Summary
The decentralized world of Web3 holds vast potential. However, recurrent security breaches have tainted its promise, leading to a loss of user trust and financial resources. Lossless stands as a beacon, providing concrete solutions to this pervasive hack problem and setting the stage for a safer Web3 ecosystem.
Lossless aims to ensure an all-encompassing security infrastructure to Venus Protocol, for Binance Smart Chain and Ethereum, through its active protection product Aegis.
Aegis is a robust, real-time surveillance tool that scans every transaction on the block. Empowered by cutting-edge AI and ML algorithms, Aegis not only pinpoints but also anticipates potential security breaches. Its predictive prowess offers projects the advantage of preemption over merely reactionary measures.
In addition, we are introducing a groundbreaking security solution to enhance asset protection on the Ethereum blockchain, with plans to expand to the Binance Smart Chain very soon. This innovative system utilizes an automated front-running technology, designed to preemptively counteract potential security breaches, safeguarding users’ assets. Without the need of assistance of personnel, the hack will be prevented automatically.
The proposal seeks approval for a budget allocation of $85,000, to be expended on security services over a 12-month period. Payment for these services will be made in XVS tokens. The funds are to be released quarterly, contingent upon approval from the DAO contributors. This structured payment approach ensures ongoing oversight and alignment with the project’s security needs
About Lossless
Website: lossless.io
Twitter: twitter.com/losslessdefi
Lossless is a leading security protocol focused on fund recovery, hack prevention, and enforcing on-chain security. With its advanced product, Aegis, Lossless has achieved remarkable success in preemptively identifying potential hackers, at an average identification time of 15-17 minutes ahead of an exploit. This proactive approach allows for timely interventions to protect assets and prevent unauthorized access.
The company’s expertise and innovative solutions have made it a trusted partner for a diverse range of organizations within the blockchain ecosystem. Currently, Lossless secures the assets of notable protocols such as QuickSwap, Thena Finance, Harmony, Carbon Browser, Unicrypt, ChainGPT, DAO Maker, and SmarDEX, among others. This extensive portfolio underscores Lossless’s capability and commitment to providing security services, ensuring the integrity and safety of its clients’ digital assets.
Other recent milestones by Lossless:
- Partnership with Google Cloud and startup package of up to $350,000 received
- Received a grant from Arbitrum and expanded our technology to their chain
Lossless has a proven track record of fund recoveries and prevention of exploits:
- $16.7M recovered for Cream Finance
- $800K recovered for Vulcan Forged
- $1.26M recovered for AAG Ventures from Harmony bridge hack
- $170K recovered for OneRing from Multichain bridge
- Backtesting Web3 Exploits: Tornado Cash Attack and Ordinals Finance Rug Pull
- Backtesting Web3 Exploits: Revest Finance and Audius
- Backtesting Web3 Exploits: Team Finance and ASKACR
Proposal
Onboarding procedure:
The onboarding procedure for integrating Lossless’s security services with Venus Protocol involves a comprehensive approach designed to establish a robust security framework and ensure seamless communication between both parties. Here’s an overview of the steps involved:
Establish Direct Communication: Initiate a direct line of communication between the Lossless team and Venus Protocol representatives. This step is crucial for facilitating transparent and efficient collaboration throughout the partnership.
Risk Assessment and Infrastructure Mapping: Conduct a thorough assessment to understand potential risks, focusing on significant and sensitive infrastructure components such as tokens, oracles, protocols, and bridges.
Perform a detailed mapping of on-chain structure and assets to identify vulnerabilities and safeguard against potential threats.
Access to Aegis Platform: Provide Venus Protocol team members with access to the Aegis platform. This access will be co-managed by both the client and the Lossless team, fostering a better understanding of the system and ensuring a faster setup process.
Establish key communication channels for real-time alerts and updates regarding security matters.
Standard Operational Procedures (SOPs): Develop SOPs detailing the response times and actions for detected events, with a particular focus on high-risk events, mitigation strategies, and worst-case scenarios.
Outline procedures for requesting improvements to both the security setup and operational protocols, ensuring continuous enhancement of the security framework.
Pre-Incident Measures and Automations: Implement pre-incident measures and automations designed to proactively mitigate risks. This involves defining specific triggers and enabling functionalities like simulations, frontrunning attacks (for preventive purposes), imposing transaction limits, blacklisting malicious actors, and moving funds to secure locations in response to assessed risks.
