Close Menu
  • Home
  • News
  • Bitcoin
    • Blockchain
    • Market
  • Opinion
  • Technology
  • All Posts
What's Hot

US Senate Approves GENIUS Stablecoin Legislation, Sending It to the House for Final Approval

Jun. 18, 2025

JPMorgan Chase to Launch Pilot Program

Jun. 18, 2025

JPMorgan Submits ‘JPMD’ Trademark Application, Indicating Potential Stablecoin Launch

Jun. 17, 2025
Facebook X (Twitter) Instagram
Friday, July 4
Crypto Lived
X (Twitter) Telegram
  • Home
  • News
  • Bitcoin
    • Blockchain
    • Market
  • Opinion
  • Technology
  • All Posts
Latest From Tech Button
Crypto Lived
Home ยป How to evaluate the vulnerability dispute between CertiK and Kraken
News

How to evaluate the vulnerability dispute between CertiK and Kraken

By adminOct. 6, 2023No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
How to evaluate the vulnerability dispute between CertiK and Kraken
How to evaluate the vulnerability dispute between CertiK and Kraken
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Title: The Complexities of Bug Disclosure and the Importance of Transparent Processes

Author: Haotian, Independent Researcher

Source: X, @tmel0211

Before the clear legal responsibilities are determined, there will always be different voices questioning the professional ethics of “white hats,” as well as the bug disclosure and bug bounty mechanisms of centralized exchanges. However, this issue is not “new” in the security community:

1) A well-established bug disclosure mechanism is actually a coordinated process between security companies (party B) and their clients (party A) to address issues related to bug discovery, bug fixes, and bug bounties. Only after the bug has been fixed and disclosed to the public does everyone feel satisfied. It is evident that there were coordination issues between Certik and Kraken in this process:
1. The white hat discovers a bug and promptly reports it to the client, providing details about the bug’s type, severity, and how to reproduce it. If the white hat chooses not to disclose the bug, they would be considered a hacker. Since they chose to disclose it to the client, it indicates that their intention is not malicious.
2. The bug is confirmed and assessed for risk. Both the security company and the client acknowledge the bug’s existence, severity, impact, and design a plan for fixing it. This process also involves determining how the bug bounty will be distributed. Otherwise, the client may use the excuse that the bug has already been reported to refuse to pay the corresponding bug bounty, leaving the white hat empty-handed.
3. A bug fix plan is formulated and retested to ensure successful resolution. Typically, the client’s development team and the security company’s technical personnel collaborate to implement the code fix. If the process reaches this stage, it means that both parties have reached a consensus on the “bug severity level and bug bounty arrangements.” Therefore, their shared objective is to promptly fix the bug and then publicly disclose it through a press release, revealing the entire process of bug discovery and joint resolution.

2) Whether Certik is highly regarded or widely criticized in the security industry, it is difficult to conclude based solely on moral judgment. However, if a security company frequently gets involved in controversies, it is likely due to the complexity of the underlying interests and mishandling of those issues.

I communicated with some friends in security companies, and they believe the following might be the process in this case:
1. Certik did discover and report the bug to Kraken, indicating that their intentions were not those of a “hacker.” However, this incident has become a major scandal in the security industry, and the underlying causes and consequences need to be clarified.
2. The account marked as Certik staff’s KYC account only had a balance increase of $4, indicating that the bug testing initially remained within reasonable limits. Regardless of the reasons, the evidence provided by both parties will determine the final verdict. However, it is clear that the boundaries of professional ethics were indeed crossed.
3. It is possible that the bug bounty and bug-fixing collaboration between the two parties did not reach an agreement. Kraken may have rejected giving the corresponding bounty for reasons related to the bug report. As a result, during the bug-fixing period, Certik engaged in a larger-scale “test” as a form of personal retaliation or intentional corporate behavior.

There are various possibilities for disputes in this process, but fundamentally, they are issues related to conflicting interests. The bug disclosure process of centralized exchanges like Kraken is inefficient and lacks transparency, while Certik’s involvement in security vulnerabilities lacks standardization and norms.

In conclusion, the above is only a reasonable speculation, and further disclosure of the results will provide more accurate information. However, the key point of contention between security white hats and centralized organizations lies in the slow response from the central institutions and the lack of transparency in the bug disclosure and fixing processes. This is the focal point that everyone should pay attention to.

This is also the fundamental reason why I previously praised @GoPlusSecurity for building an open, censorship-resistant, user-driven modular security layer. Purely centralized security disputes involve various hidden possibilities. Only a decentralized security service solution can play a role throughout the entire security protection lifecycle, especially in dealing with uncontrollable factors caused by human errors, although this path may be challenging and long, it is necessary.

In the past few years, security auditing services have evolved from a business cooperation model of one project after another. The endorsement controversies, rug scandals after audits, and the ongoing conflicts between parties A and B are all closely related to the lack of information transparency in security services and the complexities of the audit business itself. It is hoped that with the exposure of these issues, the security industry can establish more standardized standards, optimized processes, and professional services.

Regardless, certain security companies may be replaceable, but the sacred image of security guardians must not be compromised. At the same time, the contributions of security white hats should be respected by the market.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

JPMorgan Chase to Launch Pilot Program

Jun. 18, 2025

Eric Trump Expresses Affection for Justin Sun While Denying Involvement in Tron’s Public Debut Strategy

Jun. 17, 2025

Elon Musk’s X Designates Polymarket as Its Official Prediction Market Partner

Jun. 11, 2025
Leave A Reply Cancel Reply

Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Don't Miss
Opinion

US Senate Approves GENIUS Stablecoin Legislation, Sending It to the House for Final Approval

Jun. 18, 2025

Key TakeawaysSenate passes the GENIUS stablecoin bill with bipartisan support, marking first major c…

JPMorgan Chase to Launch Pilot Program

Jun. 18, 2025

JPMorgan Submits ‘JPMD’ Trademark Application, Indicating Potential Stablecoin Launch

Jun. 17, 2025

Eric Trump Expresses Affection for Justin Sun While Denying Involvement in Tron’s Public Debut Strategy

Jun. 17, 2025
About Us
About Us

Crypto Lived brings you the latest cryptocurrency information, covering the latest developments in mainstream digital currencies such as Bitcoin and Ethereum. We provide timely and comprehensive coverage to help you understand the latest trends in the cryptocurrency market.

X (Twitter) Telegram
Our Picks

US Senate Approves GENIUS Stablecoin Legislation, Sending It to the House for Final Approval

Jun. 18, 2025

JPMorgan Chase to Launch Pilot Program

Jun. 18, 2025

JPMorgan Submits ‘JPMD’ Trademark Application, Indicating Potential Stablecoin Launch

Jun. 17, 2025
Most Popular

Research Report on Cryptocurrency Market Sentiment 202405310607 Binance Coin BNB Breaks Historic AllTime High Market Cap Exceeds 100 Billion USD

May. 31, 2024

Recounting the Bitcoin Billionaires Success Stories Unveiling the Secrets of a New Wave of Wealth

Jan. 1, 2023

MicroStrategy’s Bitcoin holdings increase to 450,000 BTC with the addition of 2,530 coins

Jan. 13, 2025
  • Bitcoin
  • Blockchain
  • Market
  • News
  • Opinion
  • Technology
© 2025 Crypto Lived All rights reserved.

Type above and press Enter to search. Press Esc to cancel.