WhisperX tag archive

#soroban

This page collects WhisperX intelligence signals tagged #soroban. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (8)

The Lab · 2026-03-25 10:27:14 · GitHub Issues

1. Soroban Smart Contract Vulnerability: Unprotected `initialize` Functions Open Arena, Factory, Payout to Front-Running Admin Takeover

A critical Day-1 security vulnerability has been identified in multiple Soroban smart contracts, exposing the entire protocol to immediate administrative takeover. The `initialize` functions within the Arena, Factory, and Payout contracts are publicly callable by any address. This design flaw allows any observer of the...

The Lab · 2026-03-27 08:27:03 · GitHub Issues

2. Soroban Contract Security Flaw: Unbounded Instance Storage Growth in `distribute_winnings()` Exhausts TTL Budget

A critical security and performance flaw has been identified in a Soroban smart contract's payout function. The `distribute_winnings()` method stores each payout record directly in the contract's **instance storage**, a design choice that leads to unbounded growth and threatens the contract's long-term viability. Insta...

The Lab · 2026-03-27 16:27:32 · GitHub Issues

3. Soroban Smart Contract Flaw: `payout.distribute_winnings()` Auth Bypass via Order-of-Operations Bug

A critical security vulnerability has been identified in a Soroban smart contract, allowing an attacker to bypass authorization checks and potentially trigger unauthorized fund distributions. The flaw resides in the `distribute_winnings()` function within the `payout` contract, where a logic error in the sequence of ch...

The Lab · 2026-04-04 11:26:58 · GitHub Issues

4. Soroban HTLC Vulnerability: Critical TTL Flaw Risks Permanent Fund Loss

A critical vulnerability in the Soroban HTLC smart contract risks the permanent loss of user funds due to a fundamental flaw in how storage entries are managed. The contract fails to properly extend the Time-To-Live (TTL) for lock entries, meaning they can expire and be garbage collected before the associated timelock ...

The Lab · 2026-04-08 11:27:26 · GitHub Issues

5. Stellar Core Audit: Compat HTTP Upgrades Handler Missing Critical Soroban Parameter Support

A security audit of the Stellar network's compatibility layer has confirmed a significant oversight: the HTTP endpoint for network upgrades silently ignores three critical configuration parameters. The `/upgrades?mode=set` handler, located in `crates/app/src/compat_http/handlers/plaintext.rs`, parses only six parameter...

The Lab · 2026-04-24 00:54:08 · GitHub Issues

6. Nine Soroban Production Contracts Flagged for First Formal Security Audit as Audit Gap Identified

Nine production smart contracts built on the Soroban platform have been identified as operating without a completed formal security audit, according to internal project documentation. The gap has prompted a structured preparation effort aimed at readying the codebase for third-party review. No timeline for the audit it...

The Vault · 2026-04-25 17:54:07 · GitHub Issues

7. Solar Grid Smart Contract Exposed to Front-Running Attack on Initialize Function

A critical access control vulnerability has been identified in the Solar Grid smart contract deployed on Soroban, raising serious concerns about the security of administrative functions. The `initialize` function in `contracts/solar_grid/src/lib.rs` contains no authentication mechanism, allowing any external account to...

The Lab · 2026-04-28 12:54:12 · GitHub Issues

8. Critical Auth Bypass in Soroban Fraud-Prevention Contract Allows Publisher Suspension Impersonation

A critical authentication bypass vulnerability has been identified in the `flag_suspicious` function within the fraud-prevention module of a Soroban smart contract deployment. The flaw, documented in `contracts/fraud-prevention/src/lib.rs`, enables any external account to impersonate an authorized admin or oracle opera...