Loading...
Loading...
Browse all stories on DeepNewz
VisitSignificant financial losses reported by Solana Web3.js library users by Q1 2025?
Yes • 50%
No • 50%
Public reports from affected users, security firms, and news outlets
Solana Web3.js Library Compromised in Supply Chain Attack, Versions 1.95.6 and 1.95.7 Expose Private Keys; Upgrade to 1.95.8
Dec 3, 2024, 10:43 PM
A significant security vulnerability has been identified in the Solana Web3.js library, specifically in versions 1.95.6 and 1.95.7. This vulnerability, described as a supply chain attack, allows malicious code to steal private keys from users and developers, potentially enabling attackers to drain crypto wallets. The compromised library is widely used in Solana decentralized applications (dApps). Users are advised to upgrade to version 1.95.8, which is unaffected by the issue. Several wallet providers, including Phantom, Solflare, and Brave Wallet, have confirmed that they are not impacted by this vulnerability, as they do not utilize the compromised versions of the library. The incident underscores the importance of security in the Web3 ecosystem, with various security teams actively monitoring the situation and providing guidance on how to check for potential impacts.
View original story
Less than $1 million • 25%
$1 million to $5 million • 25%
$5 million to $10 million • 25%
More than $10 million • 25%
Yes • 50%
No • 50%
Hyperliquid • 25%
dYdX • 25%
Pendle • 25%
Unstoppable Domains • 25%
Less than 10 • 25%
10 to 50 • 25%
51 to 100 • 25%
More than 100 • 25%
Less than 50% • 25%
50% to 75% • 25%
75% to 90% • 25%
More than 90% • 25%
Yes • 50%
No • 50%
Less than $800,000 • 25%
$800,000 to $1 million • 25%
$1 million to $1.5 million • 25%
More than $1.5 million • 25%
Less than $1.5M • 25%
$1.5M to $1.8M • 25%
$1.8M to $2M • 25%
More than $2M • 25%
Less than $10 million • 25%
$10 million to $20 million • 25%
$20 million to $30 million • 25%
More than $30 million • 25%
Brave Wallet • 25%
None • 25%
Phantom • 25%
Solflare • 25%
Upgrade to version 1.95.8 • 25%
Cease use of the library • 25%
Implement additional security checks • 25%
Switch to a different library • 25%