Binance Square
bug
11,614 views
16 Posts
Hot
Latest
LIVE
LIVE
kaymyg
--
via KevinSeqniki on X On #avalanche blockchain outage ..the issue seems to be with a #bug introduced in a release in January, which makes nodes overgossip transactions, causing a spike in CPU. This makes nodes unresponsive, halting consensus queries. A patch is being released. $AVAX #AVAX
via KevinSeqniki on X
On #avalanche blockchain outage

..the issue seems to be with a #bug introduced in a release in January, which makes nodes overgossip transactions, causing a spike in CPU. This makes nodes unresponsive, halting consensus queries. A patch is being released. $AVAX #AVAX
(@EowynChen ) We found a #bug on the #BNBBeaconChain to #BSC migration tool on #trustwallet Web Extension. To fix the bug, we temporarily disabled the BNB beacon chain broadcasting which also affect mobile apps for 10 mins. Please don’t interact on chain with BNB Beacon Chain during the 10 mins to avoid any potential fund loss, include send/receive/stake. We will remove the warning banner in app for BNB beacon chain token when it’s resumed. Sorry for the inconvenience!
(@EowynChen )

We found a #bug on the #BNBBeaconChain to #BSC migration tool on #trustwallet Web Extension. To fix the bug, we temporarily disabled the BNB beacon chain broadcasting which also affect mobile apps for 10 mins.

Please don’t interact on chain with BNB Beacon Chain during the 10 mins to avoid any potential fund loss, include send/receive/stake. We will remove the warning banner in app for BNB beacon chain token when it’s resumed.

Sorry for the inconvenience!
LIVE
--
Bearish
⚠️ The Banana Gun ($BANANA) token's launch went from $8.70 to $0.02 in hours due to a contract bug. While two audits missed it, #ChatGPT identified the flaw instantly ⚡ #tokenlaunch #bug #crypto2023
⚠️ The Banana Gun ($BANANA) token's launch went from $8.70 to $0.02 in hours due to a contract bug.

While two audits missed it, #ChatGPT identified the flaw instantly ⚡

#tokenlaunch #bug #crypto2023
hi guys can you help I can't trade because this i have no open orders I have enough funds whenever I try to trade using reduce sl it always says that pleasee help binance #BinanceSquare @#bug
hi guys can you help I can't trade because this i have no open orders I have enough funds whenever I try to trade using reduce sl it always says that pleasee help binance #BinanceSquare @#bug
LIVE
--
Bullish
@VitalikButerin on X One application of #AI that I am excited about is AI-assisted formal verification of code and #bug finding. Right now #ethereum's biggest technical risk probably is bugs in code, and anything that could significantly change the game on that would be amazing. $ETH
@VitalikButerin on X

One application of #AI that I am excited about is AI-assisted formal verification of code and #bug finding.

Right now #ethereum's biggest technical risk probably is bugs in code, and anything that could significantly change the game on that would be amazing.
$ETH
ParaSwap addresses smart contract bug and returns cryptocurrenciesParaSwap has begun returning cryptocurrency assets to users who revoked access permissions to the AugustusV6 smart contract following the discovery of a critical bug last week. Cryptocurrency return after vulnerability fix This decentralized financial services aggregator recently dealt with a serious security issue in its newly introduced Augustus version 6 smart contract, after which the refund process commenced. According to a statement released on March 24, the majority of assets have been returned thanks to the efforts of white hat hackers who assisted with the recovery, and all permissions to AugustusV6 have been revoked. ParaSwap noted that 213 addresses have yet to revoke permissions to this faulty contract. Asset security and protection ParaSwap informed about the vulnerability in its new contract, and quick intervention by cybersecurity experts prevented major losses. A subsequent statement mentioned that a detailed report has been filed to relevant institutions, initiating an investigation into the situation. The company is working with analytics and security firms Chainalysis and TRM Labs to identify attackers and track stolen assets. Active communication and call for return The ParaSwap team is actively communicating with hackers and urging them to return stolen assets, with a threat of legal action if there is no response by March 27. Although losses were deemed minimal, with a stolen amount of only $24,000, the vulnerability disclosure underscored swift reaction and preventive measures by the platform. Prevention and improvements post-disclosure Following the vulnerability discovery on March 20, shortly after the launch of the new contract on March 18 aimed at optimizing token swaps and reducing transaction fees, ParaSwap immediately responded by suspending its API and securing assets with the help of white hat hackers. #ParaSwap #bug #crypto     Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

ParaSwap addresses smart contract bug and returns cryptocurrencies

ParaSwap has begun returning cryptocurrency assets to users who revoked access permissions to the AugustusV6 smart contract following the discovery of a critical bug last week.
Cryptocurrency return after vulnerability fix
This decentralized financial services aggregator recently dealt with a serious security issue in its newly introduced Augustus version 6 smart contract, after which the refund process commenced. According to a statement released on March 24, the majority of assets have been returned thanks to the efforts of white hat hackers who assisted with the recovery, and all permissions to AugustusV6 have been revoked.

