In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/cometbft/cometbft/light
to version 0.34.34, 0.37.11, 0.38.12 or higher.
Affected versions of this package are vulnerable to Race Condition through the State
object computation process. An attacker can cause a chain split by exploiting inconsistencies in the ProposerPriority
field during state synchronization.
Note: This is only exploitable if validators run state sync using RPC nodes that are malicious or report invalid states for the proposer selection algorithm.