Inspiration

1) All assets in Metaverse are software and code 2) Vulnerability is the most important digital assets 3) Vulnerability is Native NFT 4) The hacker law is the first innovation all over the world.

What it does

The hacker law of Metaverse The First Law of Hacking (Von Neumann) Neumann, the father of modern computing). Information security vulnerability is the vulnerability of information technology, information products and information systems in the process of demand, design, implementation, configuration and operation, intentionally or unintentionally, these vulnerabilities exist in different forms in all levels and links of information systems, and can be exploited by malicious subjects, thus affecting the normal operation of information systems and their services.

The Second Law of Hacking : (He-Jun Xu paper published in June 2021) The market value of an information security vulnerability = 5 × the average monthly salary of the developer who generated the security vulnerability × the security level of the vulnerability.

The Third Law of Hacking: (Paper by He-Jun Xu, published in June 2021) The market economic value of an information system vulnerability can be referred to the market economic value of the labor of the developer of that information system.

How we built it

The market Value of Vulnerability (VoV)= 5 ( Pareto Principle/ 2:8 principle)

  • average month salary who make this vulnerability ( AvS)
  • the score level which evaluated by security administration ( Impact Score)

Impact Score from NVD

National Vulnerability Database The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security-related software flaws, misconfigurations, product names, and impact metrics. CVE-2020-5320 - Dell EMC OpenManage Enterprise (OME) versions prior to 3.2 and OpenManage Enterprise-Modular (OME-M) versions prior to 1.10.00 contain a SQL injection vulnerability.

Challenges we ran into

Few inventors know they should spend half of their wealth on protecting another half of wealth. All of DeFi and metaverse project creators should upgrade their cybersecurity guideline.

Accomplishments that we're proud of

The hacker law is the first innovation all over the world.

What we learned

Software code is digit asset in Metaverse Smart contract is software code The address of Smart Contract is unique and native NFT id Vulnerability PoC code can be saved into smart contract Smart contract can be exchanged as NFT Vulnerability is the most important digital assets Vulnerability is Native NFT

What's next for The second law of hacker metaverse

Setup the DEX platform for the vulnerability NFT

Built With

Share this project:

Updates