
According to PANews on August 1st, Lido released a security disclosure on the X platform: a vulnerability related to the Lido CSM and the permissionless validator contract used to verify validator withdrawals has been reported and fixed. The vulnerability has not been exploited, and no CSM node operators have been affected. StETH holders were also not affected. As part of the remediation measures, the vulnerability was fixed through the oracle mitigation solution (disabling the bond burning function) and DAO vote Proposal 190. Lido has paid a bug bounty to the white hat hacker who disclosed the issue through the Lido×Immunefi project.
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.