
How a small logic gap enabled traffic amplification via UDP spoofing
A security researcher uncovered a flaw that quietly turned a peer discovery feature into a DDoS amplification tool. The bug lived in the networking layer, not in business logic or smart contracts, which is exactly why it’s interesting. These are the bugs that often get overlooked, yet they can cause very real damage.
This article breaks down HackerOne report #502207, submitted to Rootstock Labs, and explains how a protective mechanism failed in practice, leading to a $2,000 bounty-worthy vulnerability.
Why discovery protocols are a favorite DDoS target
Peer-to-peer systems need a way to find and talk to other nodes. Most of them rely on UDP-based discovery protocols because UDP is fast, stateless, and cheap.
That same simplicity is what makes UDP dangerous:
* No handshake
* No built-in source verification
* Easy IP spoofing
To compensate, developers usually add custom defenses. One common pattern is a ping-pong challenge, meant to prove that a peer actually controls the IP address…

