In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/cometbft/cometbft/blocksync
to version 0.37.7, 0.38.8 or higher.
Affected versions of this package are vulnerable to Externally Controlled Reference to a Resource in Another Sphere during the blocksync process. An attacker can disrupt the normal operation and cause the system to enter an unstable state or get stuck by manipulating the data sent during the synchronization process. This is only exploitable if the node is syncing from a malicious peer.