🔥 Gate Square Event: #PostToWinNIGHT 🔥
Post anything related to NIGHT to join!
Market outlook, project thoughts, research takeaways, user experience — all count.
📅 Event Duration: Dec 10 08:00 - Dec 21 16:00 UTC
📌 How to Participate
1️⃣ Post on Gate Square (text, analysis, opinions, or image posts are all valid)
2️⃣ Add the hashtag #PostToWinNIGHT or #发帖赢代币NIGHT
🏆 Rewards (Total: 1,000 NIGHT)
🥇 Top 1: 200 NIGHT
🥈 Top 4: 100 NIGHT each
🥉 Top 10: 40 NIGHT each
📄 Notes
Content must be original (no plagiarism or repetitive spam)
Winners must complete Gate Square identity verification
Gat
Curve Founder: Setting input limits can completely prevent attacks similar to yETH and Balancer
PANews, December 8—According to discussions on the X platform, several developers believe that although the yETH attack was attributed to fuzz testing, the actual attack path was complex and may have involved gradually amplifying the damage after discovering an exploitable original vulnerability. Curve founder Michael Egorov stated that fuzz testing can reveal mathematical function failures, and similar attacks on yETH and Balancer could be completely avoided by setting input limits. It was reported last week that Yearn: The complexity of the yETH pool attack is similar to the previous Balancer attack.