Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Promotions
AI
Gate AI
Your all-in-one conversational AI partner
Gate AI Bot
Use Gate AI directly in your social App
GateClaw
Gate Blue Lobster, ready to go
Gate for AI Agent
AI infrastructure, Gate MCP, Skills, and CLI
Gate Skills Hub
10K+ Skills
From office tasks to trading, the all-in-one skill hub makes AI even more useful.
GateRouter
Smartly choose from 30+ AI models, with 0% extra fees
๐จOn-chain security alert again: a "permission design issue" was directly exposedโ ๏ธ
Recent monitoring shows that a QNT reserve pool was attacked due to a contract design vulnerability๐
๐ Loss of about 1988.5 QNT (approximately 54.93 ETH)๐ฅ
๐ง The core of this issue is not about hacker skills, but๐
๐ that the permission design "left a backdoor"
Let's break down the process:
โข The admin address delegated code through EIP-7702
โข Delegated to the BatchExecutor contract
โข BatchExecutor then authorized an unpermissioned BatchCall contract
โข BatchCall functions have no permission checks
๐ Result: the attacker directly "legally invoked illegal operations"
๐ The pool assets were emptied directly
๐ This incident sends a very dangerous signal:
๐ Itโs not about being "hacked," but about being "countered by design rules"
โ ๏ธSummary of the risk:
โข Permission chain is too long โ risks stack up
โข Lacking basic access control
โข "Arbitrary calls" = leaving a backdoor for attackers
๐ In DeFi, such vulnerabilities are the most deadly because๐
Code is rules, rules are money, if rules are wrong = money is gone
๐ But there is also a positive side:
โข Security incidents are transparent โ industry learning costs decrease
โข New mechanisms like EIP-7702 are being tested in real-world scenarios
โข Security audit demands will further increase
๐ In simple terms:
Every attack is a lesson for the next generation of system upgrades
๐ง My core view:
๐ The biggest problem in DeFi has never been hackers
๐ But "overly complex permission structures + incomplete security design"
๐ To sum up in one sentence:
There are no middlemen in the on-chain world, but if permission design has vulnerabilities, attackers are the most "legitimate" users in your system.โ ๏ธ๐ฅ#WCTCไบคๆ็PK #GateCardไธๆๅณไป $BTC $ETH $PRL