- 0xResearch
- Posts
- đ The great bug debate
đ The great bug debate
Succinct disclosure sparks discussion
Succinctâs SP1 ZKVM prover had a security flaw that could have allowed incorrect proofs to be verified, potentially undermining the integrity of cryptographic proofs used in blockchain applications. Communication could have been better, but as far as we know, no user funds were at risk.
Quarterly stablecoin and trading volumes:
Source: Syncracy, DeFi Llama, Artemis
Stablecoin volumes and trading activity have surged to their highest levels since the 2021-22 bull run, with Q4 2024 hitting $1.86T in stablecoin transactions and $1.01T in trading volume.
Resilience or excess? That is the question.
Crypto has long thrived on cycles of exuberance and despair.
Today, the market faces a paradox. On one hand, the sheer velocity of capital suggests maturing financial infrastructure and rising utility; on the other, history warns of leverage-fueled mirages.
As we navigate 2025âs speculative maze, understanding the difference between fleeting narratives and real utility is the key to identifying winners amidst the chaos. (H/T Ryan Watkins.)
Code alongside peers in a high energy hackathon. Get hands on with the tools and tech defining the onchain world. Meet collaborators who could shape your next big breakthrough. Brooklyn in the summer will just hit different. Build with us at Permissionless IV.
đ June 24â26 | Brooklyn, NY
Bug disclosure and industry best practices
Succinctâs SP1 ZKVM has come under scrutiny after LambdaClass disclosed a critical security vulnerability in its proof generation. The exploit in version 3 of SP1, discovered in collaboration with 3Mi Labs and Aligned, stemmed from the interaction of two separate security flaws.
Succinct previously disclosed the potential exploit to its customers via Github and Telegram.
Hereâs what happened in simple terms:
Missing Verification Step â The system relied on a list to track key proof components but didnât properly verify that the list was accurate. Consequently, a malicious prover could potentially manipulate it to produce invalid proofs. New checks were added to fix the oversight.
Incomplete Proof Flag â A key part of SP1âs proof-checking system included a flag meant to confirm that a proof was fully executed. However, this flag wasnât always properly enforced, leading to a potential loophole. Succinct tightened up the checks.
Polynomial Evaluation Issue â An issue found in Plonky3 (a dependency of SP1), meant that it didnât fully verify all calculations before confirming a proof was valid. Post-patch, all proof components are properly verified.
While the vulnerability was quickly addressed prior to the disclosure, the process has raised concerns about transparency in security practices for zero-knowledge virtual machines (ZKVMs). SP1âs technology is currently underpinning high profile upgrades in rollup infrastructure under development.
Transparency and implications
LambdaClass cautioned that the full implications of the flaw required further assessment. Notably, the exploit depended on the interplay between the two issues, meaning that fixing one might not be sufficient to prevent exploitation.
LambdaClass developer known as Fede, highlighted on social media that his team felt compelled to make the disclosure public after perceiving a lack of urgency in Succinctâs communication about the issue.
Succinctâs leadership acted responsibly in fixing the issue, according to Availâs Anurag Arjun, but he agreed better public disclosure practices are needed.
âZKVM systems are very new and are constantly being updated, so youâd expect vulnerabilities,â Arjun told Blockworks. âIn an open-source setting, anyone can run the prover, and if vulnerabilities arenât disclosed properly, thatâs definitely a risk.â
The Avail team, which uses SP1 for proof generation in its consensus mechanism, was informed about the issue privately ahead of public disclosure, Arjun confirmed.
Availâs implementation was not exposed to risk, Arjun said, because they rely on Succinctâs proprietary prover, which remains permissioned. Availâs rollup clients have also not yet begun using its SP1-powered bridge contract, so there was no practical impact.
Meanwhile, defenders of Succinct point out that responsible disclosure typically involves private reporting before public statements to avoid unnecessary panic and potential exploitation.
Succinctâs updated version 4 of SP1 â dubbed Turbo â resolves the identified vulnerability, and downstream projects have begun integrating these fixes.
The case illustrates how even well-audited code can and does contain bugs. As Succinct put it, âwhile auditors provide valuable insights, they are not infallible, and we remain committed to continuously improving and working hard to ensure our systems are safe and secure for everyone.â
The more explicit, if belated transparency from Succinct drew praise. What remains is the question of how to best balance security, transparency, and user protection. And finding the line between due criticism and toxic infighting.
â Macauley Peterson
The Expansion podcastâs latest roundup episode tackled the recent discussion on native and based rollups, with guests Uma Roy (Succinct) and Jill Gunter (Espresso Systems).
Roy: Rollups âroll their own proof systemâ to prove their validity to the L1. So they need to have a way to upgrade proof logic on L1. Thatâs why they have a Security Council to approve upgrades to their all-important Ethereum bridge contract.
A sufficiently large council, like Arbitrumâs, with a timelock âis maybe not the worst thing in the world, but in practice itâs bad for a few reasons.â
Liability of having a public list of multisig members
The L2âs lack of L1 security â a bug in the proof system can result in a bridge drain, and the L1 canât protect against this.
Remarkably, only 2% of ETH has been bridged to L2s (according to Jon Charbonneau), indicating that whales really do care about security â expressed by not bridging more ETH to rollups.
Native rollups could provide a solution. If the rollup proof system is enshrined in Ethereum mainnet, rollups making use of it would have the same security as L1 â protected by social consensus on Ethereum, via a fork in emergency cases. That, in turn, should make people more comfortable to hold assets on rollups.
Roy argues that no rollup has really differentiated itself based on its proof system. Other components matter more â UX, sequencing, available apps â so rollups can still differentiate in these other ways.
Jill: What about Polygon or Starkware, that have spent years developing their own proof systems?
Uma: Adapt or die. You canât ignore reality. But it remains to be seen whether the EF ship actually ships native rollups, and on what timeline. But true L1 security should be a major competitive edge.
Nick: Does it limit customizability? The modular thesis doesnât require total EVM-compatibility. Is this like sharding of L1 in a more permissionless way?
Uma: No. We can still have app-specific rollups, itâs just that Ethereum will âeat all general purpose, fully EVM compatible rollups.â That will push builders to differentiate via app-specific or more specialized rollups.
â Macauley Peterson
|
|