In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerabilities in an interactive lesson.
Start learningUpgrade triton-vm to version 2.0.0 or higher.
Affected versions of this package are vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) due to improper sampling of randomness in the FRI sub-protocol. An attacker can undermine the integrity of the verification process by crafting proofs for arbitrary statements that are accepted as valid by the verifier. This is only exploitable if the protocol relies on the supplied verifier implementation and does not implement its own verifier.