Most common mitigation strategy for Solana Web3.js library users by February 2025?
Upgrade to version 1.95.8 • 25%
Switch to a different library • 25%
Implement additional security checks • 25%
Cease use of the library • 25%
Developer forums, official Solana communications, and security advisories
Solana Web3.js Library Compromised in Supply Chain Attack, Versions 1.95.6 and 1.95.7 Expose Private Keys; Upgrade to 1.95.8
Dec 3, 2024, 10:43 PM
A significant security vulnerability has been identified in the Solana Web3.js library, specifically in versions 1.95.6 and 1.95.7. This vulnerability, described as a supply chain attack, allows malicious code to steal private keys from users and developers, potentially enabling attackers to drain crypto wallets. The compromised library is widely used in Solana decentralized applications (dApps). Users are advised to upgrade to version 1.95.8, which is unaffected by the issue. Several wallet providers, including Phantom, Solflare, and Brave Wallet, have confirmed that they are not impacted by this vulnerability, as they do not utilize the compromised versions of the library. The incident underscores the importance of security in the Web3 ecosystem, with various security teams actively monitoring the situation and providing guidance on how to check for potential impacts.
View original story
50% to 75% • 25%
Less than 50% • 25%
More than 90% • 25%
75% to 90% • 25%
Yes • 50%
No • 50%
No • 50%
Yes • 50%
Using Browser Extensions • 25%
Other • 25%
Using Alternative Search Engines • 25%
Enabling JavaScript Temporarily • 25%
$1 million to $5 million • 25%
More than $10 million • 25%
$5 million to $10 million • 25%
Less than $1 million • 25%
Cost • 25%
Perceived lack of need • 25%
Complexity • 25%
Lack of awareness • 25%
Other • 25%
Dogecoin • 25%
Bitcoin • 25%
Ethereum • 25%
25% to 50% • 25%
10% to 25% • 25%
More than 50% • 25%
Less than 10% • 25%
Brave Wallet • 25%
None • 25%
Phantom • 25%
Solflare • 25%