Gizatech
AVS Security Audit
June 30, 2025

SUMMARY
ID
DESCRIPTION
STATUS
PROTOCOL-LEVEL CONSIDERATIONSCRITICAL SEVERITYHIGH SEVERITYMEDIUM SEVERITYLOW SEVERITYCENTRALIZATION ISSUESOTHER / ADVISORY ISSUES
P1
Optimistic User Op Submission
acknowledged
P2
Malicious/Compromised Tools
acknowledged
C1
Request forgery
open
C2
Privilege escalation through Docker container name
open
C3
User-ops can execute arbitrary actions
acknowledged
C4
Tools can submit user-ops on behalf of users that did not invoke the tool
open
H1
Insecure leader election
open
H2
Insecure Peer Authorisation
open
H3
blocked_peers has unbounded size
open
H4
Insufficient DoS protections
open
H5
TaskMetadata messages are unauthenticated
open
M1
Use of non-finalized block number
open
M2
Auth challenges can be removed by a third-party peer
open
L1
Incorrect usage of _packValidationData in GizaValidator
open
L2
Incorrect SemVer Parsing
open
L3
Incorrect object access in Swarm Handler
open
L4
Use of String type for Addresses
open
L5
Race Condition on Challenge Generation
open
L6
Auth Manager hardcodes Chain for ChainReader
info
N1
Manual Slashing
open
A1
UTF-8 Collisions
info
A2
Use of DefaultHasher for MessageID
info
A3
Redundant Storage Maps in GizaToolRegistry
info
A4
Leader election is not weighted by stake
info
A5
Optimisation of get_active_operators
info
A6
handle_auth_response always returns true
info
A7
Duplicate tracking of gossipsub peers
info
A8
Typos
info
A9
Condition is always true in GizaToolRegistryWorker::initialize
info
A10
Docker image files can be cleaned immediately after install
info
ABSTRACT
Dedaub was commissioned to perform a security audit of Giza Protocol’s AVS (Actively Validated Service). The audit found a number of critical, high and medium vulnerabilities, as well as a few high level protocol considerations for any user wanting to interact with the system, and one centralisation issue.