{"id":6435,"date":"2024-12-22T18:51:25","date_gmt":"2024-12-22T17:51:25","guid":{"rendered":"https:\/\/wsj-crypto.com\/?p=6435"},"modified":"2024-12-22T18:51:25","modified_gmt":"2024-12-22T17:51:25","slug":"fortifying-ethereum-insights-from-security-teams","status":"publish","type":"post","link":"https:\/\/wsj-crypto.com\/index.php\/2024\/12\/22\/fortifying-ethereum-insights-from-security-teams\/","title":{"rendered":"Fortifying Ethereum: Insights from Security Teams"},"content":{"rendered":"\n<div id=\"\">\n<p class=\"chakra-text css-gi02ar\">Throughout the previous year, the Ethereum Foundation has markedly expanded its team of committed security analysts and engineers. New members have joined from diverse backgrounds that include cryptography, security architecture, risk assessment, exploit development, as well as experience working on both red and blue teams. These individuals hail from various domains and have focused on securing everything from the internet services we rely on daily to national healthcare infrastructures and central banking systems.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">As The Merge approaches, considerable effort from the team is devoted to examining, auditing, and researching the Consensus Layer in multiple ways, alongside The Merge itself. A representation of the work is presented below.<!-- --><\/p>\n<p><!-- --><\/p>\n<h2 class=\"chakra-heading css-1w54o5f\" id=\"client-implementation-audits-\ufe0f\">Client Implementation Audits \ud83d\udee1\ufe0f<!-- --><\/h2>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Team members conduct audits on the various client implementations employing a range of tools and methodologies.<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"automated-scans\">Automated Scans \ud83e\udd16<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Automated scans of codebases focus on identifying easily detectable issues such as dependency vulnerabilities (and possible vulnerabilities) or areas for enhancement in the code. Some of the static analysis tools utilized include CodeQL, semgrep, ErrorProne, and Nosy.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Considering the variety of languages employed across the clients, we utilize both generic and language-specific scanners for the codebases and images. These are interconnected through a system that processes and reports new discoveries from all tools into pertinent channels. These automated scans facilitate the rapid generation of reports regarding problems that potential adversaries are likely to identify easily, thereby enhancing the likelihood of resolving issues before they can be exploited.<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"manual-audits\">Manual Audits \ud83d\udd28<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Manual audits of stack components represent another critical technique. These initiatives encompass auditing essential shared dependencies (BLS), libp2p, new features in hard forks (e.g., sync committees in Altair), a comprehensive inquiry into a specific client implementation, or examining L2s and bridges.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Furthermore, when vulnerabilities are reported via the <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"https:\/\/bounty.ethereum.org\/\">Ethereum Bug Bounty Program<!-- --><\/a>, researchers can verify issues against all clients to ascertain if they are similarly impacted by the reported problem.<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"third-party-audits\">Third Party Audits \ud83e\uddd1\u200d\ud83d\udd27<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Occasionally, third-party firms are enlisted to evaluate various components. Third-party audits are conducted to obtain external assessments on new clients, updated protocol specifications, forthcoming network enhancements, or anything else recognized as high-value.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">During third-party audits, software developers and our security researchers collaborate with the auditors to provide education and assistance throughout the process.<!-- --><\/p>\n<p><!-- --><\/p>\n<h2 class=\"chakra-heading css-1w54o5f\" id=\"fuzzing\">Fuzzing \ud83e\uddbe<!-- --><\/h2>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Numerous ongoing fuzzing initiatives are being led by our security researchers, client team members, and contributors within the ecosystem. Most of the tools are open source and operate on dedicated infrastructure. The fuzzers aim at critical attack surfaces such as RPC handlers, state transitions, and fork-choice implementations, amongst others. Additional endeavors include Nosy Neighbor (AST based auto fuzz harness generation), which is CI based and utilizes the Go Parser library.<!-- --><\/p>\n<p><!-- --><\/p>\n<h2 class=\"chakra-heading css-1w54o5f\" id=\"network-level-simulation-and-testing-\ufe0f\">Network level simulation and testing \ud83d\udd78\ufe0f<!-- --><\/h2>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Our security researchers develop and utilize tools to simulate, test, and attack managed network environments. These tools can swiftly create local and external testnets (&#8220;attacknets&#8221;) configured for various scenarios that clients must be fortified against (e.g., DDOS, peer segregation, network degradation).