The Flow ecosystem has initiated a systematic response plan after discovering vulnerability attacks. The Flow Foundation, in collaboration with an independent security agency, conducted an in-depth investigation of the incident and developed a transparent remediation roadmap.



After the network reboot, token recipient accounts involved in fraudulent transactions will be placed under temporary restrictions. The core development team has proposed a software upgrade plan, intending to authorize the community governance committee to handle related fraudulent assets—this plan requires voluntary adoption by node operators.

The entire process includes several key steps: first, reaching consensus through validation nodes to confirm the restricted account list; then, an independent agency conducts on-chain evidence collection and verification for these accounts; next, malicious tokens are destroyed on-chain via smart contracts; finally, access is restored to accounts that meet the criteria. This mechanism fully embodies the principles of decentralized governance.

It is worth noting that subsequent protocol upgrades will revoke these temporary permissions to ensure the system returns to a fully decentralized state. Throughout the process, the Flow Foundation maintained a high level of transparency, allowing the community to track progress in real-time.
FLOW-19.62%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 4
  • Repost
  • Share
Comment
0/400
ApeWithNoFearvip
· 6h ago
This round of handling is quite good, transparency is indeed there, just worried about whether it will drag on like before... Flow's quick response this time shows some substance, the key is how they execute it later. It's both temporary permissions and community governance; ultimately, it still depends on node self-discipline, which is quite challenging. I agree with the operation of destroying fraudulent tokens; the handling of restricted accounts should be more cautious. From vulnerability to full decentralization, how long will this timeline take... This process looks good, but the real test is whether it can be completed according to the schedule. I don't really trust temporary permissions; there are many lessons from history.
View OriginalReply0
BearMarketMonkvip
· 7h ago
Uh... it's the same narrative of "transparent remediation" and "decentralized governance." History has shown us that after every crisis, they say it will return to decentralization. But what happens? Authority, like a ghost, always finds a reason to stay.
View OriginalReply0
ForkMongervip
· 7h ago
lol "transparent remediation roadmap" while literally centralizing account freezes... the governance theater is *chef's kiss*
Reply0
ChainWanderingPoetvip
· 7h ago
Oh, this move isn't bad, at least not passing the buck to the community --- Another temporary permission... Will it really be revoked this time? --- Destroying fraudulent tokens sounds good, but I'm just worried there might be more tricks later --- Decentralized governance? Forget it, it's still the foundation that calls the shots --- Transparency? Yeah right, I haven't seen the full restricted list --- Hey, this process is actually okay, at least it's not a direct freeze or destruction --- Can track progress, but I really can't understand it
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)