在此处注册或登录以探索自定义功能。
Researchers noticed that attackers of Wormhole protocol started injecting stolen funds into staking mechanisms