Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    DeFiance CEO warns Middle East escalation could further hit supply chains

    March 21, 2026

    Finalized no. 34 | Ethereum Foundation Blog

    March 21, 2026

    Iran’s central bank stacked $507M USDT last year, report

    March 21, 2026
    Facebook X (Twitter) Instagram
    Ai Crypto TimesAi Crypto Times
    • Altcoins
      • Bitcoin
      • Coinbase
      • Litecoin
    • Blockchain
    • Crypto
    • Ethereum
    • Lithosphere News Releases
    X (Twitter) Instagram YouTube LinkedIn
    Ai Crypto TimesAi Crypto Times
    Home » Secured #3: Security Teams | Ethereum Foundation Blog

    Secured #3: Security Teams | Ethereum Foundation Blog

    Michael JohnsonBy Michael JohnsonMarch 21, 2026No Comments6 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Over the past year, the Ethereum Foundation has significantly grown its team of dedicated security researchers and engineers. Members have joined from a variety of backgrounds ranging from cryptography, security architecture, risk management, exploit development as well as having worked on red and blue teams. The members come from different fields and have worked on securing everything from the internet services we all depend on each day, to national healthcare systems and central banks.

    As The Merge approaches, a lot of effort from the team is spent analyzing, auditing and researching the Consensus Layer in various ways as well as The Merge itself. A sample of the work is found below.

    Client Implementation Audits 🛡️

    Team members audit the various client implementations with a variety of tools and techniques.

    Automated Scans 🤖

    Automated scans for codebases aim to catch low hanging fruit such as dependency vulnerabilities (and potential vulnerabilities) or improvement areas in code. Some of the tools being used for static analysis are CodeQL, semgrep, ErrorProne and Nosy.

    As there are many different languages used between the clients, we use both generic and language specific scanners for the codebases and images. These are interconnected through a system that analyzes and reports new findings from all tools into relevant channels. These automated scans make it possible to quickly get reports about issues that potential adversaries are likely to easily find, thus increasing the chance of fixing issues before they can be exploited.

    Manual Audits 🔨

    Manual audits of components of the stack are also an important technique. These efforts include auditing critical shared dependencies (BLS), libp2p, new functionality in hardforks (eg. sync committees in Altair), a thorough audit into a specific client implementation, or auditing L2s and bridges.

    Additionally, when vulnerabilities are reported via the Ethereum Bug Bounty Program, researchers can cross-check issues against all clients to see if they are also affected by the reported issue.

    Third Party Audits 🧑‍🔧

    At times, third party firms are engaged to audit various components. Third party audits are used to get external eyes on new clients, updated protocol specifications, upcoming network upgrades, or anything else deemed high-value.

    During third party audits, software developers and our team’s security researchers collaborate with the auditors to educate and assist throughout.

    Fuzzing 🦾

    There are many ongoing fuzzing efforts led by our security researchers, members of client teams, as well as contributors in the ecosystem. The majority of tooling is open source and runs on dedicated infrastructure. The fuzzers target critical attack surfaces such as RPC handlers, state transition and fork-choice implementations, etc. Additional efforts include Nosy Neighbor (AST based auto fuzz harness generation) which is CI based and built off of the Go Parser library.

    Network level simulation and testing 🕸️

    Our team’s security researchers build and utilize tools to simulate, test, and attack controlled network environmets. These tools can quickly spin up local and external testnets (“attacknets”) running under various configurations to test exotic scenarios that clients must be hardened against (eg. DDOS, peer segregation, network degradation).

    Attacknets provide an efficient and safe environment to quickly test different ideas/attacks in a private setting. Private attacknets cannot be monitored by potential adversaries and allow us to break things without disrupting the user experience of public testnets. In these environments, we regularly utilize disruptive techniques such as thread pausing and network partitioning to further expand the scenarios.

    Client and Infrastucture Diversity Research 🔬

    Client and infrastructure diversity has received a lot of attention from the community. We have tools in place to monitor the diversity from a client, OS, ISP and crawler statistics. Additionally we analyze network participation rates, attestation timing anomalies and general network health. This information is shared across multiple locations to highlight any potential risks.

    Bug Bounty Program 🐛

    The EF currently hosts two bug bounty programs; one targeting the Execution Layer and another targeting the Consensus Layer. Members of the security team monitor incoming reports, work to verify their accuracy and impact, and then cross-check any issues against other clients. Recently, we published a disclosure of all previously reported vulnerabilities.

    Soon, these two programs will be merged into one, the general platform will be improved, and additional rewards will be provided for bounty hunters. Stay tuned for more information on this soon!

    Operational Security 🔒

    Operational Security encompasses many efforts at the EF. For example, asset monitoring has been setup which continually monitor infrastructure and domains for known vulnerabilities.

    Ethereum Network Monitoring 🩺

    A new Ethereum network monitoring system is being developed. This system works similar to a SIEM and is built to listen to and monitor the Ethereum network for pre-configured detection rules as well as dynamic anomaly detection that scans for outlier events. Once in place, this system will provide early warnings about network disruptions in progress or coming up.

    Threat Analysis 🩻

    Our team conducted a threat analysis focuse on The Merge to identify areas that can improved with respect to security. Within this work, we collected and audited security practices for Code Reviews, Infrastructure Security, Developer Security, Build Security (DAST, SCA and SAST built into CI, etc.), Repository Security, and more from the client teams. Additionally this analysis surveyed how to prevent misinformation, from which disasters may strike, and how the community might recover in various scenrios. Some efforts related to disaster recovery exercises are also of interest.

