Skip to content
  • Categories
  • Recent
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Slate)
  • No Skin
Collapse
Brand Logo

hashpwn

Home | Donate | GitHub | Matrix Chat | PrivateBin | Rules

  1. Home
  2. General Discussion
  3. Solflare Crypto Wallet Vulnerability - "xpass exploit"

Solflare Crypto Wallet Vulnerability - "xpass exploit"

Scheduled Pinned Locked Moved General Discussion
18 Posts 8 Posters 2.9k Views 8 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • oe3p32wedwO oe3p32wedw

    This vulnerability, as I understand, is directly related to the wallet files, and not to the algorithm?

    cycloneC Online
    cycloneC Online
    cyclone
    Admin Trusted
    wrote on last edited by cyclone
    #7

    @blandy Thanks! Hopefully Solflare users will transfer their crypto to a secure wallet before a threat actor exploits this in the wild.
    @oe3p32wedw That is correct. The encryption function Solflare used is similar to Phantom, which is secretbox with pbkdf2-sha256 KDF. To clarify, the encryption function is secure, but the vulnerability is what Solflare did after the encryption function.

    Sysadmin by day | Hacker by night | Go Dev | hashpwn
    3x RTX 4090 3x RTX 2080ti
    Forum Rules

    1 Reply Last reply
    0
    • tychotithonusT Offline
      tychotithonusT Offline
      tychotithonus
      Moderator Trusted
      wrote on last edited by
      #8

      Wow, amazing work!
      Suggestion: add a timeline to your GitHub info page, to document your interaction with the org.

      2x 4090 | 36x ZTEX 1.15y | hashcat / JtR / MDXfind

      1 Reply Last reply
      👍
      0
      • R Offline
        R Offline
        rickyc2024
        Banned
        wrote on last edited by
        #9

        Cyclone, this very much annoys me. How could you do this? I found this vulnerability and I had ALREADY reported it.

        1 Reply Last reply
        0
        • R Offline
          R Offline
          rickyc2024
          Banned
          wrote on last edited by
          #10
          This post is deleted!
          1 Reply Last reply
          0
          • cycloneC Online
            cycloneC Online
            cyclone
            Admin Trusted
            wrote on last edited by cyclone
            #11

            I independently found the vulnerability while reverse engineering the encryption function, wrote the solflare_pwn toolkit, and reported the vulnerability on Feb 12 to Solflare with a followup email on Feb 15. All of this with timestamps is disclosed on my post above.

            This is the 2nd time rickyc2024 has publicly taken credit for my solflare_pwn toolkit and my work on this project. To once again clarify, he has nothing to do with solflare_pwn or me discovering the vulnerability.

            @rickyc2024 has been banned.

            # EDIT 2025/02/21
            I've also banned his dup accounts below since running multiple accounts on the forum is not allowed. General Forum Rules: https://forum.hashpwn.net/post/11
            @rickyc2024 banned
            @rickyig2025 banned
            @donotban banned
            @youremail banned
            @jdjwjdiw banned

            Sysadmin by day | Hacker by night | Go Dev | hashpwn
            3x RTX 4090 3x RTX 2080ti
            Forum Rules

            1 Reply Last reply
            👍
            1
            • blandyB Offline
              blandyB Offline
              blandy
              Admin Trusted
              wrote on last edited by
              #12

              I can confirm I've worked with @cyclone and also have a working C# copy of the decrypter and also the vulnerability.

              Nice work @cyclone 🙂

              5x RTX 2080 Ti | 11x ZTEX v1.15y FPGA (bcrypt) | Cracker | Developer

              cycloneC 1 Reply Last reply
              👍 🍻
              1
              • blandyB blandy

                I can confirm I've worked with @cyclone and also have a working C# copy of the decrypter and also the vulnerability.

                Nice work @cyclone 🙂

                cycloneC Online
                cycloneC Online
                cyclone
                Admin Trusted
                wrote on last edited by
                #13

                @blandy Thanks, great job porting this over to C#!

