VMs - Flashbots Collective](https://collective.flashbots.net/t/building-secure-ethereum-blocks-on-minimal-intel-tdx-confidential-vms/3795)
6167
- [TDX Security For BOB Searchers, Flashbots](https://flashbots.notion.site/TDX-Security-For-BOB-Searchers-aedb060eb75b48a2a5de0e2131c9c7ef)
62-
- [Sirrah: Speedrunning a TEE Coprocessor](https://writings.flashbots.net/suave-tee-coprocessor)
63-
- [Nix + Bazel: Fully reproducible, incremental builds](https://www.tweag.io/blog/2018-03-15-bazel-nix/)
68+
- [Sirrah: Speedrunning a TEE Coprocessor - Flashbots Writings](https://writings.flashbots.net/suave-tee-coprocessor)
69+
- [Nix + Bazel: Fully reproducible, incremental builds - Tweag](https://www.tweag.io/blog/2018-03-15-bazel-nix/)
6470
- [Early Thoughts on Decentralized Root-of-Trust - Flashbots Collective](https://collective.flashbots.net/t/early-thoughts-on-decentralized-root-of-trust/3868)
6571
- [Drawbacks In FHE Blockchain And How TEE Can Help It - Flashbots Collective](https://collective.flashbots.net/t/drawbacks-in-fhe-blockchain-and-how-tee-can-help-it/3642)
66-
- [How Secret Network Uses SGX](https://docs.scrt.network/secret-network-documentation/overview-ecosystem-and-technology/techstack/privacy-technology/intel-sgx/overview)
67-
- [Trusted Execution Environments and the Polkadot Ecosystem](https://polkadot.network/blog/trusted-execution-environments-and-the-polkadot-ecosystem)
68-
- [Intel SGX and Blockchain: The iExec End-to-End Trusted Execution Solution](https://medium.com/iex-ec/iexec-end-to-end-sgx-solution-fee1e63297b2)
69-
- [Blockchains + TEEs Day 1 Summary](https://decentralizedthoughts.github.io/2023-04-09-blockchainsplustees-day1-summary/)
70-
- [Blockchains + TEEs Day 2 Summary](https://decentralizedthoughts.github.io/2023-04-17-blockchainsplustees-day2-summary/)
71-
- [Intel SGX Explained](https://css.csail.mit.edu/6.858/2020/readings/costan-sgx.pdf)
72+
- [How Secret Network Uses SGX - Secret Network](https://docs.scrt.network/secret-network-documentation/overview-ecosystem-and-technology/techstack/privacy-technology/intel-sgx/overview)
73+
- [Intel SGX and Blockchain: The iExec End-to-End Trusted Execution Solution - iExec](https://medium.com/iex-ec/iexec-end-to-end-sgx-solution-fee1e63297b2)
74+
- [Blockchains + TEEs Day 1 Summary - Decentralized Thoughts](https://decentralizedthoughts.github.io/2023-04-09-blockchainsplustees-day1-summary/)
75+
- [Blockchains + TEEs Day 2 Summary - Decentralized Thoughts](https://decentralizedthoughts.github.io/2023-04-17-blockchainsplustees-day2-summary/)
76+
- [Intel SGX Explained - V. Costan and S. Devada (MIT)](https://css.csail.mit.edu/6.858/2020/readings/costan-sgx.pdf)
7277
- [Demystifying SGX — Part 1 - Obscuro Labs](https://medium.com/obscuro-labs/intel-sgx-demystified-757a242682a3)
7378
- **Security**
7479
- [A Survey of Published Attacks on Intel SGX - Nilsson et al. (2020)](https://arxiv.org/abs/2006.13598)
@@ -165,10 +170,6 @@ _Examples of how TEEs are being used or proposed within the blockchain ecosystem
165170
- **Block Building & MEV Mitigation**
166171
- Jito BAM - [Website](https://bam.dev)
167172
- Unichain - [Website](https://www.unichain.org), [Whitepaper](https://docs.unichain.org/whitepaper.pdf)
168-
- [Block Building inside SGX](https://writings.flashbots.net/block-building-inside-sgx)
169-
- [Running Geth within SGX: Our Experience, Learnings and Code](https://writings.flashbots.net/geth-inside-sgx)
170-
- [SGX-Based Backrunning and Covert Channels](https://writings.flashbots.net/backrunning-private-txs-MPC#sgx-based-backrunning-and-covert-channels)
171-
- [MEV-SGX - A sealed bid MEV auction design](https://ethresear.ch/t/mev-sgx-a-sealed-bid-mev-auction-design/9677)
172173
- **Identity**
173174
- Self Protocol - [Website](https://self.xyz), [selfxyz GitHub](https://github.com/selfxyz)
174175
- **Bridging**
@@ -186,14 +187,13 @@ _Examples of how TEEs are being used or proposed within the blockchain ecosystem
186187
- Marlin Protocol - [Website](https://www.marlin.org/), [marlinprotocol GitHub](https://github.com/marlinprotocol)
187188
- Phala Network - [Website](https://phala.network/), [Phala-Network GitHub](https://github.com/Phala-Network)
188189
- Automata Network - [Website](https://ata.network/), [automata-network GitHub](https://github.com/automata-network)
189-
- Clique Network - [Website](https://www.clique.tech), [automata-network GitHub](https://github.com/automata-network)
190+
- Clique Network - [Website](https://www.clique.tech)
190191
- **Privacy & Confidentiality**
191192
- Oasis Protocol - [Website](https://oasisprotocol.org), [oasisprotocol GitHub](https://github.com/oasisprotocol)
192193
- Secret Network - [Website](https://scrt.network), [scrtlabs GitHub](https://github.com/scrtlabs)
193194
- Enclave Markets - [Website](https://www.enclave.market)
194195
- **Rollups & Coprocessors**
195196
- Taiko - [Website](https://taiko.xyz/), [taikoxyz GitHub](https://github.com/taikoxyz)
196-
- Unichain - [Website](https://www.unichain.org)
197197