ParaSwap noted that 213 addresses have yet to revoke permissions to this faulty contract.
Asset security and protection
ParaSwap informed about the vulnerability in its new contract, and quick intervention by cybersecurity experts prevented major losses. A subsequent statement mentioned that a detailed report has been filed to relevant institutions, initiating an investigation into the situation.
The company is working with analytics and security firms Chainalysis and TRM Labs to identify attackers and track stolen assets.
Active communication and call for return
The ParaSwap team is actively communicating with hackers and urging them to return stolen assets, with a threat of legal action if there is no response by March 27.
Although losses were deemed minimal, with a stolen amount of only $24,000, the vulnerability disclosure underscored swift reaction and preventive measures by the platform.
Prevention and improvements post-disclosure
Following the vulnerability discovery on March 20, shortly after the launch of the new contract on March 18 aimed at optimizing token swaps and reducing transaction fees, ParaSwap immediately responded by suspending its API and securing assets with the help of white hat hackers.
#ParaSwap #bug #crypto  
 
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
$ 20 000 Prizes? Report it the error!OpenAI, the company behind the massively popular ChatGPT AI chatbot, has launched a bug bounty program in an attempt to ensure its systems are "safe and secure." To that end, it has partnered with the crowdsourced security platform Bugcrowd for independent researchers to report vulnerabilities discovered in its product in exchange for rewards ranging from "$200 for low-severity findings to up to $20,000 for exceptional discoveries." It's worth noting that the program does not cover model safety or hallucination issues, wherein the chatbot is prompted to generate malicious code or other faulty outputs. The company noted that "addressing these issues often involves substantial research and a broader approach." Other prohibited categories are denial-of-service (DoS) attacks, brute-forcing OpenAI APIs, and demonstrations that aim to destroy data or gain unauthorized access to sensitive information beyond what's necessary to highlight the problem. "Please note that authorized testing does not exempt you from all of OpenAI's terms of service," the company cautioned. "Abusing the service may result in rate limiting, blocking, or banning." What's in scope, however, are defects in OpenAI APIs, ChatGPT (including plugins), third-party integrations, public exposure of OpenAI API keys, and any of the domains operated by the company. The development comes in response to OpenAI patching account takeover and data exposure flaws in the platform, prompting Italian data protection regulators to take a closer look at the platform. #chatgpt #chatgpt4 #ai #artificialintelligence #varhegyigergo #bug #error #prizes

$ 20 000 Prizes? Report it the error!

OpenAI, the company behind the massively popular ChatGPT AI chatbot, has launched a bug bounty program in an attempt to ensure its systems are "safe and secure."

To that end, it has partnered with the crowdsourced security platform Bugcrowd for independent researchers to report vulnerabilities discovered in its product in exchange for rewards ranging from "$200 for low-severity findings to up to $20,000 for exceptional discoveries."

It's worth noting that the program does not cover model safety or hallucination issues, wherein the chatbot is prompted to generate malicious code or other faulty outputs. The company noted that "addressing these issues often involves substantial research and a broader approach."

Other prohibited categories are denial-of-service (DoS) attacks, brute-forcing OpenAI APIs, and demonstrations that aim to destroy data or gain unauthorized access to sensitive information beyond what's necessary to highlight the problem.

"Please note that authorized testing does not exempt you from all of OpenAI's terms of service," the company cautioned. "Abusing the service may result in rate limiting, blocking, or banning."

What's in scope, however, are defects in OpenAI APIs, ChatGPT (including plugins), third-party integrations, public exposure of OpenAI API keys, and any of the domains operated by the company.

The development comes in response to OpenAI patching account takeover and data exposure flaws in the platform, prompting Italian data protection regulators to take a closer look at the platform.

#chatgpt #chatgpt4 #ai #artificialintelligence #varhegyigergo #bug #error #prizes
Billion-Dollar Bank’s ATM Glitch Triggers Mad Rush for Cash As Machine Spits Out Double the Requested Amount A London-based NatWest bank ATM caused a commotion as customers hurried to withdraw cash due to a malfunction. The machine dispensed double the requested amount, prompting people to line up for the unexpected windfall. A NatWest representative attributed the glitch to a one-off manual error, which has since been rectified. It's uncertain if those who received extra cash will keep it, raising the possibility of legal action by the bank under the Theft Act 1968. This incident follows a previous glitch in September when NatWest customers reported missing deposits, swiftly resolved by the bank. NatWest, one of the UK's largest banks, has 960 branches and 3,400 ATMs nationwide. #bug #atm #BTC期货 #Bitcoin2024
Billion-Dollar Bank’s ATM Glitch Triggers Mad Rush for Cash As Machine Spits Out Double the Requested Amount

A London-based NatWest bank ATM caused a commotion as customers hurried
to withdraw cash due to a malfunction. The machine dispensed double the
requested amount, prompting people to line up for the unexpected
windfall. A NatWest representative attributed the glitch to a one-off
manual error, which has since been rectified. It's uncertain if those
who received extra cash will keep it, raising the possibility of legal
action by the bank under the Theft Act 1968. This incident follows a
previous glitch in September when NatWest customers reported missing
deposits, swiftly resolved by the bank. NatWest, one of the UK's largest
banks, has 960 branches and 3,400 ATMs nationwide.

