Responsible disclosures
A running log of vendor disclosures and public research. Findings appear here once a fix has shipped, the embargo has lifted, or the work has been published as research. Coordinate disclosures via [email protected].
-
x402 AI-agent wallet drain via slow-burn pricing (Vector 6)
high[ AI-AGENT WALLET IMPLEMENTATIONS (PUBLIC RESEARCH) ] · disclosed
AI agents use programmatic keypairs and auto-approve below price thresholds. A service that ramps pricing slowly after trust is established drains the agent without triggering the threshold.
-
x402 amount-string parser fuzzing (Vector 9)
medium[ COINBASE X402 PROTOCOL (PUBLIC RESEARCH) ] · disclosed
x402 amounts are JSON strings. "1000", "1e3", " 1000 ", "+1000", "01000" round-trip differently across implementations. Mismatch between the facilitator's validator and Solana's transfer is monetisable.
-
x402 partial-signing instruction injection (Vector 2)
high[ COINBASE X402 PROTOCOL (PUBLIC RESEARCH) ] · disclosed
Client builds and partially signs the VersionedTransaction. A facilitator that validates structure but not bytes can sign a tx with extra clawback / drain instructions appended.
-
x402 settlement race (Vector 1)
high[ COINBASE X402 PROTOCOL (PUBLIC RESEARCH) ] · disclosed
Multiple /settle calls succeed before on-chain confirmation when the facilitator's verify→settle pipeline lacks an atomic lock. Double-spend window equals blockhash validity (~60s).
-
x402 facilitator gas drain (Vector 3)
medium[ COINBASE X402 FACILITATOR IMPLEMENTATIONS (PUBLIC RESEARCH) ] · disclosed
Facilitator pays all fees, no per-client rate limit specified in the protocol. Crafted-failing-tx storms maximize CU consumption. Economic DoS against the facilitator.
-
SOLMAL: Solana x402 attack surface
research[ COINBASE X402 PROTOCOL (PUBLIC RESEARCH) ] · disclosed
Threat model for the x402 micropayment protocol on Solana. 9 attack vectors against the verify→settle pipeline plus AI-agent wallet-drain patterns. Public research, no specific vendor finding.
-
Rusty Pipes Exploit (proof-of-concept)
research[ PUBLIC RESEARCH (NPM ECOSYSTEM) ] · disclosed
PoC of using Rust to inject malicious code into npm packages and hijack the entire Node runtime.
-
Rust in Peace: How to Hijack Node.js with a Single Require
research[ PUBLIC RESEARCH (NODE.JS / NPM ECOSYSTEM) ] · disclosed
Long-form writeup on Rust-based supply-chain malware in the Node.js ecosystem and the mitigations needed at registry + runtime layers.
-
Rusty Pipes: an npm supply chain exploit
research[ PUBLIC RESEARCH (NPM ECOSYSTEM) ] · disclosed
Published research showing how a malicious package can detect packages a contributor maintains and inject a Rust binary into the next release.