
【Member Weekly Report: IP Blockchain Camp Network Ten Thousand Word Research Report, US (CLARITY Act) Review Approaching, Are DeFi-Friendly Measures and Asset Classification Becoming a Turning Point for Clearer Crypto Regulation?】
In the past week, what key market dynamics have occurred in the Web3 space? Which events are truly valuable? Web3Caff Research will summarize the latest financing data and market trends weekly, highlighting key financing project analyses, market hotspot interpretations, and in-depth research reports to help you efficiently capture the trends in Web3. Here is this week's hardcore commentary.
Content link: https://research.web3caff.com/archives/34361

【GMX Hacked Analysis: 42 Million USD Instantly Vaporized】
On July 9, 2025, according to the security monitoring system by SlowMist MistEye, the well-known decentralized trading platform GMX was attacked, resulting in losses exceeding 42 million USD in assets. The fundamental reasons for this attack mainly revolve around two points, which directly affected the calculation of total assets under management (AUM), subsequently leading to the manipulation of GLP token prices. This article discusses this.
Content link: https://web3caff.com/archives/125767

【The Mysterious Fate of 13 Billion in Funds: The Collapse of XinKangJia DGCX Scam】
On June 26, 2025, the online investment platform XinKangJia DGCX suddenly closed all withdrawal channels, and many users discovered that their assets were frozen or cleared, making it impossible to withdraw funds. This incident quickly gained traction on social media, attracting widespread attention. This article delves into the event for you, providing a quick overview.
Content link: https://web3caff.com/archives/125820

【Losses Exceeding 40 Million USD! Analysis of GMX Security Incident Vulnerabilities and Tracking of Stolen Funds】
Recently, GMX was attacked, with the attacker exploiting a reentrancy vulnerability in the project contract to implement the attack, profiting approximately 42 million USD. The attacker first utilized the margin refund mechanism in the executeDecreaseOrder function of the OrderBook contract to initiate a reentrancy attack, bypassing the leverage switch in the project's Timelock contract. This article discusses this, providing a quick overview.
Content link: https://web3caff.com/archives/125744
More excellent content can be accessed at:
Web3Caff (Exploring Web3 Innovation from a Deep Perspective): https://web3caff.com
Web3Caff Research (A professional research platform for members, the 'arsenal' of Web3 elite): https://research.web3caff.com