📢 Gate Square #MBG Posting Challenge# is Live— Post for MBG Rewards!
Want a share of 1,000 MBG? Get involved now—show your insights and real participation to become an MBG promoter!
💰 20 top posts will each win 50 MBG!
How to Participate:
1️⃣ Research the MBG project
Share your in-depth views on MBG’s fundamentals, community governance, development goals, and tokenomics, etc.
2️⃣ Join and share your real experience
Take part in MBG activities (CandyDrop, Launchpool, or spot trading), and post your screenshots, earnings, or step-by-step tutorials. Content can include profits, beginner-friendl
Most of the funds have been returned after the hack of 1inch, and the two parties have reached a bug bounty agreement
According to Decurity's post-mortem report, after 1inch negotiated with the hackers, most of the $5 million stolen by the attack has been returned, and the hackers have kept a portion as bug bounties. The attack stemmed from a vulnerability in the Fusion v1 smart contract and was primarily affected by the use of an outdated version of the parser, leaving ordinary user funds unaffected. As previously reported by Odaily, 1inch discovered a vulnerability in the Fusion v1 smart contract on March 5, which hackers exploited to steal funds. 1inch has called on the relevant parsers to immediately audit and update the contract to prevent similar incidents from happening again.