The proposed "batch" revision (XLS-56) of the XRP Ledger contains a serious vulnerability that could allow an attacker to steal wallet funds without the private key. The vulnerability was discovered and fixed before it was officially enabled. It was found by an independent researcher and an AI tool, involving a loop error that bypasses validation checks. An emergency fix in Rippled 3.1.1 has marked this revision as unsupported, and a comprehensive patch is currently under review. User funds are not at any risk.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
The proposed "batch" revision (XLS-56) of the XRP Ledger contains a serious vulnerability that could allow an attacker to steal wallet funds without the private key. The vulnerability was discovered and fixed before it was officially enabled. It was found by an independent researcher and an AI tool, involving a loop error that bypasses validation checks. An emergency fix in Rippled 3.1.1 has marked this revision as unsupported, and a comprehensive patch is currently under review. User funds are not at any risk.