according to the official report of the second-layer network Abstract, its ecological application Cardex encountered a security vulnerability attack. The cause of the incident was that the Cardex team accidentally exposed the private key of the session signer on its website front end after completing the initial security audit. This vulnerability allowed attackers to initiate transactions on any wallet with an authorized session key, resulting in a loss of approximately $400,000 in tokens. Abstract stated that this vulnerability is limited to the third-party application Cardex and did not affect the Abstract Global Wallet (AGW) or the Abstract network itself. The official recommendation is for users to regularly revoke authorization for applications and tokens in their wallets to prevent potential risks.
All Comments