Today at 5:53 PM, an anonymous user responsibly disclosed a vulnerability affecting the Watch to Earn smart contracts on 10K.

This issue allowed at least three malicious wallets to repeatedly reuse a backend signature, enabling them to improperly claim multiple WATCHCOIN airdrops and subsequently sell the tokens.

The vulnerability was confined strictly to the initial WATCHCOIN airdrop, placing no more than 0.6% of the total supply at risk.

Our team acknowledged the vulnerability at 6:09 PM and deployed a fix by 7:05 PM—less than an hour after recognition.

For transparency, here are the wallets involved in significant exploit activity:

-8QmXT5nNMcAQNZRXiQorXV9t3cg9nvaTJJxpPwzoogAn

-AWtAMk9Gh82ViYxhdbEkPKn7GYnjWkp1uzw8fnDr4YcL

-92Sms6uBXe4XeZFN76HjeBGR9my26dBwLp3Yce1RY3ah

We appreciate the timely disclosure and swift response from our engineering team to mitigate this vulnerability.