The HonkVerifier contract is the core trust anchor of the protocol:
It validates ZK proofs generated off-chain
Only valid proofs should unlock rewards
An invalid verifier breaks the entire security model
Users assume the deployed verifier exactly matches the audited circuit.
The deployment script deploys whatever Verifier.sol exists locally with:
No bytecode hash verification
No circuit commitment validation
No protection against modified or malicious build artifacts
Likelihood:
Occurs in multi-developer environments
Occurs when build artifacts are regenerated
Occurs when CI pipelines cache incorrect outputs
Occurs via supply-chain compromise
Impact:
Fake proofs can drain all ETH
Legitimate proofs can be permanently rejected
Trustless ZK security collapses entirely
Loss is total and irreversible
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.
The contest is complete and the rewards are being distributed.