Technology ❯ Blockchain ❯ Decentralized Finance
Exploits Hacking Protocols Hacking Techniques Vulnerability Testing Off-chain Security Vulnerabilities
Investigators trace the incident to an unauthorized multisig upgrade confined to Unleash contracts rather than Story Protocol.