🎉 Share Your 2025 Year-End Summary & Win $10,000 Sharing Rewards!
Reflect on your year with Gate and share your report on Square for a chance to win $10,000!
👇 How to Join:
1️⃣ Click to check your Year-End Summary: https://www.gate.com/competition/your-year-in-review-2025
2️⃣ After viewing, share it on social media or Gate Square using the "Share" button
3️⃣ Invite friends to like, comment, and share. More interactions, higher chances of winning!
🎁 Generous Prizes:
1️⃣ Daily Lucky Winner: 1 winner per day gets $30 GT, a branded hoodie, and a Gate × Red Bull tumbler
2️⃣ Lucky Share Draw: 10
Curve Founder: Setting input limits can completely prevent attacks similar to yETH and Balancer
PANews, December 8—According to discussions on the X platform, several developers believe that although the yETH attack was attributed to fuzz testing, the actual attack path was complex and may have involved gradually amplifying the damage after discovering an exploitable original vulnerability. Curve founder Michael Egorov stated that fuzz testing can reveal mathematical function failures, and similar attacks on yETH and Balancer could be completely avoided by setting input limits. It was reported last week that Yearn: The complexity of the yETH pool attack is similar to the previous Balancer attack.