AFAIR LEA aren't a concern here. The classic example of a LEA attack vector is a badly designed HMAC in which the data to be authorised is appended *after* the secret key. Then you can add more data that is erroneously authorised. For a commitment to fixed length data this doesn't apply.
Haven't looked it up, but I *think * that's right.