💥 Gate Square Event: #PostToWinPORTALS# 💥
Post original content on Gate Square related to PORTALS, the Alpha Trading Competition, the Airdrop Campaign, or Launchpool, and get a chance to share 1,300 PORTALS rewards!
📅 Event Period: Sept 18, 2025, 18:00 – Sept 25, 2025, 24:00 (UTC+8)
📌 Related Campaigns:
Alpha Trading Competition: Join for a chance to win rewards
👉 https://www.gate.com/announcements/article/47181
Airdrop Campaign: Claim your PORTALS airdrop
👉 https://www.gate.com/announcements/article/47168
Launchpool: Stake GT to earn PORTALS
👉 https://www.gate.com/announcements/articl
Nemo Protocol has launched a debt token program to provide funding for the $2.6 million vulnerability victims.
PANews reported on September 15 that the revenue trading platform Nemo Protocol, based on Sui, has launched a debt token compensation plan after being exploited. The core of the plan is the issuance of NEOM tokens equivalent to users' dollar losses. Nemo stated that although it wanted to compensate directly in USD, it lacked sufficient funds, so it adopted a debt token strategy. The goal is to ultimately compensate users for their principal losses based on the on-chain snapshot at the time the protocol was suspended. The protocol has established a three-step recovery plan: first, allow users to access a dedicated portal, transfer the remaining value of the damaged liquidity pool to a new contract, and during the migration, users will receive equivalent NEOM tokens; token holders can choose to exit through the AMM liquidity pool or retain the tokens to recover funds. Nemo also plans to launch a liquidity pool on Sui's main DEX to help users exit, and all recovered funds will be fully deposited into a redemption pool for claims, with some external funds also allocated to the pool for support. On September 7, according to the first disclosure by Shield, the Nemo Protocol liquidity pool was attacked, resulting in the theft of 2.6 million dollars. The attacker exploited a vulnerability in the code introduced by the developers, which was deployed without proper auditing.