Liquid Stake with compassSOL for an 8.46% APY from staking, MEV + fees

Enjoy the freedom of liquid staking in Solana Defi while delegating your stake to the high performance Solana Compass validator. Stake or unstake at any time here, or with a Jupiter swap.

Benefit from our high staking returns and over 2 years experience operating a Solana validator, and receive additional yield from priority fees + MEV tips

Earn 6.8% APY staking with Solana Compass

Help decentralize and secure the Solana network delegating your stake to us and earn an impressive 6.8% APY yield on your SOL, while supporting us to create new guides and tools. Learn more

Stake your SOL

  1. Click to connect your wallet
  2. Enter the amount you wish to stake
  3. Kick back and enjoy your returns
  4. Unstake from your wallet or our staking dashboard

Earn 6.8% APY staking with Solana Compass

Help decentralize and secure the Solana network delegating your stake to us and earn an impressive 6.8% APY yield on your SOL, while supporting us to create new guides and tools.

Learn more

Breakpoint 2023: Security Considerations from RPC Providers

Exploring the critical security considerations for RPC providers in Web3 infrastructure.

The notes below are AI generated and may not be 100% accurate. Watch the video to be sure!


The panel discussion at Breakpoint 2023 delved into the oft-overlooked yet critical topic of security within the domain of Remote Procedure Call (RPC) providers, which are backbone services enabling applications to execute code across a network in blockchain ecosystems. Personnel from NEOdYME, Helius, and Triton One Limited shared their insights on the implications of compromised security, the resilience of applications against malicious actors, and the practical measures developers and users can execute to safeguard their interactions with RPC providers.

Key Points:

Importance of Security for RPC Providers

RPC providers play a crucial role in maintaining the reliability and security of blockchain applications. A compromised RPC service can lead to catastrophic outcomes, such as the alteration of crucial data, leading to financial loss or system failure. As such, ensuring the security of RPC providers is tantamount to securing the data integrity for all applications relying on these services. Moreover, the security is two-fold, protecting both the application infrastructure and the end-users from potential abuses and hacks.

Mitigation and Due Diligence in RPC Environment

The concept of trust-but-verify resonates strongly within the RPC landscape. While operators advocate for due diligence and awareness of security practices, the ultimate goal is to minimize trust by enhancing verification methods. Using tools like data availability sampling or employing dedicated services helps in mitigating risks. Additionally, knowing the reputation and historical behavior of RPC providers is significant. However, developers must balance the need for speed and the inclusion of safety checks, especially for applications demanding low latency, such as trading platforms.

Challenges Faced by Honest RPC Providers

Even legitimate and security-conscious RPC providers encounter challenges. Resource abuse and network exploitation are common issues, where attackers attempt to drain services through DDoS attacks or resource leaching. Providers must implement robust measures, like rate limiting and IP-based restrictions, to preserve service quality and performance. The discussion highlighted real-world scenarios where providers have faced such adversities and the approaches they have taken to mitigate these risks.

Developments in Security Measures

Security for RPC providers is an evolving field, with a combination of standard Web2 security practices and innovative Web3 approaches like data availability sampling. The idea is to make the services inhospitable for attackers while preserving a seamless experience for legitimate users. Measures such as leveraging DDoS protection services from companies like Cloudflare and custom rate limiting are among the tools currently being used to protect RPC services.

Facts + Figures

  • RPC security affects both application infrastructure and user data quality.
  • A compromise can lead to altered application behaviors, data inconsistencies, and financial losses.
  • Trust and reputation are important, but enhanced verification methods are encouraged.
  • Providers use measures such as IP rate limiting and leveraging Web2 security services for additional protection.
  • Developing security layers include possibly adopting data availability sampling to validate the data from RPC providers.
  • Attackers often target RPC services for resource leaching, employing sophisticated methods to go undetected.
  • Running one's own RPC node is considered the ultimate mitigation strategy.
  • Providers have to contend with not just external threats but also inefficient codes or bugs from application developers that can lead to self-DDoS.

Top quotes

  • "The risk always depends on the application layer and what they're doing and the consequences of that."
  • "If the rate limits were a blanket, you would basically just drop the blanket over the app and then the rate limits would custom fit the application."
  • "It's important for software devs to really understand the back end and how it works because you might be your own worst enemy."
  • "Embedding security layers include possibly adopting data availability sampling to ratify the data from RPC providers."
  • "Running one's own RPC node is considered the ultimate mitigation strategy."

Questions Answered

What is an RPC provider and why does its security matter?

An RPC (Remote Procedure Call) provider is a service that allows blockchain applications to execute code across a network. Security for RPC providers matters because any compromise can affect data integrity and reliability, leading to lost funds or system failures, and damaging both application infrastructure and end-users' trust.

How can you mitigate risks associated with RPC providers?

To mitigate risks with RPC providers, one should employ a trust-but-verify approach. This includes understanding the reputation of the provider, using data availability sampling tools, custom rate limiting, deploying protective measures like DDoS protection services from Web2 companies, and, if resources allow, running your own RPC node for utmost control.

What challenges do honest RPC providers face?

Honest RPC providers face challenges such as resource leaching, DDoS attacks, and exploitation by attackers employing techniques like rotating IP addresses, proxy networks, and token theft. They must continuously innovate and adapt their security measures to preserve service quality and performance.

What security measures are being developed to protect RPC providers?

Developers and RPC providers are enhancing security through standard Web2 technologies for monitoring and defense, like Cloudflare's security layers, as well as exploring Web3 approaches such as data availability sampling for data verification, and custom rate limiting to fit specific application needs.

Are there any real-life examples of attacks on RPC providers?

Yes, there are real-life examples discussed during the panel, including attackers going to great lengths to steal free RPC services and developers deploying inefficient code that unintentionally leads to self-inflicted DDoS situations. Providers have had to navigate these challenges while ensuring uptime and data reliability.