💙 Gate Square #Gate Blue Challenge# 💙
Show your limitless creativity with Gate Blue!
📅 Event Period
August 11 – 20, 2025
🎯 How to Participate
1. Post your original creation (image / video / hand-drawn art / digital work, etc.) on Gate Square, incorporating Gate’s brand blue or the Gate logo.
2. Include the hashtag #Gate Blue Challenge# in your post title or content.
3. Add a short blessing or message for Gate in your content (e.g., “Wishing Gate Exchange continued success — may the blue shine forever!”).
4. Submissions must be original and comply with community guidelines. Plagiarism or re
Slow Fog: The Cetus theft incident was caused by a mathematical overflow vulnerability.
PANews, May 24 - Slow Mist released an analysis of the Cetus theft incident. The core of this incident is that the attacker carefully constructed parameters to cause an overflow while bypassing detection, ultimately exchanging a very small amount of Token for a huge amount of liquidity assets. The attacker exploited the flaw in the checkedshlw function to acquire various assets including SUI, vSUI, and USDC at the cost of just 1 Token. The attacker transferred part of the funds (USDC, SOL, etc.) cross-chain to an EVM address through Sui Bridge. They deposited 10 million USD worth of assets into Suilend, and currently, 162 million USD of stolen funds have been frozen by the SUI Foundation. Cetus has fixed the vulnerability, and Slow Mist recommends that developers strictly validate the boundary conditions of mathematical functions. According to previous news, Cetus confirmed that hackers stole approximately $223 million, and $162 million of the stolen funds have been frozen.