If you discover a security issue in BATNA Protocol, please do not open a public GitHub issue. Instead, email the maintainer: kocakbilgin@gmail.com with:
- A description of the vulnerability
- Reproduction steps, PoC, or affected contract / file paths
- Your assessment of impact
Expect an initial response within 72 hours. If the issue is confirmed, we will work on a fix, coordinate disclosure, and credit the reporter in the advisory.
| In scope | Out of scope |
|---|---|
contracts/NegotiationRoom.sol |
Old factory at 0x1221... (Wave 1, deprecated) |
contracts/NegotiationFactory.sol |
Third-party dependencies (CoFHE, OpenZeppelin, viem, ethers) — report upstream |
agent/ TypeScript module |
Frontend styling, typography, animation |
frontend/src/app/api/* route code |
Vercel platform issues |
The wave2-submission tag is the current supported release. main tracks work-in-progress and may contain unreviewed changes.
See docs/THREAT_MODEL.md for the full adversary catalogue. Summary of the assumptions that are by design:
- CoFHE threshold network is honest (standard FHE assumption).
- TFHE is IND-CPA secure.
- EVM and Solidity compiler execute as specified.
- Agent service operator is trusted with plaintext derivation in Wave 2. Wave 5 roadmap moves agent execution into a TEE (Phala / Lit Protocol) to remove this assumption.
Full list in docs/PRIVACY_MODEL.md. Three critical ones:
- Auditor never decrypts individual reservation prices — enforced in
_resolve(), exposed viaauditorAccess(), tested intest/NegotiationRoom.test.ts. - Plaintext context never lands on-chain — only
bytes32 contextHash. - Settlement side-channel resistance —
FHE.selectensures identical gas + execution for deal and no-deal outcomes.
- Server-only env vars (
ANTHROPIC_API_KEY,DEMO_AGENT_*_PRIVATE_KEY) must never haveNEXT_PUBLIC_prefix in Vercel. Verified at startup via explicitprocess.envreads. - Demo wallets hold minimal arb-sepolia ETH. Not funded on mainnet. Key compromise is bounded by demo-wallet dust.
- Contracts are not upgradeable. Fixes require a new factory deployment and client migration.
Thanks to the judges and reviewers whose feedback materially hardened the protocol during Wave 2 — context hash migration, room lifecycle, auditor ACL invariant, and overflow analysis all came from direct security review.