<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>PGDN Network News</title>
        <link>https://paragraph.com/@pgdn</link>
        <description>undefined</description>
        <lastBuildDate>Wed, 22 Apr 2026 01:30:11 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <image>
            <title>PGDN Network News</title>
            <url>https://storage.googleapis.com/papyrus_images/64d626a246661be7813b1e8de21b36de.jpg</url>
            <link>https://paragraph.com/@pgdn</link>
        </image>
        <copyright>All rights reserved</copyright>
        <item>
            <title><![CDATA[Sui Validator Security Benchmark]]></title>
            <link>https://paragraph.com/@pgdn/sui-validator-security-benchmark</link>
            <guid>coIcdcjGx2vwuAtDRfcJ</guid>
            <pubDate>Wed, 24 Sep 2025 09:57:36 GMT</pubDate>
            <description><![CDATA[PGDN is publishing the first consolidated validator security benchmark for Sui. The September 2025 report shows scores across 122 validators, with a median of 45 and 18.5% meeting our good practice threshold. Explore the heatmap, review the Top/Bottom 10, and use our Discord bot to check and rescan your own validator. Transparency + tools = stronger networks.]]></description>
            <content:encoded><![CDATA[<p>Decentralization is only as strong as its validators. Misconfigured or exposed nodes can introduce risks that affect the entire network. That’s why at PGDN we’re publishing <strong>transparent validator security benchmarks</strong> to give operators and communities the tools to improve.</p><p><span data-name="point_right" class="emoji" data-type="emoji"><img src="https://cdn.jsdelivr.net/npm/emoji-datasource-apple/img/apple/64/1f449.png" draggable="false" loading="lazy" align="absmiddle"></span> <strong>Interactive Heatmap</strong>: <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://pgdn.ai/heatmaps/2025-09-sui">https://pgdn.ai/heatmaps/2025-09-sui</a><br><span data-name="point_right" class="emoji" data-type="emoji"><img src="https://cdn.jsdelivr.net/npm/emoji-datasource-apple/img/apple/64/1f449.png" draggable="false" loading="lazy" align="absmiddle"></span> <strong>Full Report</strong>: <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/pgdn-network/pgdn-research/blob/main/reports/2025-09-sui.md">https://github.com/pgdn-network/pgdn-research/blob/main/reports/2025-09-sui.md</a><br><span data-name="point_right" class="emoji" data-type="emoji"><img src="https://cdn.jsdelivr.net/npm/emoji-datasource-apple/img/apple/64/1f449.png" draggable="false" loading="lazy" align="absmiddle"></span> <strong>Research Repo</strong>: <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://pgdn.ai/research/2025-09-research-sui">https://pgdn.ai/research/2025-09-research-sui</a></p><h3 id="h-key-highlights-september-2025" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><span data-name="bar_chart" class="emoji" data-type="emoji"><img src="https://cdn.jsdelivr.net/npm/emoji-datasource-apple/img/apple/64/1f4ca.png" draggable="false" loading="lazy" align="absmiddle"></span> Key Highlights (September 2025)</h3><ul><li><p>Validators scored on a <strong>0–100 scale</strong>.</p></li><li><p>Median score: <strong>45%</strong></p></li><li><p>Highest observed score: <strong>93%</strong></p></li><li><p>Lowest observed score: <strong>15%</strong></p></li><li><p><strong>18.5%</strong> of validators met or exceeded our “good practice” threshold of <strong>70</strong>.