secdsa.py had a vulnerability in line 165. When second \in [0, 9] it will return hotp.at( 0 ) that enables the ECDSA attack with repeated k.
The challenge had a 10 second cooldown so it wasn't possible to get immediately 2 signatures with the same k.
The solution was to get the first signature in the 10 first seconds of a minute, then wait around a minute and get the second siganture (again in the first 10 seconds of the minute).