Lido Node Operator Portal

Commit-Boost (with PBS module)

Overview

Commit-Boost is a validator sidecar that facilitates communication between validators and third-party protocols. The PBS Module is fully compatible with mev-boost for high-MEV block sourcing, and is actively used by major validators such as Chorus One, Kiln, and Sigma Prime. The project has been introduced to the Lido DAO and received a $95k grant. They also received a $1.5 million grant from the Ethereum Foundation.

Development Company

Commit-Boost operates as an open software. The main team working on the project is Gattaca, a software company that is also behind the Titan Builder https://www.titanbuilder.xyz & Titan Relay https://titanrelay.xyz.

Main Developer

This is most likely Lorenzo Cavicchioli, hired into Gattaca around March 2024 and in autumn of 2024 he was working on Commit-Boost.

Drew Van der Werff is also noted as the main steward and spokesperson for the project.

‣
Note on team focus
📄

References

  • Repository: https://github.com/Commit-Boost/commit-boost-client
  • Documentation: https://commit-boost.github.io/commit-boost-client/
  • Sigma Prime Commit-Boost Client Audit: https://github.com/Commit-Boost/commit-boost-client/blob/main/audit/Sigma_Prime_Commit_Boost_Client_Security_Assessment_Report_v2_0.pdf
  • Community Calls: https://www.youtube.com/channel/UCYNYRYTwsbl_oa4HmtvY6Vw
    • Twitter: https://x.com/commit_boost

Summary of Risks

Severity
Issue
Status
Mitigation
High
Single Contributor Risk
Open
Project is seeking additional developers
High
Potential Validator Key Compromise
Open
High
Insufficient Security Audits
Open
New audits are planned
Medium
Validator Key Exposure via Local Signer
Open
Documentation suggests alternative configurations
Low
Unclear Financial Sustainability
Open
Budget appears sufficient for long-term development

Detailed Findings

1. Single Contributor Risk

Description:

(A) Currently, Commit-Boost relies on a single primary contributor, creating a significant redundancy risk (if this individual were to leave, fall ill, or shift focus, there would be no one readily available to maintain or develop the project further).

Contribution frequency data also suggests a gradual decline in activity.

image
image

(B) With only one developer, code changes lack independent review, increasing the risk of undetected vulnerabilities. There is no clear plan to improve security practices, and a single individual controls the code running on many validators.

Some NOs (Kiln, Chorus One) have forked the repository, possibly to mitigate this risk. No changes have been pushed upstream so far.

Mitigation:

The team is looking for additional developers, but the timeline is unclear. Forks by Kiln and Chorus One indicate some level of risk mitigation.

2. Potential Validator Key Compromise

Description:

Running Commit-Boost requires initializing docker-compose.yml via commit-boost-cli. If this CLI tool were compromised, an attacker could potentially gain access to a node operator's infrastructure or even a live validator server.

3. Insufficient Security Audits

Description:

The only available audit, covering only PBS mode, is outdated. It assesses code from September 30, 2024, which is over six months old.

image

Mitigation:

A new audit is planned for Dirk & MUX modules, but no details on timeline.

4. Validator Key Exposure via Local Signer

Description:

At the time of writing, the Commit-Boost signing module has not been audited (only PBS module). Some third-party modules may require it, and using the Local Signer mode is particularly risky as it directly accesses validator keys.

image

If the local signer mode is used, validator keys could be at risk.

Mitigation:

The project provides alternative configurations:

  • “Remote signer” mode which recently supported Web3Signer & Dirk, with a section in the official documentation on how to use Vouch.
  • “Proxy keys” mode, with support of BLS and ECDSA. This use case requires additional security research.

5. Unclear Financial Sustainability

Description:

The project has captured $3.3 million in funding so far, but its long-term sustainability strategy is unclear.

Mitigation:

While the project initially lacked a clear income strategy, its lean approach to hiring and spending suggests it can sustain itself long enough to attract community support or secure additional funding.

Current funding should last at least 5–10 years for a small team.

Recommendations and Next Steps

  • Encourage public security audits and peer reviews to mitigate single developer risk.
  • Define a clear security roadmap including code review policies.
  • Adopt safer signing configurations for validators.
  • Clarify long-term funding strategy to ensure project sustainability.
Logo

Terms of Use

Operators

Ethereum Node Operators

Node Operators Database

Modules

Curated

Simple DVT

Community Staking

Other

Operators Stats & Metrics

Community Lifeguards Initiative

ValSet Monthly Updates

XDiscordGitHub