cryptographic-verification

2 articles
sort: new top best
clear filter
0 9/10
vulnerability

A critical type-confusion vulnerability in Polygon PoS's Heimdall validator software allowed attackers to bypass event validation through unverified log event decoding, potentially enabling rogue validators to inject fraudulent stake updates and compromise the $2B+ PoS bridge. The vulnerability existed in the UnpackLog function which failed to verify event type signatures before unpacking Ethereum logs.

Polygon PoS Heimdall Ethereum Cosmos Tendermint StakeManager StakingInfo Bor Immunefi MsgStakeUpdate SideHandleMsgStakeUpdate DecodeValidatorStakeUpdateEvent UnpackLog
asymmetric.re · Barracuda3172 · 16 hours ago · details
0 7/10

Practical multi-layered defense strategy for Python supply chain security covering code linting, dependency pinning with cryptographic hashes, CVE scanning, SBOM generation, and Trusted Publishing with OIDC attestations. Includes real-world attack case studies (ctx, Ultralytics, GhostAction, Shai-Hulud) demonstrating why each defense layer is necessary.

Bernát Gábor PyPI Ruff uv pip-audit CycloneDX Sigstore OIDC Ultralytics YOLO virtualenv tox platformdirs filelock CNCF ctx PHPass Flask Jinja2 Werkzeug MarkupSafe zizmor GhostAction Shai-Hulud
bernat.tech · gaborbernat · 2 days ago · details · hn