May 05, 2025
11 11 11 AM
Latest Post
Chainlink to Start New Community Rewards Program for LINK Stakers Bitcoin’s Support at $88.8K in Focus After Trendline Break; XRP Eyes Death Cross: Technical Analysis CoinDesk 20 Performance Update: NEAR Drops 7.4% as Index Declines Over Weekend Bitcoin Could Slide to $90K as BTC Traders Eye Fed Meeting Semler Scientific Adds 167 Bitcoin, Bringing Holdings to 3,634 BTC Free Bitcoin Faucet From 2010 Is All Set for a Comeback Michael Saylor’s Strategy Adds 1,895 Bitcoin, Bringing Company Stack to 555,450 BTC Vitalik Buterin Wants to Make Ethereum as Simple as Bitcoin Crypto Daybook Americas: Bitcoin Dips, but ETF Inflows, Fed Week Keep Bulls Interested Tether Enters AI Arena With Tether.AI

Solana Quietly Fixes Bug That Could Have Let Attackers Mint and Steal Certain Tokens

The Solana Foundation has disclosed a previously unknown vulnerability in its privacy-focused token system that could have allowed attackers to forge fake zero-knowledge proofs, enabling unauthorized minting or withdrawals of tokens.

The vulnerability was first reported on April 16 through Anza’s GitHub security advisory, accompanied by a working proof-of-concept. Engineers from Solana development teams Anza, Firedancer, and Jito verified the bug and began working on a fix immediately, per a post-mortem published Saturday,

The issue stemmed from the ZK ElGamal Proof program, which verifies zero-knowledge proofs (ZKPs) used in Solana’s Token-22 confidential transfers. These extension tokens enable private balances and transfers by encrypting amounts and using cryptographic proofs to validate them.

ZKPs are a cryptographic method that lets someone prove they know or have access to something, such as a password or age, without revealing the thing itself.

In crypto applications, these can be used to prove a transaction is valid without showing specific amounts or addresses (which can otherwise be used by malicious actors to plan exploits).

The bug occurred because some algebraic components were missing from the hashing process during the Fiat-Shamir transformation — a standard method to make zero-knowledge proofs non-interactive. (Non-interactive means turning a back-and-forth process into a one-time proof anyone can verify.)

A sophisticated attacker could forge invalid proofs that the on-chain verifier would still accept.

This would have allowed unauthorized actions such as minting unlimited tokens or withdrawing tokens from other accounts.

As such, the vulnerability did not affect standard SPL tokens or the main Token-2022 program logic.

Patches were distributed privately to validator operators beginning April 17. A second patch was pushed later that evening to address a related issue elsewhere in the codebase.

Both were reviewed by third-party security firms Asymmetric Research, Neodyme, and OtterSec. By April 18, a supermajority of validators had adopted the fix.

There is no indication that the bug was exploited, and all funds remain secure, according to the post-mortem.

This post was originally published on this site