#钱包安全事件 The Flow execution layer vulnerability resulted in the transfer of $3.9 million. However, there are several noteworthy details about this incident. First, the attacker only accessed liquidity rather than user deposits, indicating that the vulnerability trigger point was relatively limited. Second, the flow of funds has been traced to a clear path—bridging protocols such as Celer, Debridge, Relay, Stargate, and others have become the main exit points, and the attacker wallet has been marked, which means subsequent on-chain movements are basically transparent.



From a risk mitigation perspective, the key lies in the response speed at three levels: protocol fixes have been released, exchange freeze requests have been submitted, and real-time tracking of money laundering activities on Thorchain and Chainflip is ongoing. The scale of $3.9 million is relatively manageable, but the real concern is whether this funds can ultimately be recovered or locked—this depends on the efficiency of cross-chain bridge execution and the cooperation of exchanges.

It is recommended to closely monitor the whereabouts of these funds after exiting through Thorchain, as well as whether new signs of vulnerability exploitation appear. Similar execution layer vulnerabilities often imply that there are other undiscovered edge cases, and the completion of node deployment upgrades needs continuous observation.
FLOW-0,37%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
0/400
No comments
  • Pin

Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)