Why Is a Trusted Setup a Potential Vulnerability in zk-SNARKs?
The trusted setup generates the initial public parameters for the zk-SNARK system. If the "toxic waste" ▴ a secret piece of data generated during the setup ▴ is not immediately and verifiably destroyed, the person who holds it could potentially create counterfeit proofs.
This would allow them to mint fake coins or perform other malicious actions without being detected, undermining the system's integrity.