198198
## Code Repositories
199199

@@ -261,6 +261,27 @@ _Software related to TEEs in the context of blockchain, libraries, and example i
261261
- **TypeScript**
262262
- [tkhq/sdk](https://github.com/tkhq/sdk) - Turnkey TypeScript SDK.
263263

264+
## Major TEE Attacks
265+
266+
_Documented attacks or attack vectors on TEEs. List is WIP._
267+
268+
> **Classes:** **TE** – transient/speculative; **MDS** – microarchitectural data sampling; **FI** – fault injection; **AL** – architectural leakage; **PR** – protocol/design.
269+
270+
| Year | Name | Class | Affected TEEs | CVE(s) | Summary | Key Mitigations |
271+
| ---- | ------------------------------------------ | ----------------- | --------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------- | --------------------------------------------------------------------------------------- |
272+
| 2018 | **Foreshadow / L1TF** | TE | Intel SGX, VMs, OS kernels | [CVE‑2018‑3615](https://nvd.nist.gov/vuln/detail/CVE-2018-3615), [CVE‑2018‑3620](https://nvd.nist.gov/vuln/detail/CVE-2018-3620), [CVE‑2018‑3646](https://nvd.nist.gov/vuln/detail/CVE-2018-3646) | Read enclave/VM/kernel secrets via L1D leaks | Microcode updates, L1D flush on enclave transitions, OS patches, SGX TCB recovery |
273+
| 2018 | **SEVered** | PR / VM isolation | AMD SEV (pre‑SNP) | [1812.01129](https://arxiv.org/abs/1812.01129) | Malicious hypervisor remaps guest pages to exfiltrate plaintext | Move to SEV‑SNP (integrity protection), stronger guest validation |
274+
| 2019 | **MDS family (RIDL, Fallout, ZombieLoad)** | MDS / TE | Intel SGX, VMs | [CVE‑2018‑12126](https://nvd.nist.gov/vuln/detail/CVE-2018-12126), [CVE‑2018‑12127](https://nvd.nist.gov/vuln/detail/CVE-2018-12127), [CVE‑2018‑12130](https://nvd.nist.gov/vuln/detail/CVE-2018-12130), [CVE‑2019‑11091](https://nvd.nist.gov/vuln/detail/CVE-2019-11091) | Leakage from CPU buffers into enclaves/VMs | Microcode buffer clearing, stronger serialization, sometimes disable HT |
275+
| 2019 | **Plundervolt** | FI | Intel SGX | [CVE‑2019‑11157](https://nvd.nist.gov/vuln/detail/CVE-2019-11157) | Software‑controlled undervolting corrupts enclave computation & leaks secrets | Lock MSR undervolt interface (uCode), disable voltage control, protocol‑level FI checks |
276+
| 2019 | **TSX Asynchronous Abort (TAA)** | TE / MDS | Intel SGX, VMs | [CVE‑2019‑11135](https://nvd.nist.gov/vuln/detail/CVE-2019-11135) | Additional transient leaks tied to TSX | Microcode, disable TSX, serialize on transitions |
277+
| 2019 | **SGX-Step** | SC / Tooling | Intel SGX | [1611.06952](https://arxiv.org/abs/1611.06952) | Fine‑grained interrupting boosts side‑channel resolution | Rate‑limit interrupts, constant‑time/data‑oblivious coding |
278+
| 2020 | **Load Value Injection (LVI)** | TE | Intel SGX | [CVE‑2020‑0551](https://nvd.nist.gov/vuln/detail/CVE-2020-0551) | Inject values into victim’s transient path | Compiler‑inserted LFENCEs/serialization; Intel LVI toolchain |
279+
