Common threats and how Hyperledger Fabric mitigates them
Hyperledger Fabric provides protection against some of the most common security threats and assumes that a participating organization (node operator) will manage the threats inherent in running such a system, while at the same time introducing new attack vectors inherent in data sharing and governance. In the following table, we will summarize the most common security threats, whether Hyperledger Fabric addresses them and how, or whether it is the responsibility of a node/network operator to address them:
Threat |
Description |
Hyperledger Fabric |
Network/Node Operator |
Spoofing |
Use of a token or other credential to pretend to be an authorized user, or to... |