PANews reported on July 1 that regarding the news of "LayerZero suspected of having a serious vulnerability", Bryan Pellegrino, co-founder and CEO of LayerZero Labs, responded on the X platform: "This accusation is completely unfounded. First of all, the code mentioned was pushed in 2022, and all of them belong to application configuration rather than protocol configuration. The payload size limit is part of the application security configuration and is used to set up DVNs. Even in the latest version, the application can override this limit. If the application cannot override the configuration, LayerZero can prevent application message delivery by setting the 'payload limit' to 0, but this is contrary to the protocol design principles."
He further pointed out: "As stated in the previous response, it is not feasible to verify this vulnerability by forking and testing. If it can be achieved, it is just a special setting of a certain application, similar to the incorrect contract configuration of some applications on Ethereum. This is not a vulnerability, but part of the protocol design. Any messaging protocol that engraves such configurations into the protocol should have the ability to review any application. The two are closely linked and inseparable." LayerZero Labs emphasizes the robustness of its technology and firmly believes in the reliability of the censorship-resistant technology track.