                Sysadmin by day | Hacker by night | Go Dev | hashpwn
                3x RTX 4090 3x RTX 2080ti
                Forum Rules

                1 Reply Last reply
                👍
                0
                • cycloneC Online
                  cycloneC Online
                  cyclone
                  Admin Trusted
                  wrote on last edited by cyclone
                  #14

                  New GitHub Release:
                  https://forum.hashpwn.net/post/434

                  Sysadmin by day | Hacker by night | Go Dev | hashpwn
                  3x RTX 4090 3x RTX 2080ti
                  Forum Rules

                  1 Reply Last reply
                  👍
                  1
                  • D Offline
                    D Offline
                    dawp9duhn9gom
                    wrote last edited by
                    #15

                    @cyclone will you create versions of these for firefox aswell?

                    cycloneC 1 Reply Last reply
                    0
                    • D dawp9duhn9gom

                      @cyclone will you create versions of these for firefox aswell?

                      cycloneC Online
                      cycloneC Online
                      cyclone
                      Admin Trusted
                      wrote last edited by
                      #16

                      @dawp9duhn9gom
                      I can port the toolkit to Firefox if there is enough interest. However, I generally do not write tooling for Firefox due to the very low global usage only being approx 2%, while Chrome based browsers dominate the global usage at over 70%.

                      Sysadmin by day | Hacker by night | Go Dev | hashpwn
                      3x RTX 4090 3x RTX 2080ti
                      Forum Rules

                      1 Reply Last reply
                      0
                      • C Offline
                        C Offline
                        chpost
                        wrote last edited by
                        #17

                        @cyclone, So, more than a year has passed since you reported the issue to Solflare devs. Have they fixed it? If yes, can you disclose the details of that "xpass exploit"? What was the devs failure? Wasn't it related to AI vibe coding? 🙂

                        1 Reply Last reply
                        0
                        • cycloneC Online
                          cycloneC Online
                          cyclone
                          Admin Trusted
                          wrote last edited by
                          #18

                          Update: Details of the Solflare “xpass” Exploit

                          March 13, 2026

                          Over the past year I have received many requests asking when I would release the full details of the Solflare xpass exploit. Today, I am publishing those details.

                          This post serves as an update to my original disclosure in Feb 2025 regarding a purposeful backdoor master key I discovered in the Solflare Chrome wallet extension that allows a wallet vault to be decrypted without requiring the user's wallet password.

                          At the time of the original report I privately disclosed this to Solflare and delayed public publication to give Solflare time to address the exploit.


                          The Core Issue

                          Solflare stores two critical values inside the extension's LevelDB storage:

                          • solflaredata – encrypted wallet vault containing the seed phrase <-- this encrypted string contains the wallet seed phrase
                          • solflarexpass – a key used to decrypt the vault <-- the "backdoor master key"

                          Because the decryption key is stored locally alongside the encrypted vault, the user's wallet password is not required to decrypt the vault and gain access to the wallet's seed phrase.

                          All that is required to decrypt the wallet and gain access to the seed phrase is access to the Chrome extension storage and extraction of the solflarexpass key -- something very easy for a malicious actor or stealer malware to do.

                          Once the vault is extracted with the key, the seed phrase can be recovered. No password cracking required.


                          Example Storage Layout

                          Inside the Chrome Solflare extension storage database the relevant entries appear similar to:

                          solflaredata: {
                            "data":{
                              "digest":"sha256",
                              "encoding":"base64",
                              "encrypted64":"..."
                            }
                          }
                          
                          solflarexpass: "<stored key>"
                          

                          Using the key stored in solflarexpass, the encrypted vault (solflaredata) can be decrypted.

                          A screenshot of the original report is attached below.
                          c25dc614-d139-4de7-9c3b-da142cb773bb-image.png

                          Sysadmin by day | Hacker by night | Go Dev | hashpwn
                          3x RTX 4090 3x RTX 2080ti
                          Forum Rules

                          1 Reply Last reply
                          😲
                          1

                          Hello! It looks like you're interested in this conversation, but you don't have an account yet.

                          Getting fed up of having to scroll through the same posts each visit? When you register for an account, you'll always come back to exactly where you were before, and choose to be notified of new replies (either via email, or push notification). You'll also be able to save bookmarks and upvote posts to show your appreciation to other community members.

                          With your input, this post could be even better 💗

                          Register Login
                          Reply
                          • Reply as topic
                          Log in to reply
                          • Oldest to Newest
                          • Newest to Oldest
                          • Most Votes


                          homogenous-expeditionary
                          • Login

                          • Don't have an account? Register

                          • Login or register to search.
                          • First post
                            Last post
                          0
                          • Categories
                          • Recent