#bug #atm #BTC期货 #Bitcoin2024
Billion-Dollar Bank's Software Bug Enables Unauthorized Cash WithdrawalsIn a recent incident, a software bug within a billion-dollar bank inadvertently allowed customers to withdraw funds that did not belong to them. The flaw permitted individuals to transfer approximately $1,000 to digital banking applications like Revolut, even when their accounts lacked sufficient funds. This unforeseen exploit became viral on social media platforms after its discovery, prompting customers to test its validity. The Exploited Bug The bug within the banking system allowed customers of the Bank of Ireland to initiate transfers of around $1,000 to digital banking apps. The transfer could be completed even if the customer's account had an insufficient balance. Following the transfer, these customers were able to withdraw the funds from ATMs associated with the bank. Swift Social Media Spreading Upon the discovery of this banking glitch, news of the exploit quickly spread across various social media platforms. People rushed to test the loophole for themselves, leading to widespread experimentation and engagement with the flaw. Unexpected Success Stories An anonymous bank customer shared her experience with Vice, revealing that she initially heard about the bug through text messages. To her surprise, the exploit actually worked flawlessly. She decided to try it for fun but ended up withdrawing funds successfully. Despite the intention to return the money, she found herself using it for personal expenses due to her delayed salary payment. Apology and Response from the Bank Bank of Ireland issued an apology for the software bug, acknowledging the inconvenience caused to its customers. The bank assured that all unauthorized withdrawals would be recorded as debits on the respective customer accounts, rectifying the situation. Scope of Impact The bank clarified that the number of transactions carried out on the night when the bug was discovered constituted an insignificant portion of the bank's typical transaction volumes during a regular day. This suggests that while the exploit gained attention on social media, its impact on the bank's overall financial operations was relatively limited. In Summary The inadvertent software bug at the billion-dollar Bank of Ireland allowed customers to withdraw funds without proper authorization. The incident gained traction through social media, showcasing the speed at which news and exploits can spread in the digital age. The bank responded with an apology and rectified the unauthorized withdrawals, underlining the importance of robust software testing and security measures in the financial sector. #bank #bug #funds #banking #BankOfIreland

Billion-Dollar Bank's Software Bug Enables Unauthorized Cash Withdrawals

In a recent incident, a software bug within a billion-dollar bank inadvertently allowed customers to withdraw funds that did not belong to them. The flaw permitted individuals to transfer approximately $1,000 to digital banking applications like Revolut, even when their accounts lacked sufficient funds. This unforeseen exploit became viral on social media platforms after its discovery, prompting customers to test its validity.

The Exploited Bug

The bug within the banking system allowed customers of the Bank of Ireland to initiate transfers of around $1,000 to digital banking apps. The transfer could be completed even if the customer's account had an insufficient balance. Following the transfer, these customers were able to withdraw the funds from ATMs associated with the bank.

Swift Social Media Spreading

Upon the discovery of this banking glitch, news of the exploit quickly spread across various social media platforms. People rushed to test the loophole for themselves, leading to widespread experimentation and engagement with the flaw.

Unexpected Success Stories

An anonymous bank customer shared her experience with Vice, revealing that she initially heard about the bug through text messages. To her surprise, the exploit actually worked flawlessly. She decided to try it for fun but ended up withdrawing funds successfully. Despite the intention to return the money, she found herself using it for personal expenses due to her delayed salary payment.

Apology and Response from the Bank

Bank of Ireland issued an apology for the software bug, acknowledging the inconvenience caused to its customers. The bank assured that all unauthorized withdrawals would be recorded as debits on the respective customer accounts, rectifying the situation.

Scope of Impact

The bank clarified that the number of transactions carried out on the night when the bug was discovered constituted an insignificant portion of the bank's typical transaction volumes during a regular day. This suggests that while the exploit gained attention on social media, its impact on the bank's overall financial operations was relatively limited.

In Summary

The inadvertent software bug at the billion-dollar Bank of Ireland allowed customers to withdraw funds without proper authorization. The incident gained traction through social media, showcasing the speed at which news and exploits can spread in the digital age. The bank responded with an apology and rectified the unauthorized withdrawals, underlining the importance of robust software testing and security measures in the financial sector. #bank #bug #funds #banking #BankOfIreland
NFT marketplace Blur restores bid acceptance function after bug recovery process. Affected users received double the amount of damages caused by order execution. $BLUR down 4.54%. #NFT #marketplace #bug #BLUR
NFT marketplace Blur restores bid acceptance function after bug recovery process. Affected users received double the amount of damages caused by order execution. $BLUR down 4.54%. #NFT #marketplace #bug #BLUR
Explore the lastest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number