🎉 Gate xStocks Trading is Now Live! Spot, Futures, and Alpha Zone – All Open!
📝 Share your trading experience or screenshots on Gate Square to unlock $1,000 rewards!
🎁 5 top Square creators * $100 Futures Voucher
🎉 Share your post on X – Top 10 posts by views * extra $50
How to Participate:
1️⃣ Follow Gate_Square
2️⃣ Make an original post (at least 20 words) with #Gate xStocks Trading Share#
3️⃣ If you share on Twitter, submit post link here: https://www.gate.com/questionnaire/6854
Note: You may submit the form multiple times. More posts, higher chances to win!
📅 July 3, 7:00 – July 9,
The QuantMaster project suffered from malicious code injection, resulting in the theft of hundreds of thousands of USDT.
According to the Gate.io News bot, members of the encryption community Cat and project party developer Thomson disclosed that the QuantMaster project has encountered a contract security incident. An employee submitted code containing hard-coded malicious addresses through Git, resulting in hundreds of thousands of USDT being stolen. The employee claimed that the malicious address was automatically generated by AI, but the analysis by Slow Fog founder Yu Xian pointed out that the involved address is inconsistent with the AI completion results, ruling out the claim of AI generation. Currently, the project party has reported the case to the relevant authorities, and based on devices and records, the employee who submitted the code is the primary suspect.
Source: Wu Shuo