🚀 Gate Square “Gate Fun Token Challenge” is Live!
Create tokens, engage, and earn — including trading fee rebates, graduation bonuses, and a $1,000 prize pool!
Join Now 👉 https://www.gate.com/campaigns/3145
💡 How to Participate:
1️⃣ Create Tokens: One-click token launch in [Square - Post]. Promote, grow your community, and earn rewards.
2️⃣ Engage: Post, like, comment, and share in token community to earn!
📦 Rewards Overview:
Creator Graduation Bonus: 50 GT
Trading Fee Rebate: The more trades, the more you earn
Token Creator Pool: Up to $50 USDT per user + $5 USDT for the first 50 launche
Slow Fog released an analysis of the Cetus theft incident of $230 million: hackers exchanged a minimal amount of Tokens for massive Liquidity assets.
Odaily Planet Daily News Slowfog released an analysis of the $230 million theft of Cetus, which pointed out that the core of this incident is that the attacker carefully constructs parameters to make the overflow occur but can bypass detection, and finally exchange a very small amount of Token for a huge amount of liquid assets, the core reason is that there is an overflow detection bypass vulnerability in the checkedshlw in the getdeltaa function. This is where the attackers exploit this, causing the system to be severely skewed in calculating how much haSUI actually needs to be added. Since the overflow was not detected, the system misjudged the amount of haSUI needed, resulting in the attacker being able to exchange a large amount of liquid assets with only a small number of tokens, thus achieving the attack. This attack demonstrates the power of mathematical overflow vulnerabilities. The attacker precisely calculated and selected specific parameters, exploiting the flaws in the checkedshlw function to obtain liquidity worth billions at the cost of just 1 token. This is an extremely sophisticated mathematical attack, and it is recommended that developers strictly verify all boundary conditions of mathematical functions in smart contract development.