
RippleX, the development arm of Ripple, has commented on a vulnerability classified as critical in the “Batch” amendment (XLS-56) of the XRP Ledger and at the same time announced consequences for the security process.
J. Ayo Akinyele, Head of Engineering at RippleX, explained on Tuesday via X that the error had been discovered by Cantina AI last week and confirmed as critical. It was important that the vulnerability “could not be exploited on the mainnet”. The amendment was not activated.
As an immediate measure, a hotfix has been released to disable both XLS-56 and a related fix amendment while a broader fix is implemented and reviewed. However, Akinyele acknowledged that the process raises questions about the control mechanisms in the XRP Ledger amendment process:
“The batch amendment is further along than it should have been. As active participants in the life cycle of an amendment, we share responsibility for ensuring that testing, signaling and activation protection mechanisms meet the highest standards. In this case, we must do better.”
The Ripple developer emphasized that the amendment process itself worked. According to Akinyele, the standardized process prevented XLS-56 from being activated on the mainnet. Nevertheless, the error came to light too late. “These protective measures are important,” said Akinyele. “But they should be the last line of defense, not the first.”
The central question, according to Akinyele, is how the security architecture around XRPL amendments needs to be tightened. However, Akinyele also emphasized that Ripple cannot bear sole responsibility. Developers, validators, the XRPL Foundation and external security researchers would have to bear this together:
“No single entity controls activation. No single entity bears the risk alone. This is a consequence of decentralization and a strength, but requires layered security precautions. Validators should not be auditors […].“
Akinyele announced several changes in this regard. In the future, releases of greater significance will be independently audited several times, in coordination with the XRPL Foundation. The company also wants to expand the bug bounty program and more formalize test campaigns before activation.
Ripple pays particular attention to the use of AI in software development. According to Akinyele, AI-supported code reviews, automated detection of invariants, agentic fuzzing systems and simulated attack scenarios should become part of the security process:
“AI does not replace experienced C++ engineers. But it complements them – especially in cases where subtle logical interactions at critical points can create disproportionate risks.”
At the same time, Ripple says it is working on formal verification for particularly risky components of the ledger. The aim is to demonstrate security properties of critical building blocks, to model the behavior of amendments before activation and to standardize verification requirements for consensus-critical code.
No Comments