💥 Gate Square Event: #PostToWinTRUST 💥
Post original content on Gate Square related to TRUST or the CandyDrop campaign for a chance to share 13,333 TRUST in rewards!
📅 Event Period: Nov 6, 2025 – Nov 16, 2025, 16:00 (UTC)
📌 Related Campaign:
CandyDrop 👉 https://www.gate.com/announcements/article/47990
📌 How to Participate:
1️⃣ Post original content related to TRUST or the CandyDrop event.
2️⃣ Content must be at least 80 words.
3️⃣ Add the hashtag #PostToWinTRUST
4️⃣ Include a screenshot showing your CandyDrop participation.
🏆 Rewards (Total: 13,333 TRUST)
🥇 1st Prize (1 winner): 3,833
Balancer preliminary report discloses V2 Composable Pool attack path and recovery progress
Wu reported that Balancer pointed out in the preliminary incident report that the attack originated from the rounding logic of the upscale function in the V2 Composable Stable Pools under the EXACT_OUT path. When the scaling factor is a non-integer, this function produces exploitable precision errors. The attacker combined this with the delayed settlement mechanism of batchSwap (which allows assets to be temporarily borrowed during the transaction and returned at the end), as well as the design where BPT is treated as a regular Token, allowing for bypassing the minimum pool share limit, which reduced the liquidity in the pool to extremely low levels, enabling the manipulation of the pool balance and the extraction of funds. The vulnerability only affects the CSPv5 pool after the pause window has passed; CSPv6 has been automatically paused by Hypernative and is unaffected. Other pool types in V2 and the V3 architecture are also unaffected, and exchanges and liquidity operations in the unaffected pools can still proceed normally. Currently, the CSPv6 pool has entered recovery mode, supporting proportional withdrawals of underlying assets; the CSPv5 pool is still under investigation, and users are advised not to interact for now.