Cancel Preloader
Please enter CoinGecko Free Api Key to get this plugin works.

Solana Quietly Fixes Bug That Could Have Let Attackers Mint and Steal Certain Tokens

 Solana Quietly Fixes Bug That Could Have Let Attackers Mint and Steal Certain Tokens

Markets

Share this article

By Shaurya Malwa|Edited by Parikshit Mishra

May 5, 2025, 7:10 a.m.

Bug (CoinDesk Archives)
  • The Solana Foundation revealed a vulnerability in its token system that could have allowed unauthorized minting or withdrawals.
  • The flaw was related to the ZK ElGamal Proof program, affecting confidential transfers but not standard SPL tokens.

The Solana Foundation has disclosed a previously unknown vulnerability in its privacy-focused token system that could have allowed attackers to forge fake zero-knowledge proofs, enabling unauthorized minting or withdrawals of tokens.

The vulnerability was first reported on April 16 through Anza’s GitHub security advisory, accompanied by a working proof-of-concept. Engineers from Solana development teams Anza, Firedancer, and Jito verified the bug and began working on a fix immediately, per a post-mortem published Saturday,

STORY CONTINUES BELOW

Don’t miss another story.Subscribe to the Crypto Long & Short Newsletter today.See all newslettersBy signing up, you will receive emails about CoinDesk products and you agree to ourterms of useandprivacy policy.

The issue stemmed from the ZK ElGamal Proof program, which verifies zero-knowledge proofs (ZKPs) used in Solana’s Token-22 confidential transfers. These extension tokens enable private balances and transfers by encrypting amounts and using cryptographic proofs to validate them.

ZKPs are a cryptographic method that lets someone prove they know or have access to something, such as a password or age, without revealing the thing itself.

In crypto applications, these can be used to prove a transaction is valid without showing specific amounts or addresses (which can otherwise be used by malicious actors to plan exploits).

The bug occurred because some algebraic components were missing from the hashing process during the Fiat-Shamir transformation — a standard method to make zero-knowledge proofs non-interactive. (Non-interactive means turning a back-and-forth process into a one-time proof anyone can verify.)

A sophisticated attacker could forge invalid proofs that the on-chain verifier would still accept.

This would have allowed unauthorized actions such as minting unlimited tokens or withdrawing tokens from other accounts.

As such, the vulnerability did not affect standard SPL tokens or the main Token-2022 program logic.

Patches were distributed privately to validator operators beginning April 17. A second patch was pushed later that evening to address a related issue elsewhere in the codebase.

Both were reviewed by third-party security firms Asymmetric Research, Neodyme, and OtterSec. By April 18, a supermajority of validators had adopted the fix.

There is no indication that the bug was exploited, and all funds remain secure, according to the post-mortem.

Shaurya is the Co-Leader of the CoinDesk tokens and data team in Asia with a focus on crypto derivatives, DeFi, market microstructure, and protocol analysis.

Shaurya holds over $1,000 in BTC, ETH, SOL, AVAX, SUSHI, CRV, NEAR, YFI, YFII, SHIB, DOGE, USDT, USDC, BNB, MANA, MLN, LINK, XMR, ALGO, VET, CAKE, AAVE, COMP, ROOK, TRX, SNX, RUNE, FTM, ZIL, KSM, ENJ, CKB, JOE, GHST, PERP, BTRFLY, OHM, BANANA, ROME, BURGER, SPIRIT, and ORCA.

He provides over $1,000 to liquidity pools on Compound, Curve, SushiSwap, PancakeSwap, BurgerSwap, Orca, AnySwap, SpiritSwap, Rook Protocol, Yearn Finance, Synthetix, Harvest, Redacted Cartel, OlympusDAO, Rome, Trader Joe, and SUN.

Shaurya Malwa

  

Shaurya Malwa

https://4second.com

Related post

Leave a Reply

Your email address will not be published. Required fields are marked *

Please enter CoinGecko Free Api Key to get this plugin works.