dfx identity whoami # record CURRENT_IDENTITY
dfx identity new <NEW_IDENTITY_NAME>
dfx identity use <NEW_IDENTITY_NAME>
dfx identity get-principal <NEW_IDENTITY_NAME> # record NEW_IDENTITY_PRINCIPAL
dfx identity use <CURRENT_IDENTITY>
dfx canister update-settings --ic <CANISTER> --add-controller <NEW_IDENTITY_PRINCIPAL>
dfx canister update-settings --ic <CANISTER> --remove-controller `535yc-uxytb-gfk7h-tny7p-vjkoe-i4krp-3qmcl-uqfgr-cpgej-yqtjq-rqe`
For more details on canister management, please visit here
If you have funds on ledgers using a browser wallet, please check if the account principal matches 535yc-uxytb-gfk7h-tny7p-vjkoe-i4krp-3qmcl-uqfgr-cpgej-yqtjq-rqe. If it does, please create a new account and transfer the funds to the new account immediately.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| @dfinity/identity | npm | >= 0.20.0-beta.0, < 1.0.1 | 1.0.1 |
| @dfinity/auth-client | npm | >= 0.20.0-beta.0, < 1.0.1 | 1.0.1 |
The vulnerability description explicitly identifies Ed25519KeyIdentity.generate as the vulnerable entry point. The CWE-330 (Insufficient Randomness) mapping confirms the insecure random value generation aspect. The workaround requiring explicit null passing (generate(null)) indicates broken parameter validation logic. The PR reference shows the fix involved correcting the seed generation path when no parameter is provided. While exact file paths aren't explicitly stated, standard agent-js project structure places Ed25519 key logic in identity package's keys directory.
KEV Misses 88% of Exploited CVEs- Get the report