In Specs We Trust? Conformance-Analysis of Implementation to Specifications in Node-RED and Associated Security Risks

Simon Schneider (Corresponding author), Komal Kashish, Katja Tuma, Riccardo Scandariato

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Abstract

Low-code development frameworks for IoT platforms offer a simple drag-and-drop mechanism to create applications for the billions of existing IoT devices without the need for extensive programming knowledge. The security of such software is crucial given the close integration of IoT devices in many highly sensitive areas such as healthcare or home automation. Node-RED is a framework to build applications from nodes that are contributed by open-source developers. Its reliance on unvetted contributions and lack of security checks raises the concern that the applications could be vulnerable to attacks, thereby posing a security risk to end users. The low-code approach could imply that users lack the technical knowledge to mitigate or even realize such security concerns. This paper focuses on hidden information flows in Node-RED nodes, meaning flows that are not captured by the specifications. They could (unknowingly or with malicious intent) cause leaks of sensitive information to unauthorized entities. We report the results of a conformance analysis of all nodes in the Node-RED framework, for which we compared the numbers of specified inputs and outputs of each node against the number of sources and sinks detected with CodeQL. The results show, that 55% of all nodes exhibit more possible flows than are specified. A risk assessment of a subset of the nodes showed, that 28% of them are associated with a high severity and 36% with a medium severity rating.

Original languageEnglish
Title of host publicationAvailability, Reliability and Security
Subtitle of host publication20th International Conference, ARES 2025, Ghent, Belgium, August 11–14, 2025, Proceedings
EditorsMila Dalla Preda, Sebastian Schrittwieser, Vincent Naessens, Bjorn De Sutter
Place of PublicationCham
PublisherSpringer
Pages278-300
Number of pages23
Volume1
ISBN (Electronic)978-3-032-00624-0
ISBN (Print)978-3-032-00623-3
DOIs
Publication statusPublished - 10 Aug 2025
Event20th International Conference on Availability, Reliability and Security, ARES 2025 - Ghent, Belgium
Duration: 11 Aug 202514 Aug 2025

Publication series

NameLecture Notes in Computer Science (LNCS)
Volume15992
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference20th International Conference on Availability, Reliability and Security, ARES 2025
Country/TerritoryBelgium
CityGhent
Period11/08/2514/08/25

Keywords

  • IoT
  • Node-RED
  • conformance analysis
  • information flow analysis
  • low-code
  • security

Fingerprint

Dive into the research topics of 'In Specs We Trust? Conformance-Analysis of Implementation to Specifications in Node-RED and Associated Security Risks'. Together they form a unique fingerprint.

Cite this