Skip to content

Fw opsec#142

Closed
mattaereal wants to merge 9 commits intodevelopfrom
fw_opsec
Closed

Fw opsec#142
mattaereal wants to merge 9 commits intodevelopfrom
fw_opsec

Conversation

@mattaereal
Copy link
Copy Markdown
Collaborator

First re-structuring. Nothing fancy. It's a draft, and I'll possibly re-write it entirely.

@vercel
Copy link
Copy Markdown

vercel Bot commented May 29, 2025

The latest updates on your projects. Learn more about Vercel for Git ↗︎

Name Status Preview Comments Updated (UTC)
frameworks ✅ Ready (Inspect) Visit Preview 💬 Add feedback May 29, 2025 8:45pm

@github-actions
Copy link
Copy Markdown

Hi @mattaereal,

Following typos were found in the pull request:

  • 📄 ./src/operational-security/device-endpoint-security/README.md:
    1. validator
  • 📄 ./src/operational-security/core-opsec-principles.md:
    1. offboarding
  • 📄 ./src/operational-security/web3-specific-opsec/README.md:
    1. Validator
    2. validators
  • 📄 ./src/operational-security/data-protection/README.md:
    1. exfiltration
  • 📄 ./src/operational-security/network-communication/README.md:
    1. RPC
  • 📄 ./src/operational-security/cloud-third-party/README.md:
    1. SaaS
    2. SaaS
  • 📄 ./src/operational-security/human-centered-security/travel-security.md:
    1. hotspots
  • 📄 ./src/operational-security/human-centered-security/social-engineering-defense.md:
    1. onboarding
  • 📄 ./src/operational-security/human-centered-security/personal-opsec.md:
    1. linkability
    2. doxing
  • 📄 ./src/operational-security/human-centered-security/detecting-and-mitigating-insider-threats.md:
    1. Ronin
    2. validator
    3. validator
    4. Terpin's
    5. Ronin
    6. Ronin
  • 📄 ./src/ens/smart-contract-integration.md:
    1. ghadi
    2. resolvability
    3. upgradeability
    4. upgradeable
  • 📄 ./src/ens/interface-compliance.md:
    1. ghadi
    2. EIP
    3. fallbacks
    4. resolvers
    5. resolvers
    6. resolvers
    7. Resolvers
    8. resolvers
    9. EIP
    10. EIP
    11. programmatically
    12. ENSIPs
    13. ENSIPs
    14. ENSIP
    15. ENSIPs
    16. ENSIPs
    17. ENSIPs
    18. ENSIP
    19. ENSIPs
    20. Implementers
    21. ENSIPs
  • 📄 ./src/ens/data-integrity-verification.md:
    1. ghadi
    2. mainnet
    3. RPC
  • 📄 ./src/ens/cross-chain-compatibility.md:
    1. ghadi
    2. Cointype
    3. cointype
    4. EVM
    5. cointypes
    6. ENSIP
    7. cointype
    8. cointype
    9. CCIP
    10. CCIP
    11. EIP
    12. fallbacks
    13. CCIP
    14. CCIP
    15. EIP
    16. resolvers
    17. CCIP
  • 📄 ./src/ens/README.md:
    1. ghadi
    2. cointype
    3. CCIP
  • 📄 ./src/ens/name-handling-normalization.md:
    1. ghadi
    2. ENSIP
    3. namehash
    4. labelhash
    5. ENSIP
    6. adraffy
    7. ENSIP
    8. namehash
    9. labelhash
    10. ENSIP
    11. confusable
    12. ENSIP
    13. confusables
    14. ZWJ
    15. UTS
    16. ZWJ

ℹ️ Here's how to fix them:

  • Fix typos: Open the relevant files and fix any identified typos.
  • Update wordlist: If a flagged word is actually a project-specific term add it to wordlist.txt in the project root.
    Each word should be listed on a separate line. Learn more.
  • 🚧 Remember:
    • When adding new words it MUST NOT have any spaces or special characters within or around it.
    • wordlist is NOT case sensitive.
    • Use backticks to quote code variables so as to not bloat the wordlist.


## Web3-Specific Travel Security

1. Use hardware wallets for storing crypto assets and keep them physically secure
Copy link
Copy Markdown
Contributor

@ElliotFriedman ElliotFriedman May 29, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommend not traveling with hardware wallets if they are not needed throughout duration of travel

2. Be cautious about revealing cryptocurrency holdings or involvement in high-value projects
3. Consider using duress passwords or accounts if traveling to high-risk regions
4. Be aware of targeted attacks at crypto conferences and events
5. Establish specific protocols for transaction approvals while traveling
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommend reducing as much access to wallets as possible during travel

The goal of social engineering defense is not just to prevent specific attacks but to build organizational resilience:

1. Foster a security culture where questioning unusual requests is encouraged, not penalized
2. Develop and practice "security skepticism" as a valued trait
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
2. Develop and practice "security skepticism" as a valued trait
2. Develop and practice "security skepticism" as a valued trait. Always question and be aware of the limits of the organization's current security measures

2. Classify these assets based on value and criticality to operations
3. Implement appropriate security controls based on risk levels
4. Regularly audit security practices and adapt to emerging threats

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

possible add:

  1. Understand wallet risk levels based on frequency of signing and public profile

3. Use password managers to maintain strong, unique passwords across services
4. Enable full-disk encryption on all personal devices
5. Install and maintain reputable security software

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  1. Check system settings, enabling security features where necessary

This section covers the following aspects of Web3-specific operational security:

1. [Wallet Security](./wallet-security.md) - Securing cryptocurrency and NFT wallets
2. [Smart Contract Operational Security](./smart-contract-opsec.md) - Operational considerations for deploying and managing smart contracts
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I can't seem to find this file on dev or this branch

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

just realized this branch is a draft

@mattaereal
Copy link
Copy Markdown
Collaborator Author

I am still rethinking all of these. I probably will commit to an entire restructuring because there's something that seems a little bit off to me. This is not how I place Opsec in my mind right now.

I'll post here a new structure and ask what you and others think!

@mattaereal
Copy link
Copy Markdown
Collaborator Author

I'm closing this PR since this was already merged along with other PR/push to dev.

@ElliotFriedman, if you want, you can send these suggestions as a separate PR directly to develop, otherwise, I'll try to manually update them myself later

@mattaereal mattaereal closed this Jul 10, 2025
@mattaereal mattaereal deleted the fw_opsec branch August 25, 2025 17:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants