According to TechFlow, on May 28, the protocol requires full lifecycle protection with dynamic security monitoring and attack interruption. On May 22, the Cetus protocol suffered an attack of $223 million, serving as a warning for the industry.
Technical analysis shows that the vulnerability stems from an error in the checked_shlw function of the inter-mate library, allowing attackers to gain massive liquidity with just one token. Despite multiple rounds of auditing, this issue has still not been discovered.
Professor Zhou Yajin, founder of BlockSec, pointed out that traditional static code auditing is no longer sufficient. A comprehensive security audit is required before a project goes live, and continuous deployment of risk monitoring systems like BlockSec Phalcon is necessary after launch to achieve multi-dimensional risk real-time detection and automatic response.