| 2020 | **CacheOut** | MDS / TE | Intel SGX | [CVE‑2020‑0549](https://nvd.nist.gov/vuln/detail/CVE-2020-0549) | Extract data from L1D despite prior mitigations | Stronger L1D flush/serialization; enclave transition hardening |
280+
| 2020 | **CrossTalk** | MDS | Intel SGX | [CVE‑2020‑0543](https://nvd.nist.gov/vuln/detail/CVE-2020-0543) | Cross‑core leakage via shared buffers | Microcode fixes; synchronization/isolation |
281+
| 2022 | **ÆPIC Leak** | AL | Intel SGX | [CVE‑2022‑21233](https://nvd.nist.gov/vuln/detail/CVE-2022-21233) | Architectural leak of stale data via APIC MMIO (no speculation) | Microcode/firmware updates, sanitize APIC reads, kernel patches |
282+
| 2023 | **Downfall / Gather Data Sampling (GDS)** | TE | Intel SGX, VMs | [CVE‑2022‑40982](https://nvd.nist.gov/vuln/detail/CVE-2022-40982) | GATHER instruction leaks vector register data | Microcode; serialization barriers; toolchain guidance |
283+
| 2023 | **Inception / Phantom Speculation** (AMD) | TE | AMD SEV/SNP (indirectly affects CC VMs) | [CVE‑2023‑20569](https://nvd.nist.gov/vuln/detail/CVE-2023-20569) | Speculation attack on Zen CPUs | Microcode/firmware updates; speculation barriers |
284+
264285
## Social Media & Community
265286

266287
_TEEs on social media._
@@ -279,12 +300,11 @@ _TEEs on social media._
279300
- [Flashbots Collective Forum](https://collective.flashbots.net/) - Discussions often touch on TEE usage for MEV mitigation and block building.
280301
- [Confidential Containers Community](https://github.com/confidential-containers/confidential-containers) - Open-source project enabling cloud-native confidential computing by shielding containerized workloads.
281302
- [Confidential Computing Consortium](https://confidentialcomputing.io/) - Linux Foundation project advancing confidential computing.
282-
- [Blockchains + TEEs Workshop](https://blockchainplustees.github.io/) - Academic workshop focused on the intersection of blockchains and TEEs.
283303

284304
## Additional Resources
285305

286306
- [sbellem/qtee](https://github.com/sbellem/qtee) - Exploring the physical limits of trusted hardware in the classical and quantum settings to achieve security through physics.
287307
- [bpradipt/awesome-confidential-computing](https://github.com/bpradipt/awesome-confidential-computing) - Collection of resources on Confidential Computing.
288308
- [erayack/awesome-sgx-blockchain](https://github.com/erayack/awesome-sgx-blockchain) - Awesome SGX and TEE on Blockchain Resources.
289309
- [orbstack/orbstack](https://github.com/orbstack/orbstack) - Fast, light, simple Docker containers & Linux machines.
290-
- [TEE Bible](https://www.tee3.ai/TEE-Bible-Your-First-Stop-for-TEE-in-Crypto-15eacce4724b80d1a13ae894d3927c1d) - Your First Stop for TEE in Crypto
310+
- [TEE Bible](https://www.tee3.ai/TEE-Bible-Your-First-Stop-for-TEE-in-Crypto-15eacce4724b80d1a13ae894d3927c1d) - Your First Stop for TEE in Crypto.

0 commit comments

Comments
 (0)