<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Attacknets provide an effective and secure setting to promptly evaluate different concepts\/attacks in a controlled environment. Private attacknets are not observable by potential threats and enable us to experiment without disrupting the user experience of public testnets. In these settings, we frequently use disruptive strategies such as thread pausing and network partitioning to further broaden the scenarios.<!-- --><\/p>\n<p><!-- --><\/p>\n<h2 class=\"chakra-heading css-1w54o5f\" id=\"client-and-infrastucture-diversity-research\">Client and Infrastructure Diversity Research \ud83d\udd2c<!-- --><\/h2>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\"><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"https:\/\/ethereum.org\/en\/developers\/docs\/nodes-and-clients\/client-diversity\/\">Client and infrastructure diversity<!-- --><\/a> has garnered significant attention from the community. We have mechanisms in place to observe diversity from the perspectives of client, OS, ISP, and crawler statistics. Moreover, we analyze network participation rates, timing anomalies in attestations, and overall network health. This data is <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2020\/08\/21\/validated-why-client-diversity-matters\">disseminated<!-- --><\/a> across <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"https:\/\/twitter.com\/sproulM_\/status\/1440512518242197516\">numerous<!-- --><\/a> platforms to underscore any potential threats.<!-- --><\/p>\n<p><!-- --><\/p>\n<h2 class=\"chakra-heading css-1w54o5f\" id=\"bug-bounty-program\">Bug Bounty Program \ud83d\udc1b<!-- --><\/h2>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">The EF currently operates two bug bounty initiatives; one focusing on the <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"https:\/\/bounty.ethereum.org\">Execution Layer<!-- --><\/a> and another on the <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"https:\/\/eth2bounty.ethereum.org\">Consensus Layer<!-- --><\/a>. Security team members oversee incoming reports, validate their accuracy and significance, and then cross-check any concerns against other clients. Recently, we released a disclosure of all <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2022\/03\/09\/secured-no-2\">previously documented vulnerabilities<!-- --><\/a>.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Shortly, these two programs will be consolidated into one, the general platform will be enhanced, and additional incentives will be offered for bounty hunters. Stay tuned for further updates on this matter!<!-- --><\/p>\n<p><!-- --><\/p>\n<h2 class=\"chakra-heading css-1w54o5f\" id=\"operational-security\">Operational Security \ud83d\udd12<!-- --><\/h2>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Operational Security encompasses numerous initiatives at the EF. For instance, asset monitoring has been established to consistently check infrastructure and domains for known vulnerabilities.<!-- --><\/p>\n<p><!-- --><\/p>\n<h2 class=\"chakra-heading css-1w54o5f\" id=\"ethereum-network-monitoring\">Ethereum Network Monitoring \ud83e\ude7a<!-- --><\/h2>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">A new Ethereum network monitoring system is currently under development. This system functions similarly to a <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"https:\/\/en.wikipedia.org\/wiki\/Security_information_and_event_management\">SIEM<!-- --><\/a> and is designed to listen to andmonitor the Ethereum network for pre-defined detection protocols as well as adaptive anomaly identification that examines for abnormal occurrences. Once established, this framework will offer early alerts regarding network disruptions currently underway or impending.<!-- --><\/p>\n<p><!-- --><\/p>\n<h2 class=\"chakra-heading css-1w54o5f\" id=\"threat-analysis\">Threat Evaluation \ud83e\ude7b<!-- --><\/h2>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Our squad executed a threat evaluation centered on The Merge to pinpoint areas that can be enhanced in terms of security. During this effort, we gathered and reviewed security practices related to Code Reviews, Infrastructure Safeguarding, Developer Protection, Build Security (DAST, SCA, and SAST integrated into CI, etc.), Repository Security, and more from the client teams. Moreover, this evaluation examined methods for preventing misinformation, potential disasters, and how the community might recuperate in various scenarios. Some initiatives linked to disaster recovery drills are also of significance.<!-- --><\/p>\n<p><!-- --><\/p>\n<h2 class=\"chakra-heading css-1w54o5f\" id=\"ethereum-client-security-group\">Ethereum Client Protection Group \ud83e\udd1d<!-- --><\/h2>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">As The Merge nears, we established a security group that comprises members from client teams engaged in both the Execution Layer and the Consensus Layer. This group will convene regularly to deliberate on security-related topics such as vulnerabilities, incidents, best practices, ongoing security efforts, recommendations, etc.