The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade openzeppelin-cairo-contracts
to version 0.6.1 or higher.
openzeppelin-cairo-contracts is an A library for secure smart contract development written in Cairo for StarkNet
Affected versions of this package are vulnerable to Cryptographic Issues due to the is_valid_eth_signature
function which is missing a call to finalize_keccak
function after calling the verify_eth_signature
function.
As a result, any contract using is_valid_eth_signature
from the account library (such as the EthAccount
preset) is vulnerable to a malicious sequencer. Specifically, the malicious sequencer would be able to bypass signature validation to impersonate an instance of these accounts.
In order to exploit this vulnerability, it is required to control a sequencer or prover since they're the ones executing the hints, being able to inject incorrect keccak
results.