LPsLux Proposals
Cryptography
LP-10005

Learning Path - Security & Auditor

Living

System-level threat modeling and security analysis for Lux Network

Type
Meta
Created
2025-12-21

LP-10005: Learning Path - Security & Auditor

Abstract

"How does this break?"

This path provides system-level threat modeling capabilities.

Motivation

Security auditing requires systematic understanding of attack vectors, vulnerability patterns, and defensive practices. This path trains auditors to protect the ecosystem.

Audience

Security auditors, red teams, cryptographers, protocol researchers.

Prerequisites

Complete LP-0011: Core Protocol Path first.

Outcome

After completing this path, you will understand:

  • Cryptographic assumptions and attack surfaces
  • Post-quantum security model
  • MPC trust boundaries
  • ZK verification requirements
  • MEV and ordering attacks

Curriculum

Stage 1: Cryptographic Foundations

OrderLPTitleTimeDepth
1LP-2000Crypto Primitives Overview30 minDeep
2LP-2100Classical Signatures25 minDeep
3LP-2200Post-Quantum Algorithms35 minDeep

Stage 2: PQ Security (Q-Chain)

OrderLPTitleTimeDepth
4LP-0200PQC Suite30 minDeep
5LP-0316ML-DSA25 minDeep
6LP-0317SLH-DSA20 minMedium
7LP-0318ML-KEM25 minDeep

Stage 3: MPC Attack Surfaces (T-Chain)

OrderLPTitleTimeDepth
8LP-7000T-Chain Architecture30 minDeep
9LP-0104FROST Security Model25 minDeep
10LP-0014CGGMP21 Analysis25 minDeep
11LP-0324Ringtail (PQ Threshold)25 minDeep

Stage 4: ZK Trust Boundaries (Z-Chain)

OrderLPTitleTimeDepth
12LP-8000Z-Chain ZKVM30 minDeep
13LP-8100Validity Proofs25 minDeep
14LP-8200Fraud Proofs20 minMedium

Stage 5: Bridge Security (B-Chain)

OrderLPTitleTimeDepth
15LP-6000B-Chain Architecture25 minDeep
16LP-0339Emergency Procedures20 minDeep
17LP-0019Bridge Security Framework30 minDeep

Stage 6: Trading Security

OrderLPTitleTimeDepth
18LP-9024Audit Requirements25 minDeep
19LP-9025MEV & Ordering Attacks30 minDeep
20LP-9017Risk Management20 minMedium

Total Time

~9 hours for complete coverage.


Threat Model Summary

DomainPrimary ThreatsKey LPs
CryptoQuantum attacks, side channelsLP-2xxx, LP-4xxx
MPCMalicious signers, collusionLP-7xxx
ZKProof manipulation, soundnessLP-8xxx
BridgeRelay attacks, oracle manipulationLP-6xxx
TradingMEV, front-running, sandwichLP-9xxx

Security Considerations

None — this is a meta/organizational proposal.

Copyright and related rights waived via CC0.