Skip to content

Commit 344d11f

Browse files
authoredJul 18, 2024
Update README.md
1 parent 0d909e9 commit 344d11f

File tree

1 file changed

+5
-0
lines changed

1 file changed

+5
-0
lines changed
 

‎README.md

+5
Original file line numberDiff line numberDiff line change
@@ -235,6 +235,11 @@ We have a number of mitigations against this attack:
235235

236236
When the issuer detects a site is attacking its token supply, it can fail redemption (before the token is revealed) based on the referring origin, and prevent browsers from spending tokens there.
237237

238+
### Issuer Exhaustion
239+
240+
Given a cap on the issuers usable per top-level origin, there might be a race between third-party scripts to call `hasPrivateToken(issuer)` to ensure their preferred issuer is available.
241+
The top-level document can control this process by calling `hasPrivateToken(issuer)` for its preferred issuers before any other scripts are loaded.
242+
This would ensure the availability of the desired issuers and prevent a race to determine availability.
238243

239244
### Double-Spend Prevention
240245

0 commit comments

Comments
 (0)