Here's what happened: After the Flow network was maliciously poisoned, validators quickly gathered consensus and performed an emergency software upgrade to fix the vulnerability. The network then entered a high-pressure phase of repair and testing, during which transaction acceptance was paused, but the recovery plan was also being implemented simultaneously.
Starting from 6:00 AM Pacific Time today, the recovery plan entered the first phase. The Cadence operational environment was the first to reopen, and core functions gradually returned to normal. The official disclosed that over 99.9% of Cadence accounts will be able to restore full permissions during this transition period, ensuring the safety of user assets and operations. Out of caution, a few accounts affected by the attack are temporarily restricted from access, and the EVM environment is currently in read-only mode to provide an additional security layer.
This response process can be considered quite standardized—from reaching consensus, code upgrades, to phased restarts. Flow not only withstood this poisoning attack but also demonstrated the network's resilience and the community's execution capability through concrete actions. The network is now gradually stabilizing and recovering, and most users can operate normally.
Speaking of which, this kind of attack and defense is also a reminder to the entire industry. What do you think about Flow's response this time? How many points would you give? Feel free to share your thoughts in the comments!
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
#美联储回购协议计划 Flow network quickly responded and recovered after a poisoning attack. This handling process is worth the industry's attention.
$BTC $SOL $ZEC
Here's what happened: After the Flow network was maliciously poisoned, validators quickly gathered consensus and performed an emergency software upgrade to fix the vulnerability. The network then entered a high-pressure phase of repair and testing, during which transaction acceptance was paused, but the recovery plan was also being implemented simultaneously.
Starting from 6:00 AM Pacific Time today, the recovery plan entered the first phase. The Cadence operational environment was the first to reopen, and core functions gradually returned to normal. The official disclosed that over 99.9% of Cadence accounts will be able to restore full permissions during this transition period, ensuring the safety of user assets and operations. Out of caution, a few accounts affected by the attack are temporarily restricted from access, and the EVM environment is currently in read-only mode to provide an additional security layer.
This response process can be considered quite standardized—from reaching consensus, code upgrades, to phased restarts. Flow not only withstood this poisoning attack but also demonstrated the network's resilience and the community's execution capability through concrete actions. The network is now gradually stabilizing and recovering, and most users can operate normally.
Speaking of which, this kind of attack and defense is also a reminder to the entire industry. What do you think about Flow's response this time? How many points would you give? Feel free to share your thoughts in the comments!