[ad_1]


A publicly-available token burn function in the contract allowed attackers to manipulate the protocol, some said.

[ad_2]

Leave a Reply

Your email address will not be published. Required fields are marked *