Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Bitdeer Sells All Mined BTC This Week: Zero-Holding Strategy Intensifies

May 2, 2026

How North Korean spies spent months in-person to drain $285 million from Drift

May 2, 2026

Crypto industry backs CLARITY Act yield compromise, pushes Senate Banking for markup

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»ChainLight saved zkSync Era from $1.9B exploit
Security

ChainLight saved zkSync Era from $1.9B exploit

November 4, 2023No Comments3 Mins Read

Blockchain security audit firm ChainLight identified a vulnerability in the zkSync Era protocol that, if exploited, could have led to a potential loss of $1.9 billion.

The bug was found in zkSync Era’s zk-circuits. These circuits are designed to validate the correctness of transaction data without exposing sensitive details about the counterparties involved.

A blog post from ChainLight detailed that the bug could have allowed a malicious actor to manipulate transactions within a block and still have them verified as accurate. This would have led to layer-1 smart contracts accepting these proofs, unaware of the manipulated transaction values they contained.

Had the attack been successful, the malicious prover could have drained 100,000 ether (ETH), worth an estimated $1.9 billion at the time of disclosure.

Despite this, zkSync Era had many security layers in place. These would have made it difficult for anyone to actually execute the exploit unless they were part of Matter Labs, the infrastructure team behind zkSync Era.

Anton Astafiev, head of security at Matter Labs, told Blockworks that exploiting this bug would have required the highest level of security privilege across its infrastructure.

An attacker would have needed to either access the protocol’s backend in order to directly inject the malicious code, or gain access to its validator private key used for signing blocks. They would also have had to endure a mandatory 21-hour waiting period before extracting any funds due to an execution delay.

“What’s more, the bug found is related to our old prover and not the current Boojum, meaning the code will soon enough be completely obsolete and retired,” Astafiev said.

See also  Starknet and zkSync buck trend as crypto ecosystems shed devs by 28%

After being made aware of the critical bug, ChainLight noted in an X post that the Matter Labs team had quickly reacted to the report, and fixed the issue.

The ChainLight team was awarded 50,000 in USDC for discovering the bug.

“This bug in particular was not formally part of the existing bug bounty programs or public contest. When we receive out-of-scope findings, we always assess them based on real-world impact to determine their importance and the corresponding reward,” Astafiev said.

Astafiev noted that the Matter Labs team is looking forward to continued collaboration with ChainLight and other security-focused organizations.

“These types of findings are healthy reminders of why multi-layer defense architectures like the ones Matter Labs implemented for zkSync are so critically important; no single layer of protection is ever perfectly secure, which is why there can be no single point of failure,” he said.

Source link

1.9B ChainLight era Exploit saved zkSync

Related Posts

How North Korean spies spent months in-person to drain $285 million from Drift

May 2, 2026

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026
Top Posts

Will Soaring War Risk Send Civilian Ammunition Prices Higher?

March 3, 2026

Immutable zkEVM and X Merge: Unified Chain to Power Web3 Gaming in 2026

February 3, 2026

HBAR Price Prediction: Hedera Eyes $0.12 Recovery After Testing Critical Support at $0.10

March 8, 2026

Type above and press Enter to search. Press Esc to cancel.