According to PANews, a software vulnerability in the Bitcoin staking protocol Babylon has been disclosed, potentially allowing malicious validators to disrupt part of the network's consensus process. This issue, revealed by developers in a GitHub post on Thursday, could slow down block generation during critical periods.
The vulnerability affects Babylon's block signature scheme, known as the BLS voting extension scheme, which is used to confirm that validators have reached consensus on a block. Malicious validators could exploit this flaw by omitting the block hash field when sending vote extensions, leading to consensus issues among validators at network epoch boundaries.
The block hash field is crucial as it informs validators about the specific blocks they are supporting during the consensus process. By omitting this field, malicious validators could theoretically cause other validators to crash during critical consensus checks at phase boundaries. If multiple validators are affected, it could result in a slowdown of block generation.
While there have been no reports of this vulnerability being actively exploited, developers have warned that it could be abused if not addressed.