Slow Mist: If the attacked CEX updates its Safe contract version and enables the Guard protection mechanism, it may be able to avoid this hacking incident
According to SlowMist analysis, the attack on CEX mainly originated from its use of an outdated Safe contract version (v1.1.1), which prevented it from utilizing key Guard mechanisms for protection. If upgraded to 1.3.0 or a higher version and appropriate Guard mechanisms are implemented, including specifying a unique whitelist address for receiving funds and strict contract function ACL verification, this loss could possibly be avoided. SlowMist emphasizes that although this is just a hypothesis, it provides important insights for future asset security management.
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
Analysis: Bitcoin Long-Term Holders Reach Cyclical Lows, Selling Pressure Eases

Hassett: The Federal Reserve should not pre-announce future interest rate paths and must adjust based on data
Strategy purchased 10,624 bitcoins for $962.7 million last week.
Strategy increases its holdings by 10,624 bitcoins, bringing the total to 660,624 bitcoins.