🚀 Gate Square Creator Certification Incentive Program Is Live!
Join Gate Square and share over $10,000 in monthly creator rewards!
Whether you’re an active Gate Square creator or an established voice on another platform, consistent quality content can earn you token rewards, exclusive Gate merch, and massive traffic exposure!
✅ Eligibility:
You can apply if you meet any of the following:
1️⃣ Verified creator on another platform
2️⃣ At least 1,000 followers on a single platform (no combined total)
3️⃣ Gate Square certified creator meeting follower and engagement criteria
Click to apply now 👉
Nemo Protocol has launched a debt token program to provide funding for the $2.6 million vulnerability victims.
PANews reported on September 15 that the revenue trading platform Nemo Protocol, based on Sui, has launched a debt token compensation plan after being exploited. The core of the plan is the issuance of NEOM tokens equivalent to users' dollar losses. Nemo stated that although it wanted to compensate directly in USD, it lacked sufficient funds, so it adopted a debt token strategy. The goal is to ultimately compensate users for their principal losses based on the on-chain snapshot at the time the protocol was suspended. The protocol has established a three-step recovery plan: first, allow users to access a dedicated portal, transfer the remaining value of the damaged liquidity pool to a new contract, and during the migration, users will receive equivalent NEOM tokens; token holders can choose to exit through the AMM liquidity pool or retain the tokens to recover funds. Nemo also plans to launch a liquidity pool on Sui's main DEX to help users exit, and all recovered funds will be fully deposited into a redemption pool for claims, with some external funds also allocated to the pool for support. On September 7, according to the first disclosure by Shield, the Nemo Protocol liquidity pool was attacked, resulting in the theft of 2.6 million dollars. The attacker exploited a vulnerability in the code introduced by the developers, which was deployed without proper auditing.