According to ShenChao TechFlow, on May 28, the protocol requires dynamic security monitoring and full lifecycle protection against attack blocking. On May 22, the Cetus protocol suffered an attack of $223 million, serving as a warning for the industry.
Technical analysis shows that the vulnerability originates from the checked_shlw function check error in the inter-mate library, allowing attackers to gain massive liquidity with just one token. Despite multiple rounds of audits, this issue remains undetected.
Professor Zhou Yajin, founder of BlockSec, pointed out that traditional static code audits are no longer sufficient. A comprehensive security audit is necessary before project launch, and risk monitoring systems like BlockSec Phalcon need to be continuously deployed post-launch to achieve multi-dimensional risk real-time detection and automatic response.