<!-- --><\/p>\n<p><!-- --><\/p>\n<h2 class=\"chakra-heading css-1w54o5f\" id=\"incident-response\">Incident Management \ud83d\ude92<!-- --><\/h2>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Blue Team initiatives assist in bridging the divide between the Execution Layer and the Consensus Layer as The Merge approaches. War rooms for incident management have proven effective in the past where discussions would emerge with relevant individuals during incidents, but with The Merge introduces new intricacies. Further efforts are being undertaken to (for instance) share tools, develop further debugging and triage capabilities, and generate documentation.<!-- --><\/p>\n<p><!-- --><\/p>\n<h2 class=\"chakra-heading css-1w54o5f\" id=\"thank-you-and-get-involved\">Thank you and participate \ud83d\udcaa<!-- --><\/h2>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">These represent some of the initiatives currently underway in different forms, and we are eager to share even more with you in the future!<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">If you believe you\u2019ve discovered a security vulnerability or any bug, please submit a bug report to the <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"https:\/\/bounty.ethereum.org\/\">execution layer<!-- --><\/a> or <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"https:\/\/ethereum.org\/en\/eth2\/get-involved\/bug-bounty\/\">consensus layer<!-- --><\/a> bug bounty programs! \ud83d\udc9c\ud83e\udd84<!-- --><\/p>\n<\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<br \/><br \/>\n<br \/><a href=\"https:\/\/blog.ethereum.org\/en\/2022\/04\/14\/secured-no-3\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Throughout the previous year, the Ethereum Foundation has markedly expanded its team of committed security analysts and engineers. New members have joined from diverse backgrounds that include cryptography, security architecture, risk assessment, exploit development, as well as experience working on both red and blue teams. These individuals hail from various domains and have focused on<\/p>\n","protected":false},"author":3,"featured_media":5838,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[543],"class_list":{"0":"post-6435","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ethereum","8":"tag-return-a-list-of-comma-separated-tags-from-this-title-secured-3-security-teams-ethereum-foundation-blog"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Fortifying Ethereum: Insights from Security Teams - WSJ-Crypto<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wsj-crypto.com\/index.php\/2024\/12\/22\/fortifying-ethereum-insights-from-security-teams\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fortifying Ethereum: Insights from Security Teams - WSJ-Crypto\" \/>\n<meta property=\"og:description\" content=\"Throughout the previous year, the Ethereum Foundation has markedly expanded its team of committed security analysts and engineers. New members have joined from diverse backgrounds that include cryptography, security architecture, risk assessment, exploit development, as well as experience working on both red and blue teams. These individuals hail from various domains and have focused on\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wsj-crypto.com\/index.php\/2024\/12\/22\/fortifying-ethereum-insights-from-security-teams\/\" \/>\n<meta property=\"og:site_name\" content=\"WSJ-Crypto\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-22T17:51:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2024\/12\/upload_630d77544672a1e0df792c0d71489bd6.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"549\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wsjcrypto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"wsjcrypto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2024\/12\/22\/fortifying-ethereum-insights-from-security-teams\/\",\"url\":\"https:\/\/wsj-crypto.com\/index.php\/2024\/12\/22\/fortifying-ethereum-insights-from-security-teams\/\",\"name\":\"Fortifying Ethereum: Insights from Security Teams - WSJ-Crypto\",\"isPartOf\":{\"@id\":\"https:\/\/wsj-crypto.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2024\/12\/22\/fortifying-ethereum-insights-from-security-teams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2024\/12\/22\/fortifying-ethereum-insights-from-security-teams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2024\/12\/upload_630d77544672a1e0df792c0d71489bd6.jpg\",\"datePublished\":\"2024-12-22T17:51:25+00:00\",\"author\":{\"@id\":\"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7\"},\"breadcrumb\":{\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2024\/12\/22\/fortifying-ethereum-insights-from-security-teams\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wsj-crypto.com\/index.php\/2024\/12\/22\/fortifying-ethereum-insights-from-security-teams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2024\/12\/22\/fortifying-ethereum-insights-from-security-teams\/#primaryimage\",\"url\":\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2024\/12\/upload_630d77544672a1e0df792c0d71489bd6.jpg\",\"contentUrl\":\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2024\/12\/upload_630d77544672a1e0df792c0d71489bd6.jpg\",\"width\":1280,\"height\":549},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2024\/12\/22\/fortifying-ethereum-insights-from-security-teams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wsj-crypto.