Today at 5:53 PM, an anonymous user responsibly disclosed a vulnerability affecting the Watch to Earn smart contracts on 10K.
This issue allowed at least three malicious wallets to repeatedly reuse a backend signature, enabling them to improperly claim multiple WATCHCOIN airdrops and subsequently sell the tokens.
The vulnerability was confined strictly to the initial WATCHCOIN airdrop, placing no more than 0.6% of the total supply at risk.
Our team acknowledged the vulnerability at 6:09 PM and deployed a fix by 7:05 PM—less than an hour after recognition.
For transparency, here are the wallets involved in significant exploit activity:
-8QmXT5nNMcAQNZRXiQorXV9t3cg9nvaTJJxpPwzoogAn
-AWtAMk9Gh82ViYxhdbEkPKn7GYnjWkp1uzw8fnDr4YcL
-92Sms6uBXe4XeZFN76HjeBGR9my26dBwLp3Yce1RY3ah
We appreciate the timely disclosure and swift response from our engineering team to mitigate this vulnerability.