The Venus Protocol user signed a malicious delegation transaction, granting the attacker’s contract control over their deposited funds.
The Venus Protocol user signed a malicious delegation transaction, granting the attacker’s contract control over their deposited funds.