BotBeat
...
← Back

> ▌

Dusk NetworkDusk Network
RESEARCHDusk Network2026-04-30

Critical Vulnerability in Dusk Network's PLONK Implementation Enables Arbitrary Token Minting

Key Takeaways

  • ▸Four unvalidated polynomial commitments in dusk-plonk's verification step could enable arbitrary token minting and forged transactions
  • ▸A malicious prover could set selector evaluation values to bypass all transaction circuit constraints
  • ▸The vulnerability directly threatened ~$60M in Dusk Network value and the integrity of its shielded transaction system
Source:
Hacker Newshttps://osec.io/blog/2026-04-30-unverified-evaluations-dusk-plonk/↗

Summary

Security researchers discovered a critical soundness vulnerability in dusk-plonk, the PLONK zero-knowledge proof implementation securing Dusk Network's privacy layer and approximately $60 million in DUSK tokens. The vulnerability allows a malicious prover to forge valid-appearing proofs for completely false statements by exploiting unvalidated polynomial commitment evaluations in the verification step.

The root cause: the PLONK verifier never validated four public selector evaluations that the prover could insert into the proof structure. The verifier would consume these values in its final equation without checking them against the trusted commitments in the verifier key. A malicious actor could set these evaluations to any values needed to make the equation pass, completely bypassing every constraint in the transaction circuit.

On the live Rusk network, exploitation would enable attackers to mint arbitrary amounts of DUSK from nothing and forge shielded fund transfers that appear legitimate to all network participants. The discovery highlights the extreme precision required in zero-knowledge proof implementations, where even small verification gaps can compromise an entire financial system.

  • This underscores why zero-knowledge proof implementations require exhaustive, line-by-line verification against formal specifications

Editorial Opinion

Zero-knowledge proofs are foundational to privacy-preserving blockchain systems, but this vulnerability in a widely-used PLONK library demonstrates how easily subtle gaps in verification logic can create catastrophic security failures. The discovery is a stark reminder that cryptographic code—no matter how mathematically sound the underlying protocol—requires meticulous implementation review. As ZK proofs become central to Web3 infrastructure securing billions in assets, the bar for implementation rigor cannot be too high.

Finance & FintechCybersecurityPrivacy & Data

Comments

Suggested

CanonicalCanonical
UPDATE

Canonical to Integrate AI Features into Ubuntu with Optional Disable

2026-04-30
Anysphere (Cursor)Anysphere (Cursor)
POLICY & REGULATION

House Panels Launch Investigation Into U.S. Companies' Use of Chinese AI Models

2026-04-30
TheoriTheori
RESEARCH

Theori's AI Platform Discovers Nine-Year-Old Critical Linux Vulnerability in One Hour

2026-04-30
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us