Check if keccak-tiny is impacted by CVE-2022-37454
Looks like at some generic SHA-3 implementations suffer from a buffer overflow described a bit more in depth here: https://mouha.be/sha-3-buffer-overflow/
I guess we should look if our fallback implementation suffers from this as well?