Solana Labs Challenges Allegations of Security Issues with CertiK’s Saga Phone

Concerns Raised by CertiK

Blockchain security firm CertiK recently released a video that raised concerns about a potential security vulnerability in Solana’s crypto-enabled Saga phone.

CertiK claimed that the Saga phone contained a “critical vulnerability” known as a “bootloader unlock” attack, which they suggested could allow malicious actors to install a hidden backdoor in the device.

They further asserted that this could compromise sensitive data, including cryptocurrency private keys.

Solana Labs’ Response

In response, Solana Labs disputed CertiK’s claims, stating that the video did not reveal any legitimate threat to the Saga device.

According to Solana Labs, unlocking the bootloader and installing custom firmware would require multiple steps, which can only be performed after unlocking the device with the user’s passcode or fingerprint.

Additionally, unlocking the bootloader would result in the device being wiped, a process that users are made aware of through multiple warnings. This means that the process cannot take place without the user’s active participation and awareness.

Solana Saga Phone Details

The Solana Saga phone, initially priced at $1,099 when it was released in April 2022, aimed to provide users with a Web3-native decentralized application store, integrating cryptocurrency applications into the device’s hardware.

However, four months after its launch, Solana reduced the phone’s price to $599 due to a decline in sales.

Industry Perspectives

It is essential to note that CertiK’s claims and Solana Labs’ response highlight the ongoing debates and discussions within the blockchain and crypto industry regarding security vulnerabilities and their potential impact on users.

While concerns about security should not be dismissed, Solana Labs has argued that the claimed vulnerability is not as straightforward to exploit as initially suggested by CertiK.


As the industry continues to evolve, maintaining robust security standards and addressing potential threats remains a priority for both companies and users in the crypto space.

Leave a Reply

Your email address will not be published. Required fields are marked *