The secp256k1 implementation of Solana has drawn community attention. It is reported that the development team referred to Ethereum's modexp scheme when building this encryption algorithm, and the performance is indeed impressive. However, the problem lies in the fact that only after deploying to the Mainnet was it discovered that this implementation has a significant denial-of-service (DoS) attack vector. Ironically, the developers apparently did not conduct an accurate cost assessment of this security risk and simply disabled the feature. This "enter a position and then pay" approach has sparked considerable discussion within the ecosystem and serves as a reminder for developers to maintain a more cautious balance between performance optimization and security protection.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
11 Likes
Reward
11
4
Repost
Share
Comment
0/400
rekt_but_vibing
· 18h ago
Enter a position first and then buy a ticket, this is the daily life of web3, haha.
View OriginalReply0
SerumSquirter
· 18h ago
This is a typical "land grabbing" mentality, rushing in as long as the performance is good, and dealing with problems later.
View OriginalReply0
ReverseTrendSister
· 18h ago
Enter a position first and then buy the ticket, this is the norm of web3... Performance optimization completely disregarding security and directly launching on Mainnet, it's a typical old trick.
View OriginalReply0
BearMarketHustler
· 18h ago
Uh... SOL is doing this again? Performance first, security second, this trick is getting old.
---
Typical "launch first, aim later"; the ecosystem is just being experimented on.
---
The key is they can boldly disable features; if it were me, I'd have gone bankrupt long ago.
---
Jumping on the ETH scheme without thorough research before going to Mainnet, really daring.
---
Only discovering vulnerabilities on the Mainnet... how insecure can one be?
---
If you can't even handle DoS vulnerabilities, how can we talk about performance optimization? It's laughable.
---
That's why I still prefer conservative chains; stable earnings without the hassle.
---
Directly disabling features? It would be better not to boast about any performance innovation from the start.
---
Deploying without proper cost assessment? This risk management is a bit ridiculous.
The secp256k1 implementation of Solana has drawn community attention. It is reported that the development team referred to Ethereum's modexp scheme when building this encryption algorithm, and the performance is indeed impressive. However, the problem lies in the fact that only after deploying to the Mainnet was it discovered that this implementation has a significant denial-of-service (DoS) attack vector. Ironically, the developers apparently did not conduct an accurate cost assessment of this security risk and simply disabled the feature. This "enter a position and then pay" approach has sparked considerable discussion within the ecosystem and serves as a reminder for developers to maintain a more cautious balance between performance optimization and security protection.