According to Deep Tide TechFlow, on May 28, the protocol requires full lifecycle protection with dynamic security monitoring and attack blocking. On May 22, the Cetus protocol suffered an attack of $223 million, serving as a warning for the industry.
Technical analysis shows that the vulnerability originates from the checked_shlw function check error in the inter-mate library, allowing attackers to acquire huge liquidity with just one token. Despite multiple rounds of audits, this issue has not been discovered.
Professor Zhou Yajin, founder of BlockSec, pointed out that traditional static code audits are no longer sufficient. A comprehensive security audit is required before the project goes live, and continuous deployment of risk monitoring systems such as BlockSec Phalcon is necessary after launch to achieve multidimensional real-time risk detection and automatic response.