🥳 Earning Growth Points can Win an iPhone 16?
🔥 Gate Post Growth Points Summer Lucky Draw Round 1️⃣ 1️⃣ Is Live!
🎁Prize pool over $10,000! Win iPhone 16 Pro Max 512G, exclusive Gate merch, popular tokens & more!
Try your luck now 👉 https://www.gate.com/activities/pointprize?now_period=11
How to earn Growth Points fast?
1️⃣ Go to [Post], tap the icon next to your avatar to enter [Community Center]
2️⃣ Complete daily tasks like posting, commenting, liking, and chatting to earn points
New feature this round: “Fragment Exchange”! Collect fragments to redeem exclusive Gate merch!
100% chance t
Critical Security Vulnerability Detected in DeFi Altcoin: Statement from the Team! - Coin Bulletin
A critical security vulnerability was detected in the front end of the Morpho protocol (Bundler3); the team announced that the issue has been resolved and user funds are safe.
The decentralized lending protocol Morpho, which operates in the cryptocurrency market, recently faced a serious security vulnerability. Chaofan Shou, co-founder of Fuzzland, announced that they discovered a significant flaw in Bundler3, the front-end component of Morpho, warning users to temporarily avoid interacting with the protocol.
Following Shou's warning, the Morpho team quickly took action and identified the source of the problem. In the announcement, it was stated that the security vulnerability stemmed from the latest update and that this update was quickly rolled back. Morpho Labs also announced that all user funds are safe and that the protocol is currently operating smoothly.
This vulnerability discovered by Fuzzland was of a nature that could directly jeopardize users' funds. However, thanks to the timely intervention of Morpho Labs, no loss of funds occurred. The incident once again reminded that DeFi protocols must remain vigilant against security vulnerabilities.
Morpho Labs stated that it is working on additional security measures to prevent such risks from occurring again in the future. Users were advised to follow updates regarding security vulnerabilities through the protocol's official channels.