Solana developers, validators and client side teams worked together on Wednesday to fix critical vulnerabilities
Solana developers, validators, and client side teams worked together to resolve a serious security bugs. Solana validator Laine said the process began on August 7, when the Solana Foundation contacted prominent network operators through private channels. The contact was part of a secret patching vulnerability strategy designed to prevent the vulnerability from being exploited in any way. The patch was made available through the GitHub repository of Anza engineers, enabling operators to independently verify and apply the changes. As of 14:00 UTC on Thursday, August 8, detailed instructions for implementing the patch were distributed to various stakeholders, ultimately securing 66.6% of the network equity. The vulnerability was only publicly disclosed after 70% of the networks had actually installed the patch.