</p></li></ul><hr><h3 id="h-top-10-validators-by-score" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><span data-name="trophy" class="emoji" data-type="emoji"><img src="https://cdn.jsdelivr.net/npm/emoji-datasource-apple/img/apple/64/1f3c6.png" draggable="false" loading="lazy" align="absmiddle"></span> Top 10 Validators (by score)</h3><table style="min-width: 698px"><colgroup><col style="width: 411px"><col style="width: 262px"><col></colgroup><tbody><tr><th colspan="1" rowspan="1" colwidth="411"><p><strong>Hostname</strong></p></th><th colspan="1" rowspan="1" colwidth="262"><p><strong>Cohort</strong></p></th><th colspan="1" rowspan="1"><p><strong>Score</strong></p></th></tr><tr><td colspan="1" rowspan="1" colwidth="411"><p>sui-main.astrostakers.com</p></td><td colspan="1" rowspan="1" colwidth="262"><p>validator</p></td><td colspan="1" rowspan="1"><p>93%</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="411"><p>suimain01.chainflow.io</p></td><td colspan="1" rowspan="1" colwidth="262"><p>validator</p></td><td colspan="1" rowspan="1"><p>85%</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="411"><p>sui-validator-mainnet.omnistake.com</p></td><td colspan="1" rowspan="1" colwidth="262"><p>validator</p></td><td colspan="1" rowspan="1"><p>85%</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="411"><p>validator-sui-mainnet.blrd.inc</p></td><td colspan="1" rowspan="1" colwidth="262"><p>validator</p></td><td colspan="1" rowspan="1"><p>85%</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="411"><p>sui-main.everstake.one</p></td><td colspan="1" rowspan="1" colwidth="262"><p>validator</p></td><td colspan="1" rowspan="1"><p>85%</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="411"><p>sui-m-v.bwarelabs.com</p></td><td colspan="1" rowspan="1" colwidth="262"><p>validator</p></td><td colspan="1" rowspan="1"><p>85%</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="411"><p>validator.sui.mainnet.encapsulate.xyz</p></td><td colspan="1" rowspan="1" colwidth="262"><p>validator</p></td><td colspan="1" rowspan="1"><p>85%</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="411"><p>sui-mainnet-validator.sentio.xyz</p></td><td colspan="1" rowspan="1" colwidth="262"><p>validator</p></td><td colspan="1" rowspan="1"><p>80%</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="411"><p>sui.midl.dev</p></td><td colspan="1" rowspan="1" colwidth="262"><p>validator</p></td><td colspan="1" rowspan="1"><p>80%</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="411"><p>mainnet.validator.karrier.one</p></td><td colspan="1" rowspan="1" colwidth="262"><p>validator</p></td><td colspan="1" rowspan="1"><p>80%</p></td></tr></tbody></table><hr><h3 id="h-bottom-10-validators-by-score" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><span data-name="warning" class="emoji" data-type="emoji"><img src="https://cdn.jsdelivr.net/npm/emoji-datasource-apple/img/apple/64/26a0-fe0f.png" draggable="false" loading="lazy" align="absmiddle"></span> Bottom 10 Validators (by score)</h3><table style="min-width: 700px"><colgroup><col style="width: 407px"><col style="width: 268px"><col></colgroup><tbody><tr><th colspan="1" rowspan="1" colwidth="407"><p><strong>Hostname</strong></p></th><th colspan="1" rowspan="1" colwidth="268"><p><strong>Cohort</strong></p></th><th colspan="1" rowspan="1"><p><strong>Score</strong></p></th></tr><tr><td colspan="1" rowspan="1" colwidth="407"><p>sui-mainnet.staketab.com</p></td><td colspan="1" rowspan="1" colwidth="268"><p>validator</p></td><td colspan="1" rowspan="1"><p>15%</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="407"><p>sui-mainnet.nodeinfra.com</p></td><td colspan="1" rowspan="1" colwidth="268"><p>public_rpc</p></td><td colspan="1" rowspan="1"><p>15%</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="407"><p>sui.swiss-staking.ch</p></td><td colspan="1" rowspan="1" colwidth="268"><p>validator</p></td><td colspan="1" rowspan="1"><p>15%</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="407"><p>rbr-1.mainet.sui.io</p></td><td