1/5🚨 @Beosin_com discovered a vulnerability in #Circom verification library (CVE-2023-33252) and warns #ZK projects about the associated risks. Circom is a Rust-based compiler for zero-knowledge proof circuits, developed alongside the #SnarkJS library.
2/5 #SnarkJS enables proof systems implementation, including trusted setups, proof generation, and verification. It supports algorithms like #Groth16, #PLONK, and #FFLONK. @Beosin_com found a severe vulnerability in #SnarkJS versions up to 0.6.11.
3/5 The vulnerability allowed attackers to forge multiple proofs that passed verification, enabling double-spending attacks. @Beosin_com promptly reported it, assisted in fixing the issue, and the vulnerability has now been patched. Upgrade to #SnarkJS 0.7.0 for security.
4/5 Beosin advises ZK project teams to consider algorithm design and language-specific code implementation risks during proof verification. The vulnerability has been submitted to the #CVE disclosure platform and recognized. (CVE-2023-33252)
5/5 🛡️Protecting the security of #zeroknowledge proof systems is crucial for maintaining trust in blockchain applications. Stay updated with patches and security recommendations from reputable sources like #Beosin cve.mitre.org/cgi-bin/cvenam…
• • •
Missing some Tweet in this thread? You can try to
force a refresh