In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade libcrux-sha3 to version 0.0.8 or higher.
Affected versions of this package are vulnerable to Incorrect Calculation in the squeeze function of the incremental portable SHAKE XOF API when more than RATE bytes are requested. An attacker can cause incorrect cryptographic output by requesting output exceeding the RATE threshold, potentially undermining the integrity of cryptographic operations that depend on the correct output of the XOF API. This is only exploitable if more than RATE bytes are squeezed from the incremental portable SHAKE XOF API.