colspan="1" rowspan="1" colwidth="268"><p>validator</p></td><td colspan="1" rowspan="1"><p>15%</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="407"><p>sui-mainnet.overclock.run</p></td><td colspan="1" rowspan="1" colwidth="268"><p>validator</p></td><td colspan="1" rowspan="1"><p>15%</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="407"><p>sui.nodeguardians.io</p></td><td colspan="1" rowspan="1" colwidth="268"><p>validator</p></td><td colspan="1" rowspan="1"><p>15%</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="407"><p>sui-mainnet.n1stake.com</p></td><td colspan="1" rowspan="1" colwidth="268"><p>validator</p></td><td colspan="1" rowspan="1"><p>15%</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="407"><p>sui.manystake.com</p></td><td colspan="1" rowspan="1" colwidth="268"><p>validator</p></td><td colspan="1" rowspan="1"><p>15%</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="407"><p>suimain1.syncnode.ro</p></td><td colspan="1" rowspan="1" colwidth="268"><p>validator</p></td><td colspan="1" rowspan="1"><p>15%</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="407"><p>sui-mainnet-validator.ankr.com</p></td><td colspan="1" rowspan="1" colwidth="268"><p>validator</p></td><td colspan="1" rowspan="1"><p>15%</p></td></tr></tbody></table><hr><h3 id="h-tools-for-validators" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><span data-name="robot" class="emoji" data-type="emoji"><img src="https://cdn.jsdelivr.net/npm/emoji-datasource-apple/img/apple/64/1f916.png" draggable="false" loading="lazy" align="absmiddle"></span> Tools for Validators</h3><p>To make this benchmark actionable, we’ve launched the <strong>PGDN Sentinel Discord Bot</strong>:</p><ul><li><p>Query validator scores directly in Discord</p></li><li><p>Trigger rescans instantly</p></li><li><p>Claim ownership to unlock enhanced analytics</p></li></ul><p><span data-name="point_right" class="emoji" data-type="emoji"><img src="https://cdn.jsdelivr.net/npm/emoji-datasource-apple/img/apple/64/1f449.png" draggable="false" loading="lazy" align="absmiddle"></span> [Add the bot to Discord – invite link]</p><hr><h3 id="h-looking-ahead" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><span data-name="crystal_ball" class="emoji" data-type="emoji"><img src="https://cdn.jsdelivr.net/npm/emoji-datasource-apple/img/apple/64/1f52e.png" draggable="false" loading="lazy" align="absmiddle"></span> Looking Ahead</h3><p>We’ll refresh this dataset every month, building a public archive of validator security benchmarks across multiple protocols. Transparency + tools = stronger decentralized infrastructure.</p>]]></content:encoded>
            <author>pgdn@newsletter.paragraph.com (PGDN)</author>
            <category>sui</category>
            <category>validators</category>
            <category>staking</category>
            <category>blockchainsecurity</category>
            <category>pgdn</category>
            <category>depin</category>
            <category>transparency</category>
            <category>web3infrastructure</category>
        </item>
        <item>
            <title><![CDATA[Validator Slashing Incidents Are a Warning. Sui Could Be Next.
]]></title>
            <link>https://paragraph.com/@pgdn/validator-slashing-incidents-are-a-warning-sui-could-be-next</link>
            <guid>qk3i8PD7f5Cy2uTyQZMl</guid>
            <pubDate>Fri, 12 Sep 2025 10:04:30 GMT</pubDate>
            <description><![CDATA[Recent Ethereum validator slashings at SSV Labs show how fragile staking infra can be when key management slips.

PGDN.ai’s latest scan of Sui reveals something deeper: nearly 40% of validator voting power exposed — not a one-off error, but systemic misconfigurations and poor security hygiene.

