header-langage
简体中文
繁體中文
English
Tiếng Việt
한국어
日本語
ภาษาไทย
Türkçe
Scan to Download the APP

MIM Spell: Willing to negotiate with the hacker and offer a 20% bounty, user funds are unaffected

2025-03-25 22:17

BlockBeats News, March 25th, MIM Spell's official announcement stated that they have become aware of a vulnerability related to gmCauldrons. Core contributors and security engineers are actively investigating the issue and will provide more information as soon as possible. "Despite deploying multiple systems, the vulnerability was only discovered after the attacker executed several transactions. After the Zeroshadow team alerted us, we swiftly disabled the borrowing functionality for all cauldrons."


The full extent of the attack's losses is currently being assessed. We are collaborating with Guardian Audits, GMX, and other security peers to identify the hacker's execution process. User collateral is unaffected, and this vulnerability only impacts gmCauldrons.


We are willing to negotiate on a bug bounty equivalent to 20% of the total amount.

举报 Correction/Report
This platform has fully integrated the Farcaster protocol. If you have a Farcaster account, you canLogin to comment
Correction/Report
Submit
Add Library
Visible to myself only
Public
Save
Choose Library
Add Library
Cancel
Finish