🎉 Share Your 2025 Year-End Summary & Win $10,000 Sharing Rewards!
Reflect on your year with Gate and share your report on Square for a chance to win $10,000!
👇 How to Join:
1️⃣ Click to check your Year-End Summary: https://www.gate.com/competition/your-year-in-review-2025
2️⃣ After viewing, share it on social media or Gate Square using the "Share" button
3️⃣ Invite friends to like, comment, and share. More interactions, higher chances of winning!
🎁 Generous Prizes:
1️⃣ Daily Lucky Winner: 1 winner per day gets $30 GT, a branded hoodie, and a Gate × Red Bull tumbler
2️⃣ Lucky Share Draw: 10
Security incident strikes again. Someone exploited a vulnerability in an uninitialized EIP-7702 delegate contract, gaining full ownership rights and draining all funds. The amount? 95 ETH, which was subsequently transferred to Tornado Cash.
The key point of this incident lies here: the attacker exploited an initialization flaw present in the relatively new feature EIP-7702. In simple terms, the contract was not properly initialized, rendering permission verification ineffective. Once the attacker obtained the owner role, withdrawing funds became a matter of minutes.
It is worth noting that the funds were then sent to a mixer. This indicates that the attacker is attempting to cut off the money trail and increase tracking difficulty. For contract developers, this serves as a reminder — even small initialization logic cannot be overlooked, especially in parts involving permission management.