Unless addressed, Sui risks far worse than slashing: a full consensus stall that could freeze billions in assets.]]></description>
            <content:encoded><![CDATA[<p><strong>Quick Take</strong></p><ul><li><p>Recent Ethereum validator slashings (via SSV Labs ecosystem) highlight how fragile staking infra can be when key management or security hygiene fails.</p></li><li><p>PGDN.ai’s analysis shows <strong>nearly 40% of Sui validator voting power is exposed</strong> — not from a single mistake, but systemic misconfigurations and poor security practice.</p></li><li><p>Without addressing these weaknesses, Sui risks far worse than slashing: a potential consensus stall affecting billions in assets.</p></li></ul><p>There's a great article about <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.theblock.co/post/370299/ssv-labs-ceo-protocol-not-compromised-validator-slashing-incidents">the slashing incident on The Block</a>.</p><hr><h2 id="h-when-validators-fail-networks-shake" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">When Validators Fail, Networks Shake</h2><p>This week, SSV Labs CEO Alon Muroch reassured the Ethereum staking community after several validators suffered slashing incidents. According to SSV, the protocol itself wasn’t compromised; instead, <strong>external key management errors</strong> by operators triggered the failures.</p><p>The takeaway was clear: even with strong protocol-level design, validator operators remain a weak link. Misconfigurations and operational mistakes can still lead to costly penalties, and reputational damage for the entire network.</p><hr><h2 id="h-suis-hidden-risk-surface" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Sui’s Hidden Risk Surface</h2><p>If slashing from key mismanagement is painful, what PGDN.ai found on Sui is potentially catastrophic.</p><p>We scanned the entire Sui validator set and found nearly <strong>40% of validator voting power exposed</strong>:</p><ul><li><p><strong>Open SSH ports</strong> across core validators.</p></li><li><p><strong>Critical CVEs</strong> left unpatched (28% of validators).</p></li><li><p><strong>Default Apache landing pages</strong> exposed to the public internet.</p></li><li><p><strong>Docker port 2375 open on ~99%</strong> of validators, often with no firewall.</p></li></ul><p>Unlike SSV’s incident, where the design worked but operators slipped, Sui’s issues point to <strong>systemic secops failures</strong> across the validator set.</p><hr><h2 id="h-why-it-matters" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Why It Matters</h2><p>In proof-of-stake, slashing isn’t the only danger. If more than ~33% of validator voting power drops offline, <strong>consensus stalls</strong>. If the network halts, billions in assets could be frozen.</p><p>With 40% of voting power exposed, an attacker doesn’t need to “double sign” or exploit protocol bugs. They just need to take down enough vulnerable validators simultaneously to cross that threshold.</p><hr><h2 id="h-the-wrong-kind-of-spotlight" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">The Wrong Kind of Spotlight</h2><p>Mysten Labs promotes Sui as <em>"building critical infrastructure to enable a more decentralized internet."</em> Yet when these issues were disclosed responsibly, the response was dismissive - "bug bounty" fodder rather than systemic risk.</p><p>Meanwhile, competitor Aptos came up clean on our first pass. Ironically, the chain with the <strong>biggest marketing spend</strong> may also have the weakest validator hygiene.</p><hr><h2 id="h-the-bigger-picture" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">The Bigger Picture</h2><p>The lesson from both SSV’s slashing incident and Sui’s exposures is that <strong>validator security is infrastructure security</strong>. Protocol design isn’t enough; the culture of secops among validator operators is just as critical.</p><p>Sui’s validators aren’t slashing today - but unless the hygiene gap is closed, the next headline could be worse than penalties. It could be a chain-wide stall.</p><hr><p><strong>Full Report:</strong> <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/pgdn-network/sui-network-report-250819">https://github.com/pgdn-network/sui-network-report-250819</a><br></p>]]></content:encoded>
            <author>pgdn@newsletter.paragraph.com (PGDN)</author>
            <category>depin</category>
            <category>defisecurity</category>
            <category>suinetwork</category>
            <category>validatorsecurity</category>
            <category>cybersecurity</category>
            <category>proofofstake</category>
            <category>pgdn</category>
            <category>cve</category>