The objective is to minimize potential damage to the Venus Protocol by preemptively addressing vulnerabilities and threats.
This structured onboarding process aims to establish a comprehensive security posture for Venus Protocol, leveraging Lossless’s expertise in hack prevention and fund recovery to protect against on-chain threats. Through close collaboration and ongoing communication, both parties can achieve a high level of security readiness and resilience against cyber threats.
Monitoring, Alerting & Mitigation Procedures
The Monitoring, Alerting, and Mitigation Procedures between Lossless and Venus Protocol are designed to provide comprehensive security oversight and rapid response capabilities. Here’s a breakdown of the procedures:
Custom Channels Creation: Tailored communication channels will be established based on Venus Protocol’s specific requirements, encompassing both internal and public communication platforms such as email, Telegram, Slack, Discord, SMS, and Webhook. This ensures that alerts and communications are efficiently disseminated across the preferred platforms.
Risk Detection: Utilizing Lossless’s proven risk detection capabilities, basic monitoring will be set up for all key on-chain addresses. The system will issue notifications for High or Critical risk events, as identified by the Lossless risk monitoring tool, ensuring timely awareness and response.
Event Monitoring: Aegis’s capability to monitor detailed events will be harnessed to create customized alert channels and triggers. These will cover a range of specific activities including changes in Total Value Locked (TVL), certain triggered events, function calls, token mints, and transfer thresholds, ensuring comprehensive oversight.
Active Protection: For critical on-chain addresses, active protection measures will be implemented, encompassing automated responses to on-chain triggers and pre-set off-chain rules. This proactive stance aims to prevent unauthorized actions before they can impact the protocol.
Support and Response Times: Lossless provides standard support from Monday to Friday, 10:00 AM to 7:00 PM CEST, with emergency support available in critical scenarios outside these hours. This ensures that Venus Protocol can expect timely assistance and intervention when needed
Passive Protection: In collaboration, Lossless and Venus Protocol will identify and prepare for less sensitive or indirect risks by developing manual playbooks for worst-case scenarios. This strategy aims to balance cost with effectiveness, reducing the likelihood of false alarms while ensuring readiness for genuine threats.
Security application to Venus Protocol products (Ethereum and BNB chains)
- Venus Core pool (including isolated pools)
Offer:
- Create alert channels to notify everyone on suspicious users that could cause harm
- Monitor events and function calls that could signal a smart contract attack
- Front-run incoming hackers and prevent fund loss
- Monitor critical EOAs and/or Multisigs for non-expected transactions and get alerted through diverse channels
- Vaults
Offer:
- Create alert channels to notify everyone on suspicious users that could cause harm
- Monitor events and function calls that could signal a smart contract attack
- Monitor TVL changes of vaults and deposit sizes
- Monitor transfers amounts set by threshold
- Front-run incoming hackers and prevent fund loss
- Swap contracts
Offer:
- Create alert channels to notify everyone on suspicious users that could cause harm
- Monitor events and function calls that could signal a smart contract attack
- Monitor TVL changes of vaults and deposit sizes
- Monitor transfers amounts set by threshold
- Front-run incoming hackers and prevent fund loss
- Bridge
Offer:
- Create alert channels to notify everyone on suspicious users that could cause harm
- Monitor events and function calls that could signal a smart contract attack
- Monitor TVL changes of vaults and deposit sizes
- Monitor transfers amounts set by threshold
- Front-run incoming hackers and prevent fund loss
- Critical EOAs and/or Multisigs
Offer:
- Get alerted when interacting with a suspicious address
- Monitor transfers amounts set by threshold
- Monitor TVL changes of vaults and deposit sizes
- Monitor wallet activity for non-expected transactions
- Create Panic button to hastily transfer funds in case of an attack
- DAO Governance
Offer:
- Monitor addresses interacting with smart contracts and get notified on suspicious users
- Monitor critical events and function calls for unexpected executions
The proposal seeks approval for a budget allocation of $85,000, to be expended on security services over a 12-month period. Payment for these services will be made in XVS tokens. The funds are to be released quarterly, contingent upon approval from the DAO contributors. This structured payment approach ensures ongoing oversight and alignment with the project’s security needs