Developers have disclosed a software vulnerability in Babylon, the Bitcoin staking protocol's BLS voting extension (block signature) mechanism. The vulnerability allows malicious validators to intentionally omit the block hash field when submitting voting extensions, potentially triggering other validators to crash at network epoch boundaries, thereby slowing down block production during critical consensus checks. There is currently no evidence that the vulnerability has been exploited in practice, but developers warn that it could be abused if not fixed. Babylon has not yet publicly responded with a fix. (Cointelegraph)
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Developers have disclosed a software vulnerability in Babylon, the Bitcoin staking protocol's BLS voting extension (block signature) mechanism. The vulnerability allows malicious validators to intentionally omit the block hash field when submitting voting extensions, potentially triggering other validators to crash at network epoch boundaries, thereby slowing down block production during critical consensus checks. There is currently no evidence that the vulnerability has been exploited in practice, but developers warn that it could be abused if not fixed. Babylon has not yet publicly responded with a fix. (Cointelegraph)