💥 Gate Square Event: #PostToWinCGN 💥
Post original content on Gate Square related to CGN, Launchpool, or CandyDrop, and get a chance to share 1,333 CGN rewards!
📅 Event Period: Oct 24, 2025, 10:00 – Nov 4, 2025, 16:00 UTC
📌 Related Campaigns:
Launchpool 👉 https://www.gate.com/announcements/article/47771
CandyDrop 👉 https://www.gate.com/announcements/article/47763
📌 How to Participate:
1️⃣ Post original content related to CGN or one of the above campaigns (Launchpool / CandyDrop).
2️⃣ Content must be at least 80 words.
3️⃣ Add the hashtag #PostToWinCGN
4️⃣ Include a screenshot s
Analysis of the x402bridge attack incident: Private Key leak caused damage to over 200 users, excessive authorization exposes hidden risks.
Web3 security company GoPlus Security reported that the newly launched cross-layer protocol x402bridge suffered a security vulnerability, resulting in over 200 users losing USDC, totaling approximately $17,693. On-chain detective and security company SlowMist have confirmed that the vulnerability is most likely due to the leakage of the administrator's private key, which allowed attackers to gain special management permissions of the contract. GoPlus Security urgently advises all users with wallets on this protocol to revoke ongoing authorizations as soon as possible and reminds users to never grant unlimited authorization to contracts. This incident exposed the potential security risk of private key storage on servers in the x402 mechanism, which could lead to the leakage of administrator permissions.
New Protocol x402bridge Attacked: Excessive Authorization Exposes Private Key Security Risks
The x402bridge protocol encountered a security attack a few days after its launch on-chain, resulting in user fund losses. The mechanism of the protocol requires users to obtain authorization from the Owner contract before minting USDC. In this incident, it was this excessive authorization that led to the transfer of the remaining stablecoins of over 200 users.
Attackers exploit leaked Private Key to steal user USDC
According to observations by GoPlus Security, the attack process clearly points to privilege abuse:
Root Cause of the Vulnerability: Private Key Storage Risks in the x402 Mechanism
The x402bridge team has responded to this vulnerability incident, confirming that the attack was caused by a Private Key leak, which led to the theft of several teams' tests and major Wallets. The project has suspended all activities and closed the website, and has reported to law enforcement.
A few days before this attack occurred, the usage of x402 transactions saw a surge. On October 27, the market capitalization of the x402 token surpassed $800 million for the first time, and the trading volume of the x402 protocol on mainstream CEX reached 500,000 transactions in a week, a month-on-month increase of 10,780%.
Security Advice: GoPlus urges users to revoke authorization immediately.
Given the seriousness of this leak, GoPlus Security urgently advises users with wallets on this protocol to immediately revoke any ongoing authorizations. The security company also reminds all users:
Conclusion
The incident of x402bridge suffering a Private Key leak attack has once again sounded the alarm in the Web3 space regarding the risks posed by centralized components (such as servers storing Private Keys). Although the x402 protocol aims to utilize the HTTP 402 Payment Required status code to enable instant, programmable stablecoin payments, the security vulnerabilities in its implementation mechanism must be addressed immediately. For users, this attack serves as an expensive lesson, reminding us to remain vigilant and manage Wallet authorizations carefully when interacting with any blockchain protocol.