    Ethereum Client Security Group 🤝

    As The Merge approaches, we formed a security group that consists of members of client teams working on both the Execution Layer and the Consensus Layer. This group will meet regularly to discuss matters related to security such as vulnerabilities, incidents, best practices, on-going security work, suggestions, etc.

    Incident Response 🚒

    Blue Team efforts help bridge the gap between the Execution Layer and the Consensus Layer as The Merge moves closer. War rooms for incident response has worked well in the past where chats would spring up with relevant people during incidents, but with The Merge comes new complexity. Further work is being done to (for example) share tooling, create additional debug and triage capabilities and create documentation.

    Thank you and get involved 💪

    These are some of the efforts currently taking place in various forms, and we’re looking forward to share even more with you in the future!

    If you think you’ve found a security vulnerability or any bug, please submit a bug report to the execution layer or consensus layer bug bounty programs! 💜🦄





    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Michael Johnson

    Related Posts

    Finalized no. 34 | Ethereum Foundation Blog

    March 21, 2026

    Ethereum Foundation Report | Ethereum Foundation Blog

    March 21, 2026

    Secured #4: Bug Bounty Rewards now up to $250,000 USD

    March 21, 2026

    Comments are closed.

    Don't Miss

    DeFiance CEO warns Middle East escalation could further hit supply chains

    Crypto March 21, 2026

    DeFiance Capital CEO Arthur warns that Middle East tensions and possible action around Iran’s Kharg…

    Finalized no. 34 | Ethereum Foundation Blog

    March 21, 2026

    Iran’s central bank stacked $507M USDT last year, report

    March 21, 2026

    FBI and Thai police freeze $580m in crypto in cross-border fraud raid

    March 21, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Our Picks

    Lithic AI Provider Standard Enables Interoperable AI Infrastructure

    March 20, 2026

    LSCL Launches with Pre-Audited AI Modules for Secure Smart Contract Development

    March 19, 2026

    Lithic’s Budget and Cost Accounting Model Establishes Framework for Programmable AI Economics

    March 18, 2026

    Lithic Introduces zk-Verifiable AI Execution Standard (LEP100-5)

    March 17, 2026

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Demo
    • Popular
    • Recent
    • Top Reviews

    Here’s why Virtuals Protocol (VIRTUAL) price is pumping

    January 20, 2026

    Good Tokens Scales Blockchain and AI-Driven Initiatives to Support Global Impact Programs

    January 20, 2026

    Everclear launches cross-chain asset settlement on Mantle, enabling 60-second wETH-to-mETH swaps

    January 21, 2026

    DeFiance CEO warns Middle East escalation could further hit supply chains

    March 21, 2026

    Finalized no. 34 | Ethereum Foundation Blog

    March 21, 2026

    Iran’s central bank stacked $507M USDT last year, report

    March 21, 2026
    Latest Galleries
    [latest_gallery cat="all" number="5" type="slider"]
    Latest Reviews
    Demo
    Top Posts

    KaJ Labs Unveils Ecosystem Alignment Strategy to Strengthen AI and Web3 Integration

    March 14, 20261 Views

    KaJ Labs Unveils Lithic Developer Stack for AI Applications, Games, and Enterprise Systems

    March 14, 20261 Views

    Lithic AI Provider Standard Enables Interoperable AI Infrastructure

    March 20, 20260 Views

    LSCL Launches with Pre-Audited AI Modules for Secure Smart Contract Development

    March 19, 20260 Views
    Don't Miss

    DeFiance CEO warns Middle East escalation could further hit supply chains

    Crypto March 21, 2026

    DeFiance Capital CEO Arthur warns that Middle East tensions and possible action around Iran’s Kharg…

    Finalized no. 34 | Ethereum Foundation Blog

    March 21, 2026

    Iran’s central bank stacked $507M USDT last year, report

    March 21, 2026

    FBI and Thai police freeze $580m in crypto in cross-border fraud raid

    March 21, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Demo
    Top Posts

    Centrifuge price explodes as CFG trading goes live on Upbit

    March 15, 20262 Views

    Trillion Dollar Security – Phase 2

    March 16, 20261 Views

    Protocol Update 002 – Scale Blobs

    March 16, 20261 Views

    Bitcoin price above $73k as Iran war, oil shock and Fed bets fuel risk-on mood

    March 15, 20261 Views
    Don't Miss

    DeFiance CEO warns Middle East escalation could further hit supply chains

    Crypto March 21, 2026

    DeFiance Capital CEO Arthur warns that Middle East tensions and possible action around Iran’s Kharg…

    Finalized no. 34 | Ethereum Foundation Blog

    March 21, 2026

    Iran’s central bank stacked $507M USDT last year, report

    March 21, 2026

    FBI and Thai police freeze $580m in crypto in cross-border fraud raid

    March 21, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    X (Twitter) Instagram YouTube LinkedIn
    Our Picks

    DeFiance CEO warns Middle East escalation could further hit supply chains

    March 21, 2026

    Finalized no. 34 | Ethereum Foundation Blog

    March 21, 2026

    Iran’s central bank stacked $507M USDT last year, report

    March 21, 2026
    Recent Posts
    • DeFiance CEO warns Middle East escalation could further hit supply chains
    • Finalized no. 34 | Ethereum Foundation Blog
    • Iran’s central bank stacked $507M USDT last year, report
    • FBI and Thai police freeze $580m in crypto in cross-border fraud raid
    • Secured #3: Security Teams | Ethereum Foundation Blog
    © 2026 - 2026

    Type above and press Enter to search. Press Esc to cancel.