Why Is a Trusted Setup a Potential Vulnerability in zk-SNARKs?

The trusted setup generates the initial public parameters for the zk-SNARK system. If the "toxic waste" ⎊ a secret piece of data generated during the setup ⎊ is not immediately and verifiably destroyed, the person who holds it could potentially create counterfeit proofs.

This would allow them to mint fake coins or perform other malicious actions without being detected, undermining the system's integrity.

What Are the Key Differences between zk-SNARKs and zk-STARKs?
Explain the ‘Trusted Setup’ Requirement for Some zk-SNARK Implementations
What Is the Risk Associated with a ‘Trusted Setup’ in zk-SNARKs?
Can zk-SNARKs or zk-STARKs Be Used to Verify the Collateral in a Derivative Contract?
Does a 51% Attack Allow the Attacker to Mint New Coins or Alter the Total Supply?
Is the Overhead Different for ZK-SNARKs versus ZK-STARKs?
How Does ‘zk-SNARKs’ Differ from Ring Signatures in Achieving Anonymity?
What Does “Not the Obligation” Mean for an Option Holder?

Glossar