FLOW encounters a serious security incident. After discovering a protocol vulnerability, the project did not follow standard emergency repair procedures but instead adopted a highly controversial approach.
The core of the incident: the project team used protocol permissions to freeze user wallets and force transfer operations. These transferred assets come from mainstream trading platforms such as Huobi HTX and are part of users' normal purchases and fully compliant holdings. Throughout the process, users neither authorized nor had any private key intervention.
This approach has sparked widespread skepticism within the ecosystem—if the project has such absolute permission control, how can user asset security be guaranteed? This incident also serves as a reminder for market participants to review the governance structure and risk mechanisms of the projects they invest in.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
FLOW encounters a serious security incident. After discovering a protocol vulnerability, the project did not follow standard emergency repair procedures but instead adopted a highly controversial approach.
The core of the incident: the project team used protocol permissions to freeze user wallets and force transfer operations. These transferred assets come from mainstream trading platforms such as Huobi HTX and are part of users' normal purchases and fully compliant holdings. Throughout the process, users neither authorized nor had any private key intervention.
This approach has sparked widespread skepticism within the ecosystem—if the project has such absolute permission control, how can user asset security be guaranteed? This incident also serves as a reminder for market participants to review the governance structure and risk mechanisms of the projects they invest in.