Threat Model
Considering the nature of a verifier, analysing and understanding the limits is critical. While the security of Colibri Stateless is similar to the security of a light client, since it is based on the same foundation, there are specific risks to be aware of. The following expands the classic LightClient threat model with Colibri-specific considerations.
1. Security of the Sync Committee
Description
Both Light Clients and Colibri rely on the aggregated BLS signature from a sync committee comprising 512 validators. Given that Ethereum currently has over 1 million active validators, this subset represents a small fraction of the total validator set. The concern arises from the possibility that a compromised or malicious sync committee could sign off on invalid blocks, potentially misleading the client.
Crypto-Economics
To compromise a client, an attacker would need to produce a valid-looking signature from at least 2/3 of the sync committee (342 out of 512 validators). Given that committee members are sampled randomly from the global validator pool (~1 million), the attacker would need to control a disproportionately large number of validators to have a meaningful chance of dominating the committee.
10%
51
❌
33%
169
❌
66%
338
❌ (just under)
70%
358
✅
To reliably reach a 2/3 majority, an attacker would need to control at least ~70% of all validators.
Required validators: ~700,000
Required ETH: 700,000 × 32 = 22,400,000 ETH
Estimated cost (at $3,000/ETH): $67.2 billion
This attack would also expose the attacker to:
Slashing penalties (currently only for attestations and block proposals, not yet for sync committee equivocations)
Severe market impact, since acquiring this much ETH would likely skyrocket the price
Community countermeasures, including social recovery or hard forks
🔐 Conclusion: A sync committee compromise is considered economically infeasible under normal conditions, given the enormous capital requirements and the existential risks for the attacker.
Mitigation
Random Selection: Sync committee members are selected pseudo-randomly every 256 epochs (~27 hours), making it statistically improbable for an attacker to consistently control the committee.
Economic Incentives: Validators have significant ETH staked and are disincentivized from misbehavior.
Future Change (EIP-7657): Once activated, double-signing in the sync committee becomes slashable, significantly strengthening the crypto-economic security for Colibri and Light Clients alike.
2. Finality During LightClientUpdates
Description
LightClientUpdates include both an attestedHeader
and a finalityHeader
. The proof for the nextSyncCommittee
is based on the attestedHeader
, which may not be finalized at the time of the update. This raises concerns about reliability if the attestedHeader
is later reorged out.
Mitigation
Temporal Stability: The
nextSyncCommittee
is fixed per period (~27 hours), reducing reorg risk.Finality Proofs: Finalized headers eventually override optimistically chosen ones.
Economic Deterrents: Validators remain disincentivized from equivocation.
3. Long Chain Attacks
Description
Long-range attacks involve adversaries creating an alternative chain that diverges from the main chain, potentially deceiving light clients that have been offline for extended periods. This is a known vulnerability in proof-of-stake systems, especially concerning nodes that lack recent state information.
Crypto-Economic Risk Analysis
Long-range or “long chain” attacks exploit the fact, that in Proof-of-Stake systems, old validators can sign alternative chains even if they no longer have any stake locked. Unlike short-term attacks on sync committees, long-range attacks don’t require control over live validators – they rely on historical keys and inactive signers.
This makes the cost of launching such an attack theoretically much lower, but introduces a different class of security assumption: weak subjectivity.
Weak Subjectivity Period
A light client must regularly sync to a trusted checkpoint within the so-called weak subjectivity period (WSP). The WSP is the maximum safe offline time before finality guarantees weaken. If a client has been offline longer than the WSP, it can no longer be certain which chain is canonical, unless it verifies the root against a trusted source.
⏳ The length of the WSP depends on validator churn and activity, but is typically between 2 to 4 months on Ethereum mainnet.
See the detailed analysis by Runtime Verification: 📄 Weak Subjectivity Analysis
Attack Strategy
An attacker could attempt to:
Restore old validator keys (from backups or leaks)
Construct a valid-looking but non-canonical fork starting from a historic block
Use these old keys to sign a fork with "finalized" headers
Trick clients that haven’t synced recently and have no fresh trusted checkpoint
Attack Cost
No stake required: Validators don’t need to have any ETH at stake; only old keys.
Infrastructure cost: The attacker must simulate a chain many epochs long, including all block proposals and attestations.
Risk of detection: Honest full nodes and checkpoint providers will reject the fork, so the attack only works against isolated or offline clients.
Long duration: Building a convincing fork over months of slots is computationally expensive and non-trivial.
Mitigation
Weak Subjectivity Checkpoints: Colibri and Light Clients must be configured with trusted block hashes (Checkpoints) to anchor verification.
Checkpoint Providers: External sources can provide safe synchronization points.
Community Consensus: Social recovery (hard forks) in extreme attack scenarios.
4. Colibri-Specific Considerations
Unlike standard Light Clients, Colibri does not sync via gossip or LightClientUpdates. Instead, it:
Fetches blocks on-demand via Beacon APIs.
Verifies them using the SyncAggregate (up to 512 signatures from the next block’s BlockBody).
This means that the is_better_update
logic has already been applied by consensus before Colibri sees the signatures. Colibri therefore only validates a single aggregate per block — it never needs to resolve competing updates itself.
Specific Risks
SyncCommittee Double-Signature
Not slashable → attacker with >2/3 control could equivocate without penalty
Evidence collection: Colibri can store conflicting signatures for future reporting
Slashable → attackers risk losing stake
API Censorship / Withholding
Single Beacon API could deny service or serve stale data
Use multiple APIs, consistency checks across sources, retry logic
Same mitigations remain
Force-Update Risk
If no finality, Colibri must accept optimistic headers to progress
Mark optimistic headers clearly; never treat them as final until confirmed
Same mitigations remain
5. Conclusion
Colibri vs. Light Clients: Both rely on the same sync committee assumption (<1/3 byzantine). Colibri’s difference is the use of
SyncAggregate
from the block body rather thanLightClientUpdate
. This means Colibri is slightly simpler (nois_better_update
handling), but equally exposed to the fundamental security assumption.Main Gap (today): Lack of slashing for sync committee equivocations.
Future (with EIP-7657): Colibri achieves parity with classical Light Clients in crypto-economic security, with the added operational simplicity of on-demand verification.
Last updated