|

XRP Ledger nearly shipped a feature that could drain accounts without owners signing

Ripple unveils institutional-focused roadmap for XRPL with native lending protocol and ZKP features

A safety flaw in a proposed XRP Ledger (XRPL) improve could have enabled unauthorized transactions, however researchers flagged the problem earlier than it could attain the blockchain’s important community.

The XRPL Foundation said Feb. 26 that the vulnerability was discovered within the proposed “Batch” modification, a feature meant to let customers bundle a number of actions into a single atomic transaction.

Security researcher Pranamya Keshkamat and Cantina AI’s autonomous static-analysis device, Apex, reported the problem Feb. 19, in line with the muse.

If the modification had been activated with the bug in place, an attacker could have executed interior transactions as in the event that they had been approved by one other account, without entry to that person’s non-public keys.

That could have enabled unauthorized fund transfers and adjustments to ledger settings beneath a sufferer’s account, despite the fact that the sufferer didn’t signal the transaction.

The disclosure comes as XRPL has been positioning itself to be used instances corresponding to tokenization and different compliance-sensitive actions, the place perceived safety and reliability are central to institutional adoption.

Understanding XRPL’s vital Batch modification safety flaw

The proposed Batch modification modified how authorization would work on the XRP Ledger by permitting a number of “interior” transactions to be bundled into a single “outer” Batch transaction, so that all steps both succeed or fail collectively.

That atomic construction can cut back execution danger for builders operating multi-step operations. It additionally creates a new authorization boundary.

In the Batch design, interior transactions are deliberately unsigned. Instead, authority is delegated to a checklist of batch signers connected to the outer transaction, making the signer-validation code a vital management level.

If these checks fail, the ledger can deal with unauthorized actions as legitimate.

The disclosure stated the bug stemmed from a loop error within the operate that validates batch signers.

When the code encountered a signer whose account didn’t but exist on the ledger and whose signing key matched that similar account, a regular state for a newly created account, it returned success instantly and stopped checking the remainder of the signer checklist.

That situation was extra harmful in a batching system than it sounds. A batch can embrace steps that create accounts inside the identical atomic sequence, that means whether or not an account exists at validation time turns into a part of the authorization boundary.

The report stated an attacker could have inserted a legitimate signer entry for a not-yet-created account they managed, triggered the premature-success situation, and bypassed validation of a solid signer entry claiming to authorize a sufferer account.

If Batch had activated earlier than the flaw was caught, the implications could have been severe.

The Foundation stated an attacker could have executed interior Payment transactions that drained sufferer accounts right down to the reserve. The similar bug could even have enabled unauthorized account-level operations, together with AccountSet, TrustSet, and doubtlessly AccountDelete.

That would have amounted to a “spend without keys” situation, the form of safety failure that could cause reputational harm even when losses are restricted and addressed rapidly.

Ripple unveils institutional-focused roadmap for XRPL with native lending protocol and ZKP features
Related Reading

Ripple unveils institutional-focused roadmap for XRPL with native lending protocol and ZKP features

The ZKP integration will enable proving KYC compliance without revealing personal details, allowing auditors to verify activity while protecting counterparty transaction data.

Sep 22, 2025
·
Gino Matos

The flaw could have shattered XRPL’s safety veneer

The flaw could have broken XRPL’s security narrative at a sensitive time for the network, which is aggressively expanding into real-world asset (RWA) tokenization and institutional DeFi.

Data from DeFiLlama reveals that XRPL has round $50 million in complete DeFi values locked on the platform, with nearly $2 billion in RWA property.

In crypto markets, authorization failures typically form notion lengthy after the underlying technical challenge is resolved.

For a ledger positioning itself as infrastructure for regulated finance, such an incident would have carried broader implications.

This is particularly true contemplating XRPL lately launched a new set of institution-focused features, including Permissioned Domains and DEXs.

These options are designed to create gated buying and selling venues the place solely accredited members can place and take orders. The mannequin is aimed toward establishments that need blockchain-based settlement without open entry to all counterparties.

Thus, the safety challenge would have undermined that message. A community can not simply be market-controlled or compliance-focused in on-chain environments, whereas a proposed transaction improve carries the danger of unauthorized actions involving arbitrary accounts.

XRP holds 63% of this T-bill token supply but barely any of the trading, and that’s a problem
Related Reading

XRP holds 63% of this T-bill token supply but barely any of the trading, and that’s a problem

Supply can sit on one chain while trading and collateral gravity lives on another, and TBILL makes that split obvious.

Feb 16, 2026
·
Gino Matos

How XRPL averted the safety incident

XRPL’s response moved by way of governance and software program channels rapidly.

The unique Node List (UNL) of trusted validators was contacted and suggested to vote “No” on the Batch modification.

On Feb. 23, XRPL printed rippled 3.1.1, an emergency launch that marks each Batch and repairBatchInnerSigs as unsupported. That prevented the amendments from receiving validator votes or being activated on the community.

The launch was designed as instant containment, not a full restore. The disclosure explicitly said that the three.1.1 launch doesn’t embrace the underlying logic repair.

XRPL additionally scheduled a devnet reset for March 3, 2026, to coincide with the three.1.1 change. That reset applies to Devnet solely, not mainnet, however it reveals the extent to which the community’s operators moved to maintain the issue from affecting energetic modification paths.

A corrected alternative, BatchV1_1, has already been applied and is beneath assessment, with no launch date set.

According to the disclosure, the total repair removes the early exit, provides additional authorization guards, and narrows the scope of the signing test.

The report additionally laid out a broader safety roadmap, together with extra standardized AI-assisted audits, expanded static-analysis checks for harmful loop exits, and a assessment of comparable patterns elsewhere within the codebase.

Sidechains pay, XRPL won’t — the real tug-of-war over staking and XRP’s future
Related Reading

Sidechains pay, XRPL won’t — the real tug-of-war over staking and XRP’s future

XRP users seek yields in sidechains as staking considerations spark discussions on altering XRPL’s incentive-free system.

Nov 19, 2025
·
Oluwapelumi Adejumo

The subsequent take a look at is delivery the alternative safely

For XRPL, February’s consequence will depend as a governance success. The bug was discovered earlier than activation. Validators coordinated. An emergency launch blocked the modification path. No funds had been misplaced.

But the story doesn’t finish there.

BatchV1_1 will now be judged on two ranges. The first is technical, whether or not it delivers the developer advantages of atomic transaction bundling without reopening authorization danger.

The second is procedural, whether or not XRPL’s governance and engineering systems can preserve tempo with an increasing feature set aimed toward institutional adoption.

That is the true backdrop to this near-miss. XRPL is attempting to develop into a broader monetary platform, one that can host gated buying and selling venues, permissioned environments, and extra refined transaction logic, whereas additionally attracting builders with ecosystem capital and product breadth.

The extra bold that roadmap turns into, the extra essential boring issues like signer validation and loop conduct turn out to be.

Understanding XRP network health in 2026 without the counting noise
Related Reading

Understanding XRP network health in 2026 without the counting noise

Build a watchlist that flags participation shifts and separates exchange spikes from true payment usage.

Feb 18, 2026
·
Liam ‘Akiba’ Wright

In this case, the brakes labored. The subsequent problem is to show the system can speed up once more without dropping that margin of security.

The submit XRP Ledger nearly shipped a feature that could drain accounts without owners signing appeared first on CryptoSlate.

Similar Posts