According to Odaily, cybersecurity firm SlowMist has analyzed the recent attack on Bybit, attributing it to the use of an outdated Safe contract version (v1.1.1). This version lacked the critical Guard mechanism necessary for protection. SlowMist suggests that if Bybit had upgraded to version 1.3.0 or higher and implemented appropriate Guard mechanisms, including whitelisting unique addresses for fund reception and enforcing strict contract function ACL verification, the losses might have been prevented. Although this is a hypothetical scenario, SlowMist emphasizes that it offers valuable insights for future asset security management.