NEX Open Source Vulnerabilities
Description
NEX is an open source application which might paves way for any security threat. So, this section helps the user to have some ideas to overcome the issue.
Mitigation Ideas
Maintain a list of "endorsed" deployments (URL list) to capture any unauthorized deployment.
Audit all the code including smart contracts, sites regularly.
PEN Test run in the production environment related to NEX
Response Plan
Alert message the community about the invaders.
Any scope to build API nodes that can blacklist specific services.
Responder Team
In order to find the solution/ to know in details about the risk that has happened, responder team is one to be communicated first.
First Responder Team
If any suspicious activities are observed, the observer can inform about it through any User forum. All the users must be informed about it.
Second Responder Team
Point of contact: DEV OPS, NEX devs
Last updated