🎉 Share Your 2025 Year-End Summary & Win $10,000 Sharing Rewards!
Reflect on your year with Gate and share your report on Square for a chance to win $10,000!
👇 How to Join:
1️⃣ Click to check your Year-End Summary: https://www.gate.com/competition/your-year-in-review-2025
2️⃣ After viewing, share it on social media or Gate Square using the "Share" button
3️⃣ Invite friends to like, comment, and share. More interactions, higher chances of winning!
🎁 Generous Prizes:
1️⃣ Daily Lucky Winner: 1 winner per day gets $30 GT, a branded hoodie, and a Gate × Red Bull tumbler
2️⃣ Lucky Share Draw: 10
Flow blockchain has encountered an issue. On December 27th, an attacker discovered and exploited a vulnerability in the Flow execution layer. During the window before validators could perform coordinated stop operations, the hacker successfully stole approximately 390 Flow tokens.
The Flow Foundation subsequently issued a statement. This incident serves as a reminder that even well-known public blockchains are not immune to security vulnerabilities. The protection measures at the execution layer often become the breakthrough point for hackers—they take advantage of the time window before the verification mechanism is activated.
For participants in the Flow ecosystem, this is no small matter. Although 390 tokens represent a limited share within the entire ecosystem, the exposed system vulnerability is particularly noteworthy. The security of a blockchain fundamentally depends on its weakest link—an execution layer coordination delay can be exploited.
The Flow Foundation stated that they will strengthen the investigation and defense against such vulnerabilities. The community is also discussing whether a faster validator response mechanism is necessary. Events like this provide important lessons for the entire industry—highlighting the critical importance of security audits and emergency response.