            <enclosure url="https://storage.googleapis.com/papyrus_images/6843ef6e7673d6ead2beebe7e1efa5722333091aa7d79a42e02a4a94be1f1250.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[40% of Sui Validators Exposed]]></title>
            <link>https://paragraph.com/@pgdn/40percent-of-sui-validators-exposed</link>
            <guid>DF8jocB10z6yd92TomXu</guid>
            <pubDate>Thu, 04 Sep 2025 12:32:52 GMT</pubDate>
            <description><![CDATA[In August 2025, PGDN conducted an external scan of the Sui validator network. What we found was systemic: nearly 40% of the network’s voting power is exposed to public security risks, threatening the network’s ability to stay live. In a proof-of-stake network like Sui, consensus halts if roughly 33.3% of the voting power is disrupted. Our analysis showed that 3,955 voting power (~39.6%) was exposed - leaving a dangerously thin margin of only 621 voting power before a network-wide halt could o...]]></description>
            <content:encoded><![CDATA[<p>In August 2025, PGDN conducted an external scan of the Sui validator network.<br>What we found was systemic: nearly <strong>40% of the network’s voting power is exposed</strong> to public security risks, threatening the network’s ability to stay live.</p><p>In a proof-of-stake network like Sui, consensus halts if roughly 33.3% of the voting power is disrupted.<br>Our analysis showed that <strong>3,955 voting power (~39.6%) was exposed</strong> - leaving a dangerously thin margin of only 621 voting power before a network-wide halt could occur.</p><blockquote><p>A single, well-timed exploit could mean the loss of billions of dollars in assets. End game for Sui.</p></blockquote><p>We have never seen this many production servers in a single network exposing SSH and default web pages. If we noticed, attackers almost certainly have too.</p><hr><h2 id="h-key-findings" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Key Findings</h2><ul><li><p><strong>39.6% voting power</strong> externally exposed via SSH and/or CVEs</p></li><li><p><strong>28%</strong> of validators running services with known CVEs</p><ul><li><p>Some are patched Ubuntu builds with back-ported fixes</p></li><li><p>This figure is a <strong>conservative upper bound</strong></p></li></ul></li><li><p><strong>~99%</strong> responding on port 2375/tcp (Docker-TCP)</p><ul><li><p>SYN/ACK observed across most validators</p></li><li><p>Protocol unconfirmed → classified <strong>LOW confidence</strong>, excluded from exploitability math</p></li></ul></li><li><p><strong>Default Apache landing pages</strong> observed on many validators, some with <strong>critical CVEs</strong>, mistakenly described as “RPC endpoints”. <strong>Seriously, WTF Sui?!</strong></p></li><li><p><strong>Simulated attack scenario</strong> showed that a coordinated exploitation could cause a total network blackout.</p></li></ul><p>Full dataset, methods, simulated attack etc are in the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/pgdn-network/sui-network-report-250819">GitHub repo</a>.</p><hr><h2 id="h-why-hygiene-and-opsec-are-critical" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Why Hygiene and OPSEC Are Critical</h2><p>Mysten Labs responded to our disclosure by framing these issues as “security hygiene, not exploitable vulnerabilities.”</p><p>That framing misses the point entirely. Hygiene issues are the very foundation of successful cyberattacks.</p><ul><li><p><strong>Version fingerprinting</strong>: Public banners reveal the exact versions of software like OpenSSH and Ubuntu. Even if patched today, attackers can filter on these versions and launch an attack the moment a new CVE is released.</p></li><li><p><strong>Default web servers</strong>: Many validators are serving stock Apache pages, not RPC endpoints. These pages leak headers, advertise CVEs, and are a clear sign of misconfiguration.</p></li><li><p><strong>SSH exposure</strong>: SSH is one of the most abused management surfaces in history. Brute-force attacks, credential stuffing, or a future zero-day can all exploit this open port.</p></li><li><p><strong>Unexplained port 2375</strong>: Despite being consistently observed as open on nearly every validator, Mysten Labs denied its existence. This widespread, undocumented exposure is a significant concern.</p></li></ul><p><strong>Calling a CVE-affected Apache service an “intentional RPC” or denying open ports that are visible to anyone is not security. It is dismissal.</strong></p><h2 id="h-disclosure-and-response" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Disclosure and Response</h2><p>We provided Mysten Labs with a report and access to a private GitHub repository, outlining our findings and a simulated attack scenario.