-
# Lines of code
# Vulnerability details
# Vulnerability details
The mitigation purpose of `ADD-06` is the following:
```
Mitigation for gas-intensive setUpAirdrop function and airdrop mechanism.…
-
Does `mt_deserialize` check for correctness of the tree, i.e., root is correct given the nodes in the tree?
-
Tutorial: Building an Merkle Tree Airdrop Contract using Solidity on Foundry
1. Introduction
Airdrops involve distributing tokens to a predefined set of addresses. A Merkle tree is a data structur…
-
Hi there! I am in the process of finishing off [this repo](https://github.com/silversixpence-crypto/dapol) which is an implementation of a paper specifying a protocol that exchanges can use for proof …
-
**Github username:** --
**Twitter username:** ACai_sec
**Submission hash (on-chain):** 0x9ac86aa605d08d80458fa9f58972eeaf0e04b5c018f35d4a4e4e4d19c854e9cb
**Severity:** high
**Description:**
**Descri…
-
- [ ] BMT proofs can be verified using a `verify` function:
- `verify` takes in the BMT proof set, the expected root, the proof index, and the total number of leaves
- `verify` returns `true` if…
-
The dapol security & privacy definitions rely on the tree being privately held by the custodian. It may be useful to be able to share the whole tree with a 3rd party. So it would then be necessary to …
-
### Open Task RFP for Porting over zk-kit circuits from Circom to Noir - 2
#### Executive Summary
- Project Overview: implement ecdh, poseidon-cipher, Incremental merkle tree, poseidon-proof in …
-
We may want to start with a smaller depth at first, and then go to a much larger one later as part of a circuit change. (Trading upfront cost for time.) This means the circuit will need to treat the t…
-
## Why?
* Backups can be authenticated as whole, not just individual VMs (at best).
* Atomicity: When computer crashes during backup, partial backup does not cause problems.
* It can obscure what…