ChainCatcher news, Haven Protocol has suffered a serious attack due to a vulnerability in 'range proof verification'. The vulnerability allows Hackers to illegally mint XHV without being detected. The reported quantity of XHV on the exchange exceeds 5 billion, while audit data shows the current supply is only 2.63 billion, the excess may all have been generated through the vulnerability. The team has confirmed that the problem originates from the code introduced after the reconstruction of Haven 3.2 based on Monero.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Haven Protocol Under Attack
ChainCatcher news, Haven Protocol has suffered a serious attack due to a vulnerability in 'range proof verification'. The vulnerability allows Hackers to illegally mint XHV without being detected. The reported quantity of XHV on the exchange exceeds 5 billion, while audit data shows the current supply is only 2.63 billion, the excess may all have been generated through the vulnerability. The team has confirmed that the problem originates from the code introduced after the reconstruction of Haven 3.2 based on Monero.