</p><ul><li><p><strong>Aug 18, 2025:</strong> Formal disclosure email sent to Mysten Labs</p></li><li><p><strong>Aug 21, 2025:</strong> Mysten Labs requested GitHub access, dataset shared</p></li><li><p><strong>Aug 22, 2025:</strong> Mysten Labs responded, calling the issues “hygiene, not vulnerabilities,” stating that ports 80/443 were “as intended,” and claiming port 2375 was not open</p></li><li><p><strong>Aug 26, 2025:</strong> Mysten Labs stated they do not manage independent validators and could only “pass along general messages” to encourage better practices</p></li></ul><p>Mysten Labs confirmed their two validators were patched but did not dispute our findings on version fingerprinting.</p><p><strong>They offered no remediation plan or guidance for independent validators.</strong></p><h2 id="h-why-this-matters" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Why This Matters</h2><p>This isn’t about a single zero-day. It’s about <strong>systemic exposure</strong> across a decentralized network where halting consensus requires only one-third of voting power.</p><p>Without a minimum security baseline for validators, Sui - and any network like it - is one unpatched CVE away from the loss of all user funds.</p><p>Of note, our initial scans of Aptos were, clean as a whistle. Get your act together Sui.</p><p><strong>Hygiene is not cosmetic. It is the difference between resilience and outage. While all the networks focus on internal audits, the outside is exposed. </strong></p><h2 id="h-about-pgdn" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">About PGDN</h2><p>PGDN measures the <strong>outside-in posture</strong> of decentralized infrastructure — validators, RPCs, bridges, sequencers, oracles and more.</p><p>We publish anonymized scores, reproducible methods, and remediation guidance to help operators and foundations harden their networks before attackers force the issue.</p><ul><li><p>Website: <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://pgdn.ai">pgdn.ai</a></p></li><li><p>GitHub: <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/pgdn-network/sui-network-report-250819">github.com/pgdn-ai</a></p></li><li><p>X: <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://x.com/pgdnai">https://x.com/pgdnai</a></p></li><li><p>Contact: Simon Morley (sm@pgdn.ai)</p></li></ul><hr><p><em>Licensing: CC BY-NC-ND 4.0 — journalists may quote with attribution to PGDN; commercial reuse and derivative datasets prohibited.</em></p>]]></content:encoded>
            <author>pgdn@newsletter.paragraph.com (PGDN)</author>
            <category>sui</category>
            <category>sui-network</category>
            <category>validators</category>
            <category>blockchain</category>
            <category>security</category>
            <category>cve</category>
            <category>ssh</category>
            <category>opsec</category>
            <category>defi</category>
            <category>depin</category>
            <category>pgdn</category>
            <category>bug-bounty</category>
            <enclosure url="https://storage.googleapis.com/papyrus_images/c56df7fa8713ef7b32e4b90d257fb1c6.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Publishing Infrastructure Scores]]></title>
            <link>https://paragraph.com/@pgdn/publishing-infrastructure-scores</link>
            <guid>WPeEz7UZK1woXhQvU8Rp</guid>
            <pubDate>Fri, 08 Aug 2025 08:01:38 GMT</pubDate>
            <description><![CDATA[In Web3 circles, everyone talks about transparency. Virtually no one is talking about infrastructure security? If your front door is unlocked, someone will get in eventually.]]></description>
            <content:encoded><![CDATA[<p>In Web3 circles, everyone talks about transparency. Virtually no one is talking about infrastructure security? If your front door is unlocked, someone will get in eventually.</p><p>Across the web:</p><p>"We audit contracts"<br>"We run bug bounties!"<br>"We're secure! We had a DDOS audit done in 2022!" (More on this in another post).</p><p>Yet the machines that <em>run the chain</em>?<br>They’ve been invisible. Until now.</p><hr><h2 id="h-scores-you-can-verify" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Scores You Can Verify</h2><p>Starting today, PGDN is making <strong>validator infrastructure scores</strong> public.