This folder is about vulnerable versions of `Cake Wallet` which used the insecure `Random::Random()` PRNG of the `Dart` programming language to generate Bitcoin cryptocurrency wallets, resulting in extremely weak wallets.
Unlike other wallet software, the used mnemonic standard is `Electrum`, not `BIP39`, and the public usage is (to our knowledge) Bitcoin-specific.
See also:
* https://milksad.info/posts/research-update-6/
* https://milksad.info/posts/research-update-9/
* https://milksad.info/posts/research-update-10/
(incomplete article list)
## Data
### Hashed Mnemonic Seed of Discovered Wallets
A collection of hashes over the mnemonic secrets for all vulnerable wallets we discovered at the time of data set creation.
* Creation date: around 2023-11-24
* Detection: confirmed Bitcoin Mainnet usage of a `bc1` address on at least one of the sub-accounts, checked until #79
* Bitcoin Mainnnet address database from ca. early 2023-11
* Entry format: SHA-256 hash computed over the lowercase space-separated seed string without leading spaces, trailing spaces or newlines
We provided the 11/2023 version of this data set to the `Cake Wallet` vendor on 2023-11-24 for public adoption into patched new app versions. The data allows for client-side checks in the application to spot and warn of a continued use of known-vulnerable wallets.