{"id":25121,"date":"2025-05-05T02:47:03","date_gmt":"2025-05-05T02:47:03","guid":{"rendered":"https:\/\/dogewisperer.com\/?p=25121"},"modified":"2025-05-05T02:47:03","modified_gmt":"2025-05-05T02:47:03","slug":"solana-devs-fix-bug-that-allowed-unlimited-minting-of-certain-tokens","status":"publish","type":"post","link":"https:\/\/dogewisperer.com\/?p=25121","title":{"rendered":"Solana devs fix bug that allowed unlimited minting of certain tokens"},"content":{"rendered":"<div>\n<p style=\"float:right; margin:0 0 10px 15px; width:240px;\"><img decoding=\"async\" src=\"https:\/\/images.cointelegraph.com\/images\/840_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjUtMDUvMDE5NjlkNzUtNWY0OC03OThlLTk1NWItMjAyMzYyNWE2YWUy.jpg\"><\/p>\n<\/p>\n<p style=\"float:right; margin:0 0 10px 15px; width:240px;\"><img decoding=\"async\" src=\"https:\/\/images.cointelegraph.com\/images\/840_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjUtMDUvMDE5NjlkNzUtNWY0OC03OThlLTk1NWItMjAyMzYyNWE2YWUy.jpg\" alt=\"Solana devs fix bug that allowed unlimited minting of certain tokens\"><\/p>\n<p>The Solana Foundation has confirmed that a zero-day vulnerability that allowed an attacker to potentially mint certain tokens and even withdraw those tokens from user accounts has been fixed.\u00a0<\/p>\n<p>A May 3 post-mortem from the Solana Foundation <a data-ct-non-breakable=\"null\" href=\"https:\/\/solana.com\/tr\/news\/post-mortem-may-2-2025\" rel=\"null\" target=\"null\" text=\"null\" title=\"null\">said<\/a> that the security vulnerability, first discovered on April 16, could have allowed an attacker to forge an invalid proof affecting Solana\u2019s privacy-enabling \u201cToken-22 confidential tokens.\u201d<\/p>\n<p>There is no known exploit of the vulnerability, and Solana validators have since adopted the patched version, the foundation said.<\/p>\n<h2>Solana zero-day security bug affected Token-22 confidential tokens<\/h2>\n<p>The Solana Foundation said the security vulnerability concerned two programs: Token-2022 and ZK ElGamal Proof.<\/p>\n<p>Token-2022 handles the main application logic for token mints and accounts, while ZK ElGamal Proof verifies the correctness of zero-knowledge proofs to show accurate account balances.<\/p>\n<p>The foundation said certain algebraic components were omitted from the hash in the Fiat-Shamir Transformation&#8217;s transcript generation, which specifies how provers create public randomness using a <a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/news\/zero-knowledge-proofs-quantum-proof-ethereum-xin-xin-fan\" rel=\"null\" target=\"null\" text=\"null\" title=\"null\">cryptographic hash function.\u00a0<\/a><\/p>\n<p>The flaw could have enabled an attacker to exploit the unhashed components by crafting a forged proof that passes verification to mint and steal Token-22 confidential tokens.<\/p>\n<p>Token-22 confidential tokens, or \u201cExtension Tokens,\u201d <a data-ct-non-breakable=\"null\" href=\"https:\/\/phantom.com\/learn\/crypto-101\/solana-token-extensions\" rel=\"null\" target=\"null\" text=\"null\" title=\"null\">leverage<\/a> zero-knowledge proofs for private transfers and aim to enable advanced token functionality.\u00a0<\/p>\n<p>The vulnerability was first identified on April 16, and two patches were deployed to resolve the issues. A super majority of Solana validators adopted the patches around two days later.<\/p>\n<p>Solana development firms Anza, Firedancer and Jito were the main parties behind the security patch, while Asymmetric Research, Neodyme and OtterSec also assisted.<\/p>\n<p>The foundation confirmed that all funds remain safe.<\/p>\n<p><em><strong>Related: <\/strong><\/em><a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/news\/bloomberg-boosts-solana-etf-approval-odds-90\" rel=\"null\" target=\"null\" text=\"null\" title=\"null\"><em><strong>Bloomberg Intelligence boosts Solana ETF approval odds to 90%<\/strong><\/em><\/a><\/p>\n<p>Despite the fix, the Solana Foundation&#8217;s private handling of the <a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/news\/more-than-280-blockchains-at-risk-of-zero-day-exploits-warns-security-firm\" rel=\"null\" target=\"null\" text=\"null\" title=\"null\">issue<\/a> with Solana validators raised centralization concerns from some in the crypto community.\u00a0<\/p>\n<p>This included a Curve Finance contributor who <a data-ct-non-breakable=\"null\" href=\"https:\/\/x.com\/saint_rat\/status\/1919143023067422805\" rel=\"null\" target=\"null\" text=\"null\" title=\"null\">raised<\/a> concerns about the foundation\u2019s close relationship with <a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/news\/solana-upgrades-strengthen-network-squeeze-validators-earnings-vaneck\" rel=\"null\" target=\"null\" text=\"null\" title=\"null\">Solana validators.<\/a><\/p>\n<p>\u201cWhy does someone have a list of all validators and their contact details? What else are they talking about in those comms channels,\u201d they asked, fearing that they could collude to potentially censor transactions or <a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/explained\/can-the-ethereum-blockchain-roll-back-transactions-understanding-the-limits-and-risks\" rel=\"null\" target=\"null\" text=\"null\" title=\"null\">roll back the chain.<\/a><\/p>\n<p>Solana Labs CEO Anatoly Yakovenko didn\u2019t directly <a data-ct-non-breakable=\"null\" href=\"https:\/\/x.com\/aeyakovenko\/status\/1919143566305034740\" rel=\"null\" target=\"null\" text=\"null\" title=\"null\">deny<\/a> the claims but said members of the Ethereum community could also coordinate to resolve a similar security bug.