Blog

Security research and insights from the Asymmetric Research team.

Featured

Circle's CCTP Noble Mint Bug
Research · Featured

Circle's CCTP Noble Mint Bug

We privately disclosed a vulnerability to Circle via their bug bounty program. The vulnerability could have been exploited by circumventing the CCTP message sender verification process to mint fake USDC tokens on Noble.

Evmos Precompile State Commit Infinite Mint
Research · Featured

Evmos Precompile State Commit Infinite Mint

This post details a vulnerability we identified in Evmos, an EVM-compatible Cosmos chain, that could have been exploited to mint infinite amounts of $EVMOS tokens. Due to EVM state commits during precompile execution, it could cause a mismatch between the state held within EVM and the Bank module.

Latest

Circle's CCTP Noble Mint Bug
Research · Featured

Circle's CCTP Noble Mint Bug

We privately disclosed a vulnerability to Circle via their bug bounty program. The vulnerability could have been exploited by circumventing the CCTP message sender verification process to mint fake USDC tokens on Noble.

Evmos Precompile State Commit Infinite Mint
Research · Featured

Evmos Precompile State Commit Infinite Mint

This post details a vulnerability we identified in Evmos, an EVM-compatible Cosmos chain, that could have been exploited to mint infinite amounts of $EVMOS tokens. Due to EVM state commits during precompile execution, it could cause a mismatch between the state held within EVM and the Bank module.

Cosmos IBC Reentrancy Infinite Mint
Research ·

Cosmos IBC Reentrancy Infinite Mint

This post discusses a vulnerability in ibc-go, a reference implementation of the Cosmos Inter-Blockchain Communication (IBC) protocol. A reentrancy vulnerability during the handling of timeout messages could have allowed an attacker to mint an infinite amount of IBC tokens on affected Cosmos chains.

Ethereum Log Confusion in Polygon's Heimdall
Research ·

Ethereum Log Confusion in Polygon's Heimdall

In this post, we describe a vulnerability in Heimdall, the validator software of the Polygon Proof-of-Stake (PoS) blockchain. This flaw, if exploited, could have allowed a rogue/compromised validator to take over the Heimdall consensus layer and inject fraudulent events into the StakeSync mechanism.

Get The Latest

Subscribe to be notified whenever we publish new security research.

Great! Check your inbox and click the link.
Sorry, something went wrong. Please try again.