-
Notifications
You must be signed in to change notification settings - Fork 394
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Better mitigate address poisoning #3769
Comments
Thank you for sharing this vuln! Still processing the overall vector here; a few notes/questions, however:
|
Thank you for your response. I have sent the report to [email protected]. For your questions: Fake ETH contract: 0x0466744Bebc57597774936FB1bc12140ecfC7445. Please check the report in the attachment for screenshots and details |
Appreciate the attention here! But I have to ask... if you think this is an active vulnerability, why in the world would you post it publicly? |
Both the issue title and the report are hyperbolic. Changing the issue title, as address poisoning will always be an issue on standard EVM tooling. After reviewing further, I think we could improve the UX here a bit... but not that much. We can flag address lookalikes as "spam" in the interface and disable the copy button... but they could be valid. We can hide transactions, but we always need users to be able to show these transactions. Perhaps the best mitigation would be showing a warning if someone sends to a lookalike address, similar to what we do sending tokens to smart contracts. |
Discord Discussion Link
No response
What browsers are you seeing the problem on?
Chrome
What were you trying to do?
We have designed and conducted experiments to test whether Taho wallet is vulnerable to address poisoning attacks by simulating the attack against a victim address under our control.
What did not work?
The primary security guarantee that this issue breaks is users’ trust in the transactions displayed on Taho Wallet. Users rely on the transaction history in the "activity" tab to verify past transactions and confirm recipient addresses before sending funds. However, Taho Wallet shortens the addresses in the displayed transaction, which forces the user to rely on the prefix and suffix of an address to differentiate Ethereum addresses. By displaying phishing transactions sent from a “look-alike” address in the "activity" tab, the wallet exposes users to the following risks:
We observed that Taho Wallet displayed zero-ETH,dust-ETH and fake-ETH transfers sent by the ‘look-alike’ address S’, which poses a high risk to the victim and leads the victim to believe that S’ is S. The victim could copy S’ and transfer funds to it, resulting in significant financial loss.
Please find our complete report in the attachment
Taho Wallet Report.pdf
Version
v0.63.1
Relevant log output
The text was updated successfully, but these errors were encountered: