🔥 Gate Square Event: #PostToWinNIGHT 🔥
Post anything related to NIGHT to join!
Market outlook, project thoughts, research takeaways, user experience — all count.
📅 Event Duration: Dec 10 08:00 - Dec 21 16:00 UTC
📌 How to Participate
1️⃣ Post on Gate Square (text, analysis, opinions, or image posts are all valid)
2️⃣ Add the hashtag #PostToWinNIGHT or #发帖赢代币NIGHT
🏆 Rewards (Total: 1,000 NIGHT)
🥇 Top 1: 200 NIGHT
🥈 Top 4: 100 NIGHT each
🥉 Top 10: 40 NIGHT each
📄 Notes
Content must be original (no plagiarism or repetitive spam)
Winners must complete Gate Square identity verification
Gat
SlowMist: The root cause of the yearn attack is that the Yearn yETH weighted stablecoin swap pool contract contains unsafe mathematical operations.
According to a report by Jinse Finance, and as monitored by SlowMist, on December 1, the decentralized finance protocol Yearn suffered a hacker attack resulting in a loss of approximately $9 million. The SlowMist security team analyzed the incident and confirmed the root cause as follows: The vulnerability originated from the calcsupply function logic used to calculate supply in the Yearn yETH Weighted Stableswap Pool contract. Due to unsafe mathematical operations, the function allowed overflow and rounding errors during calculations, which caused significant deviations in the product of the new supply and virtual balance. Attackers exploited this flaw to manipulate liquidity to specific values and excessively mint liquidity pool (LP) tokens, thereby profiting illegally. It is recommended to strengthen boundary scenario testing and adopt security-audited arithmetic mechanisms to prevent similar high-risk vulnerabilities, such as overflows, in related protocols.