🎉 Hey Gate Square friends! Non-stop perks and endless excitement—our hottest posting reward events are ongoing now! The more you post, the more you win. Don’t miss your exclusive goodies! 🚀
🆘 #Gate 2025 Semi-Year Community Gala# | Square Content Creator TOP 10
Only 1 day left! Your favorite creator is one vote away from TOP 10. Interact on Square to earn Votes—boost them and enter the prize draw. Prizes: iPhone 16 Pro Max, Golden Bull sculpture, Futures Vouchers!
Details 👉 https://www.gate.com/activities/community-vote
1️⃣ #Show My Alpha Points# | Share your Alpha points & gains
Post your
According to PANews, BitsLab's security team, TonBit, recently identified a null pointer dereference vulnerability in the INMSGPARAM instruction of the TON Virtual Machine (TVM) version 2025.04. This flaw could allow attackers to crash the virtual machine by crafting specific message parameters. TonBit proactively reported the issue, leading to its resolution and acknowledgment by the official team before the launch of TVM11. The vulnerability originated from the as_tuple() function, which lacked null pointer validation. TonBit has emphasized its commitment to enhancing TVM security measures to ensure the stability of contract execution on the blockchain.