LayerZero (ZRO)

$1.6038  +4.31%  24H

社交熱度指數(SSI)

市場預警排名(MPR)

相關推文

  • andrew.moh Educator OnChain_Analyst A
     52.81K  @andrewmoh

    A statement from @KelpDAO to wipe off the responsibility for the recent attack. There are 2 things that Kelp wants to clarify: + the attack happened directly on the infra of LayerZero + the system of Kelp did not contain any errors, and Kelp was not involved in building the bridging infra of LayerZero For now, both KelpDAO and LayerZero are blaming each other for the incident. From the perspective of a normal user (not biased toward any projects), I can tell that the incident actually occurred on the RPC run by LayerZero. And even if they had suggested KelpDAO transition into multi-DVN, they also have to keep the 1-of-1 DVN running correctly. As a result, $ZRO has faced a big dip of over 20% in the last 24 hours.

     34  17  3.17K
    閱讀原文 >
    釋出後ZRO走勢
     看跌
    LayerZero基础设施攻击导致ZRO暴跌超20%,KelpDAO与LayerZero互相推卸责任。
  • DrReefer Media Influencer C
     1.56K  @DrReefer
    Zach Rynes | CLG Community_Lead Influencer A
     188.77K  @ChainLinkGod

    A couple questions for @LayerZero_Core about the recent $290M exploit: 1. How exactly did North Korea (DPRK) gain access to your core node & RPC servers on your supposedly hardened infrastructure? What was their initial access? 2. How did your endpoint detection (EDR) and cloud monitoring not detect this intrusion? Were these not running in these critical systems? 3. How long did the DPRK have persistence on the LayerZero infrastructure without being detected? 4. What other systems, data, code, and internal sensitive customer information did they access? If they were on your cloud infra, it stands to reason they also had access to your internal tools (GDrive, Email, Slack, etc). Thanks

     344  16  13.72K
    閱讀原文 >
    釋出後ZRO走勢
     看跌
    ZRO recently faced a $290M attack, security is questionable, recommended to wait.
  • Anndy Lian FA_Analyst Influencer C
     194.19K  @anndylian
    Anndy Lian FA_Analyst Influencer C
     194.19K  @anndylian

    LayerZero Team Accused North Korea of Hacking KelpDAO Anndy Lian: “It is currently facing its most severe existential test since inception.” https://t.co/3sMH2Rs7f1

     12  4  1.16K
    閱讀原文 >
    釋出後ZRO走勢
     極度看跌
    The LayerZero project faces a severe existential test after being accused of a North Korean hacking attack.
  • Fishy Catfish Media Influencer B
     14.54K  @CatfishFishy
    Zach Rynes | CLG Community_Lead Influencer A
     188.77K  @ChainLinkGod

    A couple questions for @LayerZero_Core about the recent $290M exploit: 1. How exactly did North Korea (DPRK) gain access to your core node & RPC servers on your supposedly hardened infrastructure? What was their initial access? 2. How did your endpoint detection (EDR) and cloud monitoring not detect this intrusion? Were these not running in these critical systems? 3. How long did the DPRK have persistence on the LayerZero infrastructure without being detected? 4. What other systems, data, code, and internal sensitive customer information did they access? If they were on your cloud infra, it stands to reason they also had access to your internal tools (GDrive, Email, Slack, etc). Thanks

     344  16  13.72K
    閱讀原文 >
    釋出後ZRO走勢
     看跌
    LayerZero hit by $290M attack, security flaw triggers bearish sentiment
  • wahndo FA_Analyst OnChain_Analyst A
     6.36K  @Wahndo_

    if you're in $ZRO pivot to $LINK

    Arca OnChain_Analyst Trader S
     5.53K  @arcamids

    It can always be worse. 😉 $LINK > $ZRO https://t.co/W47x46SNDC

     30  2  806
    閱讀原文 >
    釋出後ZRO走勢
     看跌
    Recommend ZRO holders shift to LINK, as ZRO is underperforming and the chart shows a long-term downtrend.
  • spuddy Dev OnChain_Analyst B
     1.43K  @0xSpuddy

    Anyone know who was running the LZ nodes that got pwned? (Or did they strait up HIRE the nk operators?)

     2  1  69
    閱讀原文 >
    釋出後ZRO走勢
     中性
    ZRO node under attack, monitor security risks
  • Dami (the L0 guy) Influencer Media B
     2.74K  @rookie_of_Ph
    Master Mute |🇱0️⃣…🇬 🇮 🇳 D
     243  @MuteMastoor

    Just checked webarchive March 2024: Guide literally showed security stack 3/4 config setup . Where did layerzero state that 1/1 is a good idea? https://t.co/u9z1SBbxks https://t.co/3oSn0jKukG

     4  2  375
    閱讀原文 >
    釋出後ZRO走勢
     看跌
    LayerZero's 1/1 DVN security configuration is questioned, not matching the guide's 3/4 configuration.
  • Crypto Patel TA_Analyst OnChain_Analyst B
     57.37K  @CryptoPatel

    Major Token Unlocks This Week Unlocks = potential sell pressure. Watch price action, liquidity, and market reaction closely.

     234  12  7.57K
    閱讀原文 >
    釋出後ZRO走勢
     看跌
    This week multiple tokens will see large unlocks, potentially facing sell pressure, and requires close monitoring of market reaction.
  • Coin Bureau Media Influencer C
     1.10M  @coinbureau

    ⚠️ALERT: KELPDAO’S SETUP IS USED BY MAJORITY OF LAYERZERO OAPPS Following the KelpDAO exploit, Dune analyzed ~2,665 LayerZero OApps over the past 90 days and found: 47% use a 1-of-1 DVN setup, 45% use 2-of-2, and only ~5% use 3-of-3 or higher. KelpDAO’s rsETH, which was exploited, falls into the lowest 1-of-1 security category.

     113  34  14.46K
    閱讀原文 >
    釋出後ZRO走勢
     看跌
    The KelpDAO exploit reveals that most LayerZero applications have weak security configurations, posing high risk.
  • Dami (the L0 guy) Influencer Media B
     2.74K  @rookie_of_Ph

    Do you know how crazy kelpDao sounds saying they used the default? the $ZRO team themselves never use 1/1 dvn setup for ZRO it’s: • Google cloud • LayerZero labs for Stargate it’s: • Stargate • Nethermind So their claim about the team recommending 1/1 is a lie. https://t.co/H3vJGDJGUD

    Dami (the L0 guy) Influencer Media B
     2.74K  @rookie_of_Ph

    for aori it’s: • Labs • Nethermind • Google cloud https://t.co/Rz0ypwWqo1

     25  7  3.85K
    閱讀原文 >
    釋出後ZRO走勢
     看跌
    KelpDao被指控就LayerZero DVN设置撒谎,作者提供证据澄清实际配置。