14:41:36 ok, i think this doesn't fix the problem, because the transfer function doesn't let you select inputs > <@jeffro256> https://github.com/monero-project/monero/pull/10281 14:41:45 so say a legitimate user did transfer, and the tx failed during the multisig step 14:41:49 and then a new block comes 14:41:50 and new inputs come in 14:41:56 and then the transfer function picks entirely different inputs 14:42:01 now you're bricked 14:42:10 because you can't distinguish this and the malicious ca 14:42:32 but you also can't make the transfer using the initial inputs 14:43:29 separately, the vuln response process readme https://github.com/monero-project/meta/blob/master/VULNERABILITY_RESPONSE_PROCESS.md doesn't have a valid link to see the current pool available to pay bounties 16:04:55 Its kind of hacky, but you can freeze of all the other inputs , then transfer, then thaw them all