Aug. 2, 2023, 11 a.m. | Trail of Bits

Trail of Bits Blog blog.trailofbits.com

By Jim Miller We discovered a critical vulnerability in Incognito Chain that would allow an attacker to mint arbitrary tokens and drain user funds. Incognito offers confidential transactions through zero-knowledge proofs, so an attacker could have stolen millions of dollars of shielded funds without ever being detected or identified. The vulnerability stemmed from an insecure […]

confidential critical critical vulnerability cryptography funds incognito incognito chain knowledge led miller mint mistake stolen theft tokens transactions vulnerability

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Lead Security Architect

@ Fireblocks | Tel Aviv-Yafo, Tel Aviv District, Israel

Senior Software Development Engineer, AWS Security SecDevOps

@ Amazon.com | Courbevoie, Ile-de-France, FRA

Senior Professional Services Consultant XSIAM - Spain

@ Palo Alto Networks | Madrid, Spain