viem is vulnerable to Insufficient Entropy
50
Medium Risk
Affected versions of this package are vulnerable due to insufficient entropy in the signature algorithm. The nonce (or k) used in transaction signatures must be unique for every message. Reusing the same nonce across different messages allows attackers to exploit the weakness and recover the private key, compromising the security of the system.
You are affected if you are using a version which is within vulnerability ranges
viem is vulnerable to Insufficient Entropy in versions 0.2.0 - 2.21.48.
Upgrade the viem library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant