You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Thank you for catching this! This shouldn't be too difficult to fix. Basically, we should detect an invalid depth (probably during deserialization) and just return an error.
As is currently implemented, if a malicious prover lies about the depth of their Merkle tree, it will cause the verifier to panic.
The panic can be reproduced by replacing this line in the test (
winterfell/crypto/src/merkle/tests.rs
Line 219 in 0acb2a1
with
is this an inherent limitation or can this be worked around?
The text was updated successfully, but these errors were encountered: