ALEX Protocol Suffers $8.3 Million Exploit via Malicious Token Verification Flaw
A critical vulnerability in token self-listing verification logic allowed an attacker to manipulate permissions, enabling unauthorized vault access and asset exfiltration.
