🎉 Share Your 2025 Year-End Summary & Win $10,000 Sharing Rewards!
Reflect on your year with Gate and share your report on Square for a chance to win $10,000!
👇 How to Join:
1️⃣ Click to check your Year-End Summary: https://www.gate.com/competition/your-year-in-review-2025
2️⃣ After viewing, share it on social media or Gate Square using the "Share" button
3️⃣ Invite friends to like, comment, and share. More interactions, higher chances of winning!
🎁 Generous Prizes:
1️⃣ Daily Lucky Winner: 1 winner per day gets $30 GT, a branded hoodie, and a Gate × Red Bull tumbler
2️⃣ Lucky Share Draw: 10
The Flow ecosystem has initiated a systematic response plan after discovering vulnerability attacks. The Flow Foundation, in collaboration with an independent security agency, conducted an in-depth investigation of the incident and developed a transparent remediation roadmap.
After the network reboot, token recipient accounts involved in fraudulent transactions will be placed under temporary restrictions. The core development team has proposed a software upgrade plan, intending to authorize the community governance committee to handle related fraudulent assets—this plan requires voluntary adoption by node operators.
The entire process includes several key steps: first, reaching consensus through validation nodes to confirm the restricted account list; then, an independent agency conducts on-chain evidence collection and verification for these accounts; next, malicious tokens are destroyed on-chain via smart contracts; finally, access is restored to accounts that meet the criteria. This mechanism fully embodies the principles of decentralized governance.
It is worth noting that subsequent protocol upgrades will revoke these temporary permissions to ensure the system returns to a fully decentralized state. Throughout the process, the Flow Foundation maintained a high level of transparency, allowing the community to track progress in real-time.