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fortifying Ethereum: Insights from Security Teams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/wsj-crypto.com\/#website\",\"url\":\"https:\/\/wsj-crypto.com\/\",\"name\":\"WSJ-Crypto\",\"description\":\"Just Another Crypto News Website\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/wsj-crypto.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7\",\"name\":\"wsjcrypto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/wsj-crypto.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g\",\"caption\":\"wsjcrypto\"},\"url\":\"https:\/\/wsj-crypto.com\/index.php\/author\/wsjcrypto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fortifying Ethereum: Insights from Security Teams - WSJ-Crypto","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wsj-crypto.com\/index.php\/2024\/12\/22\/fortifying-ethereum-insights-from-security-teams\/","og_locale":"it_IT","og_type":"article","og_title":"Fortifying Ethereum: Insights from Security Teams - WSJ-Crypto","og_description":"Throughout the previous year, the Ethereum Foundation has markedly expanded its team of committed security analysts and engineers. New members have joined from diverse backgrounds that include cryptography, security architecture, risk assessment, exploit development, as well as experience working on both red and blue teams. These individuals hail from various domains and have focused on","og_url":"https:\/\/wsj-crypto.com\/index.php\/2024\/12\/22\/fortifying-ethereum-insights-from-security-teams\/","og_site_name":"WSJ-Crypto","article_published_time":"2024-12-22T17:51:25+00:00","og_image":[{"width":1280,"height":549,"url":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2024\/12\/upload_630d77544672a1e0df792c0d71489bd6.jpg","type":"image\/jpeg"}],"author":"wsjcrypto","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"wsjcrypto","Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wsj-crypto.com\/index.php\/2024\/12\/22\/fortifying-ethereum-insights-from-security-teams\/","url":"https:\/\/wsj-crypto.com\/index.php\/2024\/12\/22\/fortifying-ethereum-insights-from-security-teams\/","name":"Fortifying Ethereum: Insights from Security Teams - WSJ-Crypto","isPartOf":{"@id":"https:\/\/wsj-crypto.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wsj-crypto.com\/index.php\/2024\/12\/22\/fortifying-ethereum-insights-from-security-teams\/#primaryimage"},"image":{"@id":"https:\/\/wsj-crypto.com\/index.php\/2024\/12\/22\/fortifying-ethereum-insights-from-security-teams\/#primaryimage"},"thumbnailUrl":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2024\/12\/upload_630d77544672a1e0df792c0d71489bd6.jpg","datePublished":"2024-12-22T17:51:25+00:00","author":{"@id":"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7"},"breadcrumb":{"@id":"https:\/\/wsj-crypto.com\/index.php\/2024\/12\/22\/fortifying-ethereum-insights-from-security-teams\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wsj-crypto.com\/index.php\/2024\/12\/22\/fortifying-ethereum-insights-from-security-teams\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/wsj-crypto.com\/index.php\/2024\/12\/22\/fortifying-ethereum-insights-from-security-teams\/#primaryimage","url":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2024\/12\/upload_630d77544672a1e0df792c0d71489bd6.jpg","contentUrl":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2024\/12\/upload_630d77544672a1e0df792c0d71489bd6.jpg","width":1280,"height":549},{"@type":"BreadcrumbList","@id":"https:\/\/wsj-crypto.com\/index.php\/2024\/12\/22\/fortifying-ethereum-insights-from-security-teams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wsj-crypto.com\/"},{"@type":"ListItem","position":2,"name":"Fortifying Ethereum: Insights from Security Teams"}]},{"@type":"WebSite","@id":"https:\/\/wsj-crypto.com\/#website","url":"https:\/\/wsj-crypto.com\/","name":"WSJ-Crypto","description":"Just Another Crypto News Website","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wsj-crypto.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7","name":"wsjcrypto","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/wsj-crypto.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g","caption":"wsjcrypto"},"url":"https:\/\/wsj-crypto.com\/index.php\/author\/wsjcrypto\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts\/6435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/comments?post=6435"}],"version-history":[{"count":2,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts\/6435\/revisions"}],"predecessor-version":[{"id":6437,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts\/6435\/revisions\/6437"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/media\/5838"}],"wp:attachment":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/media?parent=6435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/categories?post=6435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/tags?post=6435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}