You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hey @paulmillr, we're looking for an alternative library that would resolve this issue. We tried using your library@1.7.0 but it didn't work out as NEAR uses 64 byte keys(private key + public key concatenated) f.e E8rptqS9XcQ8RL5EHYCYRTFUXfqTasbseQa7CYPoNEBc7gJQoGkaPAe7cLg4doKkZPqbD6tBhFbBLxE1jv3rwek.
You can create your own key pair by:
NEAR_ENV=mainnet near generate-key your-account-name
This creates a json keypair at ~/.near-credentials/mainnet/your-account-name.json. Consequently, when we invoke
Your implementation of ed25519 accepts forged signatures, it's malleable.
To check this, LE-add curve order to a signature$S$ component. Verification would still pass.
It's pretty bad. To fix, switch to a better ed25519 library.
This issue was first reported 6 months ago.
The text was updated successfully, but these errors were encountered: