The potential vulnerability lies at the contract level—not the EVM/opcode/EIP level.
- A developer wrote, audited, tested and deployed a smart contract in the past
- It is not possible to exploit the smart contract
- The Constantinople update goes live
- It is now possible to exploit the smart contract, due to the changes made in EIP1283
And people have been looking hard.
- the entire stack needs to be analyzed when reviewing EIPs
- existing conditions & contract patterns being used have to be explored
- needs imagination / research across all levels, not just technical reviews and audits
Thank you to @chain_security and everyone else who researches.