💙 Gate Square #Gate Blue Challenge# 💙
Show your limitless creativity with Gate Blue!
📅 Event Period
August 11 – 20, 2025
🎯 How to Participate
1. Post your original creation (image / video / hand-drawn art / digital work, etc.) on Gate Square, incorporating Gate’s brand blue or the Gate logo.
2. Include the hashtag #Gate Blue Challenge# in your post title or content.
3. Add a short blessing or message for Gate in your content (e.g., “Wishing Gate Exchange continued success — may the blue shine forever!”).
4. Submissions must be original and comply with community guidelines. Plagiarism or re
The Poolz project was attacked, resulting in a loss of $665,000 across multiple chains.
Poolz project suffers an attack, resulting in a loss of approximately $665,000
Recently, a security incident involving multiple blockchains has drawn industry attention. According to on-chain monitoring data, on the early morning of March 15, the Poolz project on the Ethereum, Binance, and Polygon networks was attacked, resulting in a significant loss of tokens, with a total value of approximately $665,000.
The attacker exploited an arithmetic overflow vulnerability in the smart contract and successfully extracted multiple tokens from the project, including MEE, ESNC, DON, ASW, KMON, POOLZ, etc. Currently, some of the stolen tokens have been exchanged for BNB, but the funds have not yet been transferred.
The recent attack primarily targeted the CreateMassPools function of the Poolz project. This function was originally designed to batch create liquidity pools and provide initial liquidity. However, due to an integer overflow issue in the getArraySum function, the attacker was able to exploit this vulnerability. By passing in specific parameters, the accumulated result exceeded the range of uint256, causing the function to return a value of 1. This allowed the attacker to record a liquidity amount in the system that was far greater than the actual quantity by only transferring 1 token.
Subsequently, the attacker called the withdraw function to extract the tokens, completing the entire attack process.
To prevent similar incidents from happening again, industry experts recommend that developers use newer versions of Solidity for compilation, as these versions automatically perform overflow checks. For projects using lower versions of Solidity, it is advisable to consider incorporating OpenZeppelin's SafeMath library to address integer overflow issues.
This incident reminds us once again that security is crucial in smart contract development. Developers need to pay extra attention to potential arithmetic overflow risks and take necessary precautions. At the same time, conducting regular security audits is also an important means of ensuring project safety.