๊ฐ€์ž… ํ›„ ์ดˆ๋Œ€ ๋งํฌ๋ฅผ ๊ณต์œ ํ•˜๋ฉด ๋™์˜์ƒ ์žฌ์ƒ ๋ฐ ์ดˆ๋Œ€ ๋ณด์ƒ์„ ๋ฐ›์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

Macauley ๐ŸŸช Editooor
@yeluacaM
Senior Editor @Blockworks and @BlockworksRes | Subscribe to the free @0xResearch newsletter and @TheBreakdownBW
๊ฐ€์ž… January 2009
4.2K ํŒ”๋กœ์ž‰ ์ค‘    2.2K ํŒฌ
Bridge exploits are a perennial problem, and almost all of them share a single failure mode: the destination chain trusting one attestor โ€” a federation, a multisig, an oracle pair, or a DVN โ€” to vouch for events on the source chain. Stronger designs exist. ๐Ÿ‘‡
๋” ๋ณด๊ธฐ