📩 THORChain — Protocol Resumption
Developers and the security team have determined that the reported vulnerability is credible, but no nodes are at risk. The THORChain protocol has been reactivated.
📩 THORChain — Protocol Resumption
Developers and the security team have determined that the reported vulnerability is credible, but no nodes are at risk. The THORChain protocol has been reactivated.