<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[How the BLS Vote Extension Vulnerability Works]]></title><description><![CDATA[<p dir="auto"><img src="/forum/assets/uploads/files/1768034917890-63f2d000-5a60-4877-962b-3c8778148f1b-image.png" alt="63f2d000-5a60-4877-962b-3c8778148f1b-image.png" class=" img-fluid img-markdown" /></p>
<p dir="auto">The vulnerability centers on Babylon’s BLS vote extension, which helps validators prove agreement on blocks. By omitting the block hash field, a malicious validator can cause other validators to fail during consensus checks, potentially triggering runtime errors.</p>
<p dir="auto">While the issue has not been reported as actively exploited, contributors warned that repeated crashes at epoch boundaries could degrade network performance. Developers emphasized that leaving the bug unresolved could expose the system to coordinated disruption attempts.</p>
]]></description><link>https://undeads.com/forum/topic/13671/how-the-bls-vote-extension-vulnerability-works</link><generator>RSS for Node</generator><lastBuildDate>Mon, 06 Apr 2026 00:26:38 GMT</lastBuildDate><atom:link href="https://undeads.com/forum/topic/13671.rss" rel="self" type="application/rss+xml"/><pubDate>Sat, 10 Jan 2026 08:48:39 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to How the BLS Vote Extension Vulnerability Works on Sat, 10 Jan 2026 17:02:23 GMT]]></title><description><![CDATA[<p dir="auto">one validator crashing is whatever, but coordinated disruption is the real nightmare</p>
]]></description><link>https://undeads.com/forum/post/36188</link><guid isPermaLink="true">https://undeads.com/forum/post/36188</guid><dc:creator><![CDATA[96f402f86e]]></dc:creator><pubDate>Sat, 10 Jan 2026 17:02:23 GMT</pubDate></item></channel></rss>