Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy
BTCBTC
💲73461.09
+
2.84%
ETHETH
💲2251.16
+
6.99%
SOLSOL
💲93.52
+
6.06%
USDCUSDC
💲0.9999
-
0%
XRPXRP
💲1.48
+
4.96%
DOGEDOGE
💲0.1022
+
6.88%

Hasu⚡️🤖
Hasu⚡️🤖|May 11, 2025 17:37
Earlier today, one of Lido’s oracle signing keys, operated by Chorus One, was compromised. What does this mean? (https://x.com/LidoFinance/status/1921534362232787004) Most importantly: The oracle isn't a multi-sig. It doesn’t custody funds and cannot drain the protocol. No user deposits were ever at risk. So, what exactly is this oracle for? Lido uses a 5-of-9 oracle to report Ethereum consensus layer state to Ethereum execution layer smart contracts. Basically, it informs the Lido contracts how much validators earned for users that day, whether any slashings occurred, etc. What's the worst-case scenario? If the entire oracle were compromised, it could misreport the consensus layer state, causing stETH to slightly rebase in either direction. However, the impact is significantly limited, as the Lido protocol strictly bounds what oracle updates it accepts. You might have heard the attacker stole 1.4 ETH. True—but this was gas money sitting in the compromised account, unrelated to the protocol. Due to how the oracle aggregates reports from multiple signers, compromising even four keys wouldn't affect the final outcome. Even with five or more, the potential damage is tightly bounded. The fact that CL state isn't directly available on the EL is a known Ethereum limitation all staking pools face. Actually, this is a perfect example of how Lido approaches security—actively hardening all external dependencies. Not only does Lido have tight sanity checks on allowed updates, but next year the entire mechanism will transition to a ZK proof. (https://research.lido.fi/t/zk-lido-oracle-powered-by-succinct/5747/8) For more details on today's incident, technical insights into Lido’s oracle design, and what makes our security culture stand out, check out Izzy’s thread as well: https://x.com/IsdrsP/status/1921616790599135318
+4
Mentioned
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Timeline

Jun 10, 17:14【Coinbase extends support for Worldcoin】
Jun 10, 17:08【Ethereum NFTs】
Jun 10, 16:49【LUMIAUSDT is about to migrate from the innovation sector to the motherboard】
Jun 10, 16:36【Ethereum governance token surges, SEC supports DeFi projects】
Jun 10, 15:33【SEC initiates review of Bitwise Bitcoin and Ethereum spot ETF applications】
Jun 10, 15:29【LUMIAUSDT is about to migrate from the innovation sector to the motherboard】
Jun 10, 15:22【OKX has updated a professional mode】
Jun 10, 14:35【SEC investigates Bitwise Bitcoin and Ethereum ETFs】
Jun 10, 13:12【Key figures and collaborations behind the IRIS project】
Jun 10, 12:17【Alby wallet balance cleared to zero】

HotFlash

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink

Hot Reads