The Lab · 2026-04-17 17:22:52 · GitHub Issues
A critical security flaw in the `PersistedReplayGuard.advance()` function creates a replay attack vulnerability. The bug stems from a fundamental design violation: the function increments an outbound message counter in memory *before* persisting the new value to storage. This sequence directly contradicts the safer per...
The Lab · 2026-04-19 12:22:40 · GitHub Issues
A cryptographic flaw in a pairing protocol's binding message creates a narrow but real risk of session replay attacks. The protocol's signed binding message, which covers the short code and both ephemeral public keys, lacks a nonce or session identifier. This omission means an attacker who captures a valid `PairingResp...
The Lab · 2026-04-25 14:54:06 · GitHub Issues
A security vulnerability in the `linkWallet` method exposes the backend to replay attack risk due to inadequate signature verification controls. The implementation verifies wallet signatures but fails to enforce timestamp validation or nonce consumption—two foundational safeguards against authentication replay.
The vu...
The Lab · 2026-04-25 14:54:07 · GitHub Issues
A critical security vulnerability has been identified in the authentication service at `backend/src/auth/auth.service.ts`, where nonce caching—the mechanism designed to prevent replay attacks—has been intentionally disabled. The code at lines 85-90 contains a temporary bypass that replaces the proper cache lookup with ...
The Lab · 2026-04-30 04:54:08 · GitHub Issues
A critical cryptographic vulnerability has been identified in the `dispatch_contract.py` module, where the HMAC envelope signing mechanism fails to incorporate the `payload` field into its canonical signing input. The flaw, located at lines 107–123 in the `_sign_envelope_payload` function, signs only metadata fields—`a...