1.9 KiB
Cake Wallet - Weak Bitcoin Wallets
This folder is about vulnerable versions of Cake Wallet
which used the insecure Random::Random()
PRNG of the Dart
programming language to generate Bitcoin cryptocurrency wallets, resulting in extremely weak wallets.
Unlike other wallet software, the used mnemonic standard is Electrum
, not BIP39
, and the public usage is (to our knowledge) Bitcoin-specific.
See also:
- https://milksad.info/posts/research-update-6/
- https://milksad.info/posts/research-update-9/
- https://milksad.info/posts/research-update-10/
(incomplete article list)
Data
Hashed Mnemonic Seed of Discovered Wallets
File: cakewallet_weak_bitcoin_seeds_hashed_sorted_version1_2023_11.txt
A collection of hashes over the mnemonic secrets for all vulnerable wallets we discovered at the time of data set creation.
- Creation date: around 2023-11-24
- Detection: confirmed Bitcoin Mainnet usage of a
bc1
address on at least one of the sub-accounts, checked until #79 - Bitcoin Mainnnet address database from ca. early 2023-11
- Entry format: SHA-256 hash computed over the lowercase space-separated seed string without leading spaces, trailing spaces or newlines
- File format: newline-separated ASCII entries, sorted
- Additional comments: 12 word Electrum seed, "100" segwit prefix
Data example
Mnemonic: ensure finish energy title soccer frame audit ahead swim fee course shoe
Hash result: f56599f4353c6f5d4d01cf9a9c2548cc2a70d3684c127962515b681692ab2b3e
The example is a valid mnemonic but was unused at the time, and is therefore not included in the data set itself.
Publication Details
We provided this data set to the Cake Wallet
vendor on 2023-11-24 for public adoption into patched new app versions. The data allows for client-side checks in the application to spot and warn of a continued use of known-vulnerable wallets.
They merged it via https://github.com/cake-tech/cake_wallet/pull/1238/files on 2023-12-18.