ChainCatcher News, Haven Protocol has suffered a severe attack due to a vulnerability in the 'proof of range verification'. The vulnerability allows Hackers to illegally mint XHV without being detected. The platform d'échange's reported quantity of XHV exceeds 500 million, while audit data shows that the current supply is only 263 million, indicating that the excess may have been generated through the vulnerability. The team has confirmed that the issue stems from the code introduced in Haven 3.2, which is based on Monero reconstruction.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Haven Protocol 遭遇攻击
ChainCatcher News, Haven Protocol has suffered a severe attack due to a vulnerability in the 'proof of range verification'. The vulnerability allows Hackers to illegally mint XHV without being detected. The platform d'échange's reported quantity of XHV exceeds 500 million, while audit data shows that the current supply is only 263 million, indicating that the excess may have been generated through the vulnerability. The team has confirmed that the issue stems from the code introduced in Haven 3.2, which is based on Monero reconstruction.