Issue Description
The review identified three security-relevant TODOs in production code. As the corresponding logic has not yet been implemented, these code paths could not be fully assessed during the review:
- The secret-loading wrapper
serai_env::var, reads directly from process environment variables while noting that secrets should move to a proper secret store and be unset after reading.
- In the runtime,
substrate/runtime/src/wasm/mod.rs leaves signature verification weight at zero and wires several pallets with type Weights = (); // TODO, including coins, validator sets, signals, DEX, genesis liquidity, and in-instructions. These placeholders acknowledge that resource costs for security-relevant execution paths are not yet deliberately priced.
- The node service layer carries a consensus-facing TODO in
create_inherent_data_providers, where timestamps are taken from system time with a note that they should be bounded according to Serai's own minimum-increment rules.
Taken together, these TODOs identify production code paths where secret handling, runtime pricing, or validation bounds remain unfinished, which prevents a complete security assessment of those behaviors at this commit.
Risk
This issue is informational. The relevant code paths contain explicit TODOs for behavior that is not yet finalized, so these areas could not be fully reviewed at this commit. As a result, the security impact of the eventual implementation remains unclear until the deferred work is completed and the affected paths are reviewed again.
Mitigation Suggestion
Implement the deferred work described by these TODOs and re-review the affected paths once the final behavior is in place.
Issue Description
The review identified three security-relevant TODOs in production code. As the corresponding logic has not yet been implemented, these code paths could not be fully assessed during the review:
serai_env::var, reads directly from process environment variables while noting that secrets should move to a proper secret store and be unset after reading.substrate/runtime/src/wasm/mod.rsleaves signature verification weight at zero and wires several pallets withtype Weights = (); // TODO, including coins, validator sets, signals, DEX, genesis liquidity, and in-instructions. These placeholders acknowledge that resource costs for security-relevant execution paths are not yet deliberately priced.create_inherent_data_providers, where timestamps are taken from system time with a note that they should be bounded according to Serai's own minimum-increment rules.Taken together, these TODOs identify production code paths where secret handling, runtime pricing, or validation bounds remain unfinished, which prevents a complete security assessment of those behaviors at this commit.
Risk
This issue is informational. The relevant code paths contain explicit TODOs for behavior that is not yet finalized, so these areas could not be fully reviewed at this commit. As a result, the security impact of the eventual implementation remains unclear until the deferred work is completed and the affected paths are reviewed again.
Mitigation Suggestion
Implement the deferred work described by these TODOs and re-review the affected paths once the final behavior is in place.