The numbers

Over the past 6 months, Kairos Lab's security research team audited multiple projects in the Aster ecosystem. The results:

  • 38+ total vulnerabilities identified
  • 14 rated P0 (critical blockers)
  • 3 repositories audited
  • 100% of findings included a working proof-of-concept

Every finding was responsibly disclosed and verified as patched before this retrospective.

Recurring patterns

Three vulnerability classes appeared across multiple projects:

1. Missing authentication on critical endpoints

The most dangerous pattern. Services exposed administrative or financial endpoints without any authentication check. The MCP SSE vulnerability is the most severe example — full trade execution without auth — but we found similar issues in configuration endpoints and data export APIs.

2. Key material co-location

Encryption keys stored alongside the data they protect. Fernet keys in the same database as encrypted payloads. API keys in environment variables accessible to the application runtime. This pattern appeared in 4 separate findings.

3. Unsigned payloads in transit

Trade parameters, configuration changes, and session data transmitted without integrity protection. No HMAC, no signature, no nonce. Man-in-the-middle modification was trivial in every case.

What this means

These aren't exotic attacks. They're the basics — authentication, key management, payload integrity. The Aster ecosystem is young, and these patterns are normal for early-stage projects. The important thing is finding them before they're exploited.

This is why Kairos Lab exists. We build the security infrastructure so these patterns don't reach production.


If you're building on Aster and want a security review, request an audit. We find what attackers see.