Scan to download
BTC $76,746.58 -1.65%
ETH $2,287.98 -2.64%
BNB $623.35 -1.36%
XRP $1.39 -2.24%
SOL $84.47 -2.39%
TRX $0.3255 +0.47%
DOGE $0.0976 -1.13%
ADA $0.2452 -2.70%
BCH $448.17 -0.71%
LINK $9.22 -2.48%
HYPE $41.72 +0.69%
AAVE $96.81 +0.35%
SUI $0.9257 -1.93%
XLM $0.1646 -3.34%
ZEC $356.84 +0.86%
BTC $76,746.58 -1.65%
ETH $2,287.98 -2.64%
BNB $623.35 -1.36%
XRP $1.39 -2.24%
SOL $84.47 -2.39%
TRX $0.3255 +0.47%
DOGE $0.0976 -1.13%
ADA $0.2452 -2.70%
BCH $448.17 -0.71%
LINK $9.22 -2.48%
HYPE $41.72 +0.69%
AAVE $96.81 +0.35%
SUI $0.9257 -1.93%
XLM $0.1646 -3.34%
ZEC $356.84 +0.86%

revent

Monad Co-founders: If a rate limit is set on collateral supply, today's rsETH event could prevent a loss of about 200 million dollars

Keone Hon from Monad Lianchuang stated: "I feel that the lending protocol for the liquidity pool should set rate limits on the supply of assets deposited as collateral. For example, if the current supply is 100 million and the supply cap is 300 million, then in the next 10 minutes, the maximum allowed increase should be to 110 million, rather than allowing a one-time deposit of the full 200 million. In reality, no one needs to complete such a large deposit all at once.This is important because when certain exotic assets are attacked, the impact depends on the scale of the exit channels for that asset. Especially in many cases where attacks belong to infinite issuance vulnerabilities, the scale of the exit that can be made essentially determines the upper limit of the attack losses. Lending protocols are often the largest exit channels. If a smart cap is introduced, where the initial cap is slightly above the current supply and is gradually adjusted to the real cap over several hours, it would have a huge effect. With such a mechanism, rsETH depositors could have avoided about 200 million dollars in losses.This also raises a point: the asset issuers themselves should support such mechanisms. If you are issuing redeemable tokens with redemption delays, you are not worried about hackers redeeming directly from you, but you need to compress the scale of external exit paths as much as possible without affecting normal users. Therefore, a high supply cap should be seen as a risk rather than a symbol of strength. For example, the Hyperbridge DOT attack did not result in a 100 million dollar loss because there were very few exit paths; the Resolv attack loss was 24 million dollars instead of 200 million dollars because the scale of the exit path limited the loss cap. This is an obvious principle, but there are still immediately actionable measures: audit the supply caps of all assets and lower the caps when unnecessary."

The Ministry of Industry and Information Technology of China issued a risk alert regarding the timely update of specific iOS versions to prevent the exploitation of vulnerabilities

The Cybersecurity Threat and Vulnerability Information Sharing Platform (NVDB) of the Ministry of Industry and Information Technology of China has monitored and found that attackers are using exploit tools targeting Apple Inc.'s terminal products to carry out cyber attack activities, which can lead to serious harms such as information theft and system control. The affected range includes Apple terminal products such as iPhone and iPad running iOS 13 to 17.2.1.Attackers induce users to use the Safari browser to visit web pages containing malicious code through methods such as SMS, email, or web poisoning, comprehensively utilizing security vulnerabilities present in the terminal devices to implant remote control Trojans into the victim's terminal products, stealing sensitive user information, gaining maximum privileges, and taking control.It is recommended that users of Apple terminal products conduct risk assessments, and promptly fix vulnerabilities through version upgrades and patch installations (refer to the Apple Security Updates). Pay attention to system update notifications and the latest security update announcements released by Apple, upgrade to the latest secure version in a timely manner, strengthen security awareness, avoid clicking on unknown links, and prevent the risk of cyber attacks.

Vitalik focuses on "Big FOCIL" and the crypto memory pool to prevent centralization of the block building process

Ethereum co-founder Vitalik Buterin recently published a series of technical articles discussing the future roadmap of Ethereum. In the latest article, he focused on analyzing the potential centralization risks in the block building pipeline and proposed solutions such as expanding the FOCIL mechanism and introducing encrypted mempools to enhance the network's censorship resistance.According to the plan, Ethereum will launch the Glamsterdam upgrade in the first half of 2026, which will introduce the enshrined Proposer-Builder Separation (ePBS) mechanism. This mechanism allows block proposers to outsource block construction to a permissionless open market, reducing the centralization risk at the staking level. However, Buterin pointed out that while ePBS can prevent the concentration of block building rights among a few staking pools, the block construction itself may still become concentrated among a few high-tier participants due to specialization and maximizing MEV, leading to a new trend of centralization.To address this issue, Ethereum developers plan to simultaneously launch the FOCIL (Forward Obligatory Commitment to Inclusion Lists) mechanism in the Glamsterdam upgrade. The initial version will randomly select 16 witnesses and mandate that specific transactions must be included in the block; otherwise, the block will be rejected. Buterin stated that even if block construction is controlled by a single malicious entity, FOCIL can still ensure that transactions cannot be completely censored.Additionally, Buterin explored the possibility of expanding the scale of FOCIL ("big FOCIL") and introducing encrypted mempools to further mitigate the issues of information asymmetry and power concentration in the block building process. Recently, Buterin has been vocal about topics such as the quantum resistance roadmap, execution layer improvements, and block building mechanisms, indicating that the core Ethereum development team is conducting systematic design and risk assessment for the next phase of protocol upgrades.
app_icon
ChainCatcher Building the Web3 world with innovations.