</p><ul><li><p><span data-name="check_mark_button" class="emoji" data-type="emoji"><img src="https://cdn.jsdelivr.net/npm/emoji-datasource-apple/img/apple/64/2705.png" draggable="false" loading="lazy" align="absmiddle"></span> <strong>On-chain</strong> — the permanent, verifiable record (<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://explorer.zksync.io/tx/0x63fe23152f41ae34af82eeca42ab894b4664aa6240f0cd7af8a4d72f1523bee2">view</a>)</p></li><li><p><span data-name="check_mark_button" class="emoji" data-type="emoji"><img src="https://cdn.jsdelivr.net/npm/emoji-datasource-apple/img/apple/64/2705.png" draggable="false" loading="lazy" align="absmiddle"></span> <strong>Online</strong> — open for anyone to review (<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://pgdn.ai/trust?hash=aHR0cHM6Ly9leHBsb3Jlci56a3N5bmMuaW8vdHgvMHg2M2ZlMjMxNTJmNDFhZTM0YWY4MmVlY2E0MmFiODk0YjQ2NjRhYTYyNDBmMGNkN2FmOGE0ZDcyZjE1MjNiZWUy&amp;name=AlphaFi&amp;score=75">view one</a>)</p></li><li><p><span data-name="check_mark_button" class="emoji" data-type="emoji"><img src="https://cdn.jsdelivr.net/npm/emoji-datasource-apple/img/apple/64/2705.png" draggable="false" loading="lazy" align="absmiddle"></span> <strong>On Twitter (@pgdnai)</strong> — because visibility drives action</p></li></ul><p>The blockchain record is the source of truth. Twitter is just the loudspeaker.</p><hr><h2 id="h-why-this-matters" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Why This Matters</h2><p>Infrastructure failures don’t happen in a vacuum - they happen in silence.<br>Without visibility, operators don’t fix them. Protocols don’t know they exist.<br>And attackers? The hackers do.</p><p>Publishing scores changes the equation:</p><ul><li><p>Creates a <strong>baseline</strong> every operator can measure against</p></li><li><p>Gives protocols a <strong>clear signal</strong> on network health</p></li><li><p>Incentivises fixes before incidents</p></li></ul><p>This isn’t about calling people out. It’s about raising the floor for everyone.</p><hr><h2 id="h-how-it-works" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">How It Works</h2><ol><li><p>PGDN analyzes publicly exposed endpoints across supported networks</p></li><li><p>Findings are normalized, scored, and given a <strong>trust score</strong></p></li><li><p>The score is hashed + published on-chain (permanent proof)</p></li><li><p>The same score is posted online + on <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://x.com/pgdnai">@pgdnai</a> for visibility</p></li></ol><p>Anyone can verify a score against its on-chain record.</p><hr><h2 id="h-whats-next" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">What’s Next</h2><p>We’re extending the same approach to:</p><ul><li><p>Gateways</p></li><li><p>Bridges</p></li><li><p>RPC endpoints</p></li><li><p>Network APIs</p></li></ul><p>With <strong>automated alerts for regressions</strong> and <strong>opt-in remediation signals</strong> coming soon.</p><hr><p>The decentralized edge is public.<br>Its security should be too.</p><p><strong>Follow </strong><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://x.com/pgdnai"><strong>@pgdnai</strong></a> for live score updates and check the blockchain if you want the real receipts.</p>]]></content:encoded>
            <author>pgdn@newsletter.paragraph.com (PGDN)</author>
            <category>pgdn</category>
            <category>sui</category>
            <category>web3</category>
            <category>defi</category>
            <category>depin</category>
            <category>security</category>
            <enclosure url="https://storage.googleapis.com/papyrus_images/e91da96cea3b055b8a9a8a7e55aabdad.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Protecting the Decentralized Edge with PGDN]]></title>
            <link>https://paragraph.com/@pgdn/protecting-the-decentralized-edge-with-pgdn</link>
            <guid>Cnnn5BMcnG8wm1RWFI80</guid>
            <pubDate>Thu, 07 Aug 2025 09:43:51 GMT</pubDate>
            <description><![CDATA[Most people assume validator infrastructure is secure by default. The (potential) future of banking should be secure right? With all the recent crypto breaches, we assumed things would be protected. What we actually found was quite a shock. PGDN is an AI-powered platform built to protect the decentralized edge, not by reacting to threats, but by proactively surfacing the weak points that make them possible. PGDN is an agentic detection system: a purpose-built infrastructure intelligence layer...]]></description>
