NFT platform Gondi suffers contract vulnerability attack, loses $230,000, promises full compensation to affected users

Gate News reports that on March 10th, NFT platform Gondi was recently targeted by a smart contract vulnerability attack, resulting in the theft of approximately 78 NFTs and a loss of about $230,000. According to an official Gondi announcement, the attack was related to the new version of the Sell & Repay contract deployed on February 20th, which had a logical flaw in its Purchase Bundler function that failed to properly verify whether the caller was the legitimate owner or borrower of the NFT. The stolen NFTs include 44 Art Blocks, 10 Doodles, 2 Beeple works, and others. Gondi stated that they have taken control of the situation, and the Sell & Repay feature remains disabled during the repair period. Other buying, selling, quoting, and trading functions are operating normally, and platform activities can safely resume. The team is working diligently to compensate affected users, has contacted interacting users, recovered some NFTs purchased unknowingly by buyers and returned them to the original owners, and is using protocol fees to buy comparable works from the series to offset the losses. They are also actively negotiating with parties related to the irreplaceable 1/1 NFTs that were lost.

View Original
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.
Comment
0/400
No comments