#41985 [BC-Insight] Using the test keyring backend is insecure

Submitted on Mar 19th 2025 at 19:34:52 UTC by @KlosMitSoss for Attackathon | Movement Labs

  • Report ID: #41985

  • Report Type: Blockchain/DLT

  • Report severity: Insight

  • Target: https://github.com/immunefi-team/attackathon-movement/tree/main/protocol-units/da/movement/

  • Impacts:

Description

Brief/Intro

The "test" keyring backend stores keys in plaintext which means that it is insecure.

Vulnerability Details

Using a "test" keyring backend is not safe for production as it stores keys in plaintext. When handling real private keys, it is recommended to use a more secure keyring backend like "file" or "os".

Hence, a different keyring backend should be used for these two instances:

https://github.com/immunefi-team/attackathon-movement/blob/a2790c6ac17b7cf02a69aea172c2b38d2be8ce00/protocol-units/da/movement/protocol/celestia-runners/src/celestia_light/mainnet.rs#L21

https://github.com/immunefi-team/attackathon-movement/blob/a2790c6ac17b7cf02a69aea172c2b38d2be8ce00/protocol-units/da/movement/protocol/setup/src/common/celestia.rs#L77

Impact Details

The "test" keyring backend stores keys in plaintext which is not secure.

References

References are provided throughout the report.

Proof of Concept

Proof of Concept

According to the Celestia docs, there are multiple keyring backends that could be used instead: https://docs.celestia.org/how-to-guides/celestia-app-vesting#optional-change-your-client-toml

Was this helpful?