The bug would have allowed malicious validators to compromise the network and applications that rely on it, including Celer’s cBridge.
Powered by WPeMatico
Bookmarking Crypto Insights
The bug would have allowed malicious validators to compromise the network and applications that rely on it, including Celer’s cBridge.
Powered by WPeMatico