            <content:encoded><![CDATA[<p>Most people assume validator infrastructure is secure by default. The (potential) future of banking <em>should</em> be secure right?</p><p>With all the recent crypto breaches, we assumed things would be protected. What we actually found was quite a shock.</p><p><strong>PGDN</strong> is an AI-powered platform built to protect the decentralized edge, not by reacting to threats, but by proactively surfacing the weak points that make them possible.</p><p>PGDN is an <strong>agentic detection system</strong>: a purpose-built infrastructure intelligence layer that autonomously identifies, monitors, and scores validator nodes, RPC endpoints, and exposed components across decentralized networks.</p><p>The results are normalized, scored, and published as a permanent, verifiable audit trail - on-chain.</p><h2 id="h-everyones-auditing-apps-no-ones-watching-the-infrastructure" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Everyone’s Auditing Apps - No One’s Watching the Infrastructure</h2><p>In Web3, billions are poured into smart contract audits, formal verification, and protocol-level bug bounties. And yet:</p><ul><li><p>The nodes running those contracts are often <strong>unpatched</strong></p></li><li><p>Their RPCs are <strong>publicly exposed</strong></p></li><li><p>Their dashboards and ports are <strong>wide open</strong></p></li><li><p>Their infrastructure hygiene is <strong>untested, unaudited, and untracked</strong></p></li></ul><blockquote><p>The external attack surface is growing, and no one’s looking.</p></blockquote><p>That’s the gap PGDN exists to close.</p><p>In another article, we’ll cover the moment a security engineer from a major network sends us an outdated <em>internal</em> ddos audit, shortly after we sent him a report of a critical vulnerability on an external port.</p><hr><h2 id="h-why-we-scan-validators" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Why We Scan Validators</h2><p>Because they’re the actual entry points for attackers.</p><p>Smart contracts might hold the funds, but <strong>validators hold the keys to uptime, censorship, consensus, and exposure</strong>. If a validator goes down — or worse, is compromised — the entire network can be weakened or manipulated.</p><p>Here’s what we regularly find:</p><ul><li><p>RPC nodes running vulnerable versions</p></li><li><p>Prometheus dashboards with no auth</p></li><li><p>Default passwords still active</p></li><li><p>BFT ports exposed globally</p></li><li><p>Misconfigured TLS or proxies</p></li></ul><p>In any other industry, this would trigger an incident response. In crypto, it’s often invisible.</p><hr><h2 id="h-our-approach" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Our Approach</h2><p>PGDN doesn’t guess. We verify.</p><ul><li><p><span data-name="check_mark_button" class="emoji" data-type="emoji"><img src="https://cdn.jsdelivr.net/npm/emoji-datasource-apple/img/apple/64/2705.png" draggable="false" loading="lazy" align="absmiddle"></span> We only scan <strong>publicly routable infrastructure</strong></p></li><li><p><span data-name="check_mark_button" class="emoji" data-type="emoji"><img src="https://cdn.jsdelivr.net/npm/emoji-datasource-apple/img/apple/64/2705.png" draggable="false" loading="lazy" align="absmiddle"></span> We do not brute-force or exploit anything</p></li><li><p><span data-name="check_mark_button" class="emoji" data-type="emoji"><img src="https://cdn.jsdelivr.net/npm/emoji-datasource-apple/img/apple/64/2705.png" draggable="false" loading="lazy" align="absmiddle"></span> We fingerprint passively and match known CVEs</p></li><li><p><span data-name="check_mark_button" class="emoji" data-type="emoji"><img src="https://cdn.jsdelivr.net/npm/emoji-datasource-apple/img/apple/64/2705.png" draggable="false" loading="lazy" align="absmiddle"></span> We normalize, score, and <strong>publish findings on-chain</strong></p></li></ul><p>Every scan produces a <strong>validator trust score</strong>, traceable back to the original data, hashed and timestamped for full accountability.</p><hr><h2 id="h-were-not-just-scanning-were-setting-the-standard" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">We're Not Just Scanning - We're Setting the Standard</h2><p>This isn’t about attacking networks. It’s about making them stronger.</p><p>We’re building a <strong>living, on-chain reputation layer</strong> for validator infrastructure one that protocols can rely on, and node operators can prove against.</p><p>Because decentralization without visibility is just security by assumption.</p><hr><h2 id="h-coming-next" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Coming Next</h2><p>In Part 2, we scan the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://Sui.io">Sui.io</a> mainnet and find that over <strong>20% of validators expose critical misconfigurations</strong>.</p><p>Some of them are shockingly easy to fix. None of them should have existed.</p><hr><p><em>PGDN - protecting the decentralized edge (and sometimes that means seeing what others choose not to).</em></p>]]></content:encoded>
            <author>pgdn@newsletter.paragraph.com (PGDN)</author>
            <category>defi</category>
            <category>sui</category>
            <category>blockchain</category>
            <enclosure url="https://storage.googleapis.com/papyrus_images/aa71227a2f60a6e2ede06daca8d6b543.jpg" length="0" type="image/jpg"/>
        </item>
    </channel>
</rss>