A sophisticated attacker could forge invalid proofs that the on-chain verifier would still accept. This would have allowed unauthorized actions such as minting unlimited tokens or withdrawing tokens from other accounts. CoinDesk: Bitcoin, Ethereum, Crypto News and Price Data Read More