In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Insufficient Entropy vulnerabilities in an interactive lesson.
Start learningUpgrade blahaj
to version 0.6.0 or higher.
Affected versions of this package are vulnerable to Insufficient Entropy via the random_polynomial
function. An attacker can exclude an exponential number of values for each of the shared bytes until sufficiently few values remain for brute forcing by exploiting the bias in polynomial coefficient generation. This is only exploitable if the same secret is distributed multiple times.