Skip to content
This repository has been archived by the owner on Sep 20, 2024. It is now read-only.

Commit

Permalink
Update link
Browse files Browse the repository at this point in the history
  • Loading branch information
zemse committed Jan 1, 2024
1 parent e706ec4 commit 1c4514d
Show file tree
Hide file tree
Showing 3 changed files with 9 additions and 9 deletions.
8 changes: 4 additions & 4 deletions Cargo.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

6 changes: 3 additions & 3 deletions Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -55,9 +55,9 @@ console_error_panic_hook = { version = "0.1.7", optional = true }
getrandom = { version = "0.2", features = ["js"], optional = true }

[patch."https://github.com/privacy-scaling-explorations/zkevm-circuits"]
bus-mapping = { git = "https://github.com/zemse/zkevm-circuits", rev = "16507249", default-features = false, optional = true }
eth-types = { git = "https://github.com/zemse/zkevm-circuits", rev = "16507249", optional = true }
zkevm-circuits = { git = "https://github.com/zemse/zkevm-circuits", rev = "16507249", default-features = false, optional = true }
bus-mapping = { git = "https://github.com/proof-of-exploit/zkevm-circuits", rev = "16507249", default-features = false, optional = true }
eth-types = { git = "https://github.com/proof-of-exploit/zkevm-circuits", rev = "16507249", optional = true }
zkevm-circuits = { git = "https://github.com/proof-of-exploit/zkevm-circuits", rev = "16507249", default-features = false, optional = true }

# for local development only
# [patch."https://github.com/privacy-scaling-explorations/zkevm-circuits"]
Expand Down
4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,13 +4,13 @@ Security researchers can prove that a smart contract can be exploited without re

Bug bounty managers receiving lot of bug reports can easily screen bug reports.

For example, here is a [repository](https://github.com/zemse/proof-of-exploit-huff-template) which demonstrates exploiting a re-entrancy vulnerability and here is it's proof of exploit https://proofofexplo.it/verify/Qmek2Mo43HgFn3B6kjMHXBLznqbxyiyxMbTV9sYbJ4oKwE
For example, this [repository](https://github.com/zemse/proof-of-exploit-huff-template) demonstrates exploiting a re-entrancy vulnerability and here is it's [proof of exploit](https://proofofexplo.it/verify/Qmek2Mo43HgFn3B6kjMHXBLznqbxyiyxMbTV9sYbJ4oKwE).

## Technical details

This project depends on:

- [fork of PSE/zkevm-circuits](https://github.com/zemse/zkevm-circuits) for the zk stuff.
- [fork of PSE/zkevm-circuits](https://github.com/proof-of-exploit/zkevm-circuits) for the zk stuff.
- [anvil](https://github.com/foundry-rs/foundry/tree/master/anvil) for spawning in-memory mainnet fork chain.

A block is locally mined containing the transaction which solves challenge. This block is used as a witness to the [SuperCircuit](https://github.com/privacy-scaling-explorations/zkevm-circuits/blob/7e9603a28a818819c071c81fd2f4f6b58737dea6/zkevm-circuits/src/super_circuit.rs#L270).
Expand Down

0 comments on commit 1c4514d

Please sign in to comment.