We provide minimal counterexamples for the security of the BitVM3 garbling scheme presented in the BitVM3 ๐whitepaper.
Our attack allows the evaluator to forge input and output wires. Then we use the same idea to exhibit an attack on the forward label propagation garbling scheme proposed in the Instantiating BitVM3 from Label Forward Propagation ๐whitepaper. In both cases, the authenticity property of the garbling scheme is broken.
Read our findings ๐here: A note on the security of the BitVM3 garbling scheme