<\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/s3.cointelegraph.com\/uploads\/2025-05\/01969e38-be70-7cb7-ad81-1caa454b1789\" title=\"\" alt=\"Solana devs fix bug that allowed unlimited minting of certain tokens\"><figcaption style=\"text-align: center;\"><em>Source: <\/em><a data-ct-non-breakable=\"null\" href=\"https:\/\/x.com\/CloutedMind\/status\/1918940062944809411\" rel=\"null\" target=\"null\" text=\"null\" title=\"null\"><em>Clouted<\/em><\/a><\/figcaption><\/figure>\n<p>More than 70% of Ethereum network validators are also controlled by <a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/explained\/crypto-exchanges-explained\" rel=\"null\" target=\"null\" text=\"null\" title=\"null\">crypto exchanges<\/a> or staking operators such as Lido, Yakovenko <a data-ct-non-breakable=\"null\" href=\"https:\/\/x.com\/aeyakovenko\/status\/1919013298248560901\" rel=\"null\" target=\"null\" text=\"null\" title=\"null\">said<\/a> in arguing his point.<\/p>\n<blockquote><p>\u201cIt\u2019s the same people to get to 70% on ethereum. All the lido validators (chorus one, p2p, etc..) binance, coinbase, and kraken. If geth needs to push a patch, I\u2019ll be happy to coordinate for them.\u201d<\/p><\/blockquote>\n<p>In August, the Solana Foundation and network validators <a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/news\/solana-defends-decentralization-amid-coordination-concerns\" rel=\"null\" target=\"null\" text=\"null\" title=\"null\">resolved another critical vulnerability<\/a> behind the scenes. At the time, the foundation\u2019s executive director, Dan Albert, said the ability to coordinate a patch doesn\u2019t mean that Solana is centralized.<\/p>\n<h2>Ethereum wouldn\u2019t fall for the same issue, community member says<\/h2>\n<p>Ethereum community member Ryan Berckmans <a data-ct-non-breakable=\"null\" href=\"https:\/\/x.com\/ryanberckmans\/status\/1919114466718863656\" rel=\"null\" target=\"null\" text=\"null\" title=\"null\">slammed<\/a> claims that Ethereum is subject to the same centralization issues as Solana, pointing out that Ethereum has sufficient client diversity.\u00a0<\/p>\n<p>The most popular Ethereum client, geth, has at most 41% market share on Ethereum, Berckmans said, while noting that Solana has just one production-ready client, Agave.<\/p>\n<blockquote><p>\u201cThis means zero day bugs in the single Sol client are de facto protocol bugs. Change the single client program, change the protocol itself. The client is the protocol.\u201d<\/p><\/blockquote>\n<p>Meanwhile, Solana is looking to roll out a <a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/news\/solana-eyes-2025-firedancer-rollout-depin-activity-surges\" rel=\"null\" target=\"null\" text=\"null\" title=\"null\">new client, Firedancer,<\/a> in the next few months, which is expected to improve the network\u2019s resilience and uptime.\u00a0<\/p>\n<p>However, Berckmans <a data-ct-non-breakable=\"null\" href=\"https:\/\/x.com\/ryanberckmans\/status\/1919119072630894954\" rel=\"null\" target=\"null\" text=\"null\" title=\"null\">said<\/a> that Solana would need three clients to be sufficiently decentralized at the client level.<\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/s3.cointelegraph.com\/uploads\/2025-05\/01969e38-c392-7e7a-9190-10180a86ae75\" title=\"\" alt=\"Solana devs fix bug that allowed unlimited minting of certain tokens\"><figcaption style=\"text-align: center;\"><em>Source: <\/em><a data-ct-non-breakable=\"null\" href=\"https:\/\/x.com\/ryanberckmans\/status\/1919119072630894954\" rel=\"null\" target=\"null\" text=\"null\" title=\"null\"><em>Ryan Berckmans<\/em><\/a><\/figcaption><\/figure>\n<p><em><strong>Magazine: <\/strong><\/em><a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/magazine\/beyond-peak-memecoin-solana-100x-better-despite-revenue-plunge\/\" rel=\"null\" target=\"null\" text=\"null\" title=\"null\"><em><strong>Memecoins are ded \u2014 But Solana \u2018100x better\u2019 despite revenue plunge<\/strong><\/em><\/a><\/p>\n<p><template data-name=\"subscription_form\" data-type=\"defi_newsletter\" label=\"Subscription Form: DeFi Newsletter\"><\/template>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Solana Foundation has confirmed that a zero-day vulnerability that allowed an attacker to potentially mint certain tokens and even withdraw those tokens from user accounts has been fixed.\u00a0 A May 3 post-mortem from the Solana Foundation said that the security vulnerability, first discovered on April 16, could have allowed an attacker to forge an [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":0,"footnotes":""},"categories":[2],"tags":[3,4,5],"class_list":["post-25121","post","type-post","status-publish","format-standard","hentry","category-news","tag-crypto","tag-doge","tag-news"],"_links":{"self":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/25121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=25121"}],"version-history":[{"count":0,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/25121\/revisions"}],"wp:attachment":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=25121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=25121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=25121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}