Yala Protocol Suffers Bridge Exploit via Compromised Deployment Key
An exploited temporary deployment key facilitated an unauthorized cross-chain bridge, leading to the overissuance of tokens and a significant asset drain.
