Slow Mist: If the attacked CEX updates its Safe contract version and enables the Guard protection mechanism, it may be able to avoid this hacking incident
According to SlowMist analysis, the attack on CEX mainly originated from its use of an outdated Safe contract version (v1.1.1), which prevented it from utilizing key Guard mechanisms for protection. If upgraded to 1.3.0 or a higher version and appropriate Guard mechanisms are implemented, including specifying a unique whitelist address for receiving funds and strict contract function ACL verification, this loss could possibly be avoided. SlowMist emphasizes that although this is just a hypothesis, it provides important insights for future asset security management.
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
Kingnet AI announces migration to BNB Chain and upcoming launch of V3 version
Canadian listed company DevvStream discloses SOL holdings of 12,185 and BTC holdings of approximately 22.
There were no inflows or outflows for US spot Ethereum ETFs yesterday.
CryptoQuant CEO: If the fee switch is activated, $500 million worth of UNI will be burned annually