🚀 Gate Square “Gate Fun Token Challenge” is Live!
Create tokens, engage, and earn — including trading fee rebates, graduation bonuses, and a $1,000 prize pool!
Join Now 👉 https://www.gate.com/campaigns/3145
💡 How to Participate:
1️⃣ Create Tokens: One-click token launch in [Square - Post]. Promote, grow your community, and earn rewards.
2️⃣ Engage: Post, like, comment, and share in token community to earn!
📦 Rewards Overview:
Creator Graduation Bonus: 50 GT
Trading Fee Rebate: The more trades, the more you earn
Token Creator Pool: Up to $50 USDT per user + $5 USDT for the first 50 launche
Port3 Network: The reason for the attack is a vulnerability in CATERC20, and a new Token will be issued to completely resolve this issue.
On November 23, the Port3 Network official posted on social media that PORT3 adopted the cross-chain token solution CATERC20 using the Nexa network to support multi-chain development. However, this solution has a boundary condition validation vulnerability. When the ownership of the token is abandoned, the function return value exactly matches the owner verification condition, leading to a failure in permission verification, allowing unauthorized access. This vulnerability was not detected in the CATERC20 audit report. Since the PORT3 token had previously abandoned ownership to enhance decentralization, it was in a state that could be exploited by this vulnerability. After the hacker discovered this authorization verification defect, at UTC time 20:56:24, they initiated the RegisterChains operation through address 0xb13A…812E, registering their address as an authorized address. The attacker then repeated the same attack method from multiple addresses, including 0x7C2F…551fF. The official has contacted mainstream exchanges to suspend deposit and withdrawal services. Next, the issue will be completely resolved by reissuing a fixed version of the token.