|
| 1 | +# Security Audit Documentation |
| 2 | + |
| 3 | +## Overview |
| 4 | + |
| 5 | +This document describes the security audit status for the solana-mcp-server project and explains the current state of known vulnerabilities. |
| 6 | + |
| 7 | +## Current Security Status |
| 8 | + |
| 9 | +### Known Vulnerabilities (Acceptable Risk) |
| 10 | + |
| 11 | +The following vulnerabilities are present as transitive dependencies from the Solana ecosystem and cannot be easily resolved without breaking compatibility: |
| 12 | + |
| 13 | +#### RUSTSEC-2024-0344: curve25519-dalek Timing Variability |
| 14 | +- **Package**: curve25519-dalek v3.2.0 |
| 15 | +- **Issue**: Timing variability in `Scalar29::sub`/`Scalar52::sub` |
| 16 | +- **Patched Version**: >=4.1.3 |
| 17 | +- **Status**: Both vulnerable (3.2.0) and patched (4.1.3) versions present in dependency tree |
| 18 | +- **Risk Assessment**: Low - This affects cryptographic operations in the Solana client libraries, not our server logic |
| 19 | +- **Mitigation**: We've added curve25519-dalek v4.1.3 as a direct dependency to force the resolver to prefer the secure version |
| 20 | + |
| 21 | +#### RUSTSEC-2022-0093: ed25519-dalek Double Public Key Signing |
| 22 | +- **Package**: ed25519-dalek v1.0.1 |
| 23 | +- **Issue**: Double Public Key Signing Function Oracle Attack |
| 24 | +- **Patched Version**: >=2.0.0 |
| 25 | +- **Status**: Both vulnerable (1.0.1) and patched (2.2.0) versions present in dependency tree |
| 26 | +- **Risk Assessment**: Low - This affects key signing operations in the Solana client libraries, not our server logic |
| 27 | +- **Mitigation**: We've added ed25519-dalek v2.2.0 as a direct dependency to force the resolver to prefer the secure version |
| 28 | + |
| 29 | +### Unmaintained Dependencies (Informational) |
| 30 | + |
| 31 | +#### derivative v2.2.0 |
| 32 | +- **Status**: Unmaintained since 2024-06-26 |
| 33 | +- **Impact**: Used by Solana ecosystem for derive macros |
| 34 | +- **Alternatives**: derive_more, derive-where, educe |
| 35 | +- **Action**: Monitor Solana ecosystem updates |
| 36 | + |
| 37 | +#### paste v1.0.15 |
| 38 | +- **Status**: Unmaintained since 2024-10-07 |
| 39 | +- **Impact**: Used for token pasting in procedural macros |
| 40 | +- **Alternatives**: pastey |
| 41 | +- **Action**: Monitor Solana ecosystem updates |
| 42 | + |
| 43 | +## Security Audit Workflow |
| 44 | + |
| 45 | +Our CI/CD pipeline includes a security audit workflow that: |
| 46 | + |
| 47 | +1. **Runs weekly** and on dependency changes |
| 48 | +2. **Uses cargo-audit** with JSON output for detailed reporting |
| 49 | +3. **Reports all vulnerabilities** found in the dependency tree |
| 50 | +4. **Continues deployment** for known acceptable risks from Solana ecosystem |
| 51 | +5. **Fails builds** for new high-severity vulnerabilities |
| 52 | + |
| 53 | +## Monitoring and Updates |
| 54 | + |
| 55 | +- **Weekly audits** via GitHub Actions detect new vulnerabilities |
| 56 | +- **Dependency updates** are applied when Solana ecosystem releases updates |
| 57 | +- **Security patches** are applied through direct dependencies and patches |
| 58 | +- **Risk assessment** is updated as new vulnerabilities are discovered |
| 59 | + |
| 60 | +## Contact |
| 61 | + |
| 62 | +For security concerns or questions about our audit process, please: |
| 63 | +1. Review this documentation |
| 64 | +2. Check current GitHub Actions audit results |
| 65 | +3. Open an issue for questions about security posture |
| 66 | +4. Contact maintainers for private security disclosures |
0 commit comments