sqlite-web 0.7.2
jinse.db
lives
Create
Query
lives
sqlite_sequence
Toggle helper tables
Structure
Content
Query
Insert
Drop
Import
Export
Update row 1609 in lives
id
Primary key.
INTEGER
live_id
506763
TEXT NOT NULL
title
Drift发生被盗攻击前一周调整多签机制,且未设置时间锁
TEXT
content
【Drift发生被盗攻击前一周调整多签机制,且未设置时间锁】金色财经报道,4月2日,余弦发文分析Drift被盗事件指出,攻击发生前一周,Drift将多签机制调整为“2/5”(1个旧签名者+4个新签名者),且未设置时间锁(timelock)。攻击者随后获取管理员权限,伪造CVT代币、操纵预言机、关闭安全机制,并从资金池中转移高价值资产。
TEXT
content_prefix
Drift发生被盗攻击前一周调整多签机制,且未设置时间锁
TEXT
published_date
2026-04-02
TEXT
link_name
原文链接
TEXT
link
https://x.com/evilcos/status/2039507200402726979
TEXT
grade
INTEGER
created_at
2026-04-02 10:27:36
TEXT
created_at_unix
INTEGER
created_at_zh
2026-04-02
TEXT
updated_at
TEXT
source
TEXT
category
INTEGER
reading
INTEGER (default 0
flag
TEXT
attribute
TEXT
up_counts
INTEGER
down_counts
INTEGER
comment_count
INTEGER
highlight_color
TEXT
images
[]
TEXT
extra_type
INTEGER
extra
null
TEXT
is_show_comment
INTEGER
is_forbid_comment
INTEGER
show_source_name
TEXT
vote_id
INTEGER
vote
null
TEXT
zan_status
TEXT
readings
[]
TEXT
word_blocks
[]
TEXT
raw_data
{"id": 506763, "content": "【Drift发生被盗攻击前一周调整多签机制,且未设置时间锁】金色财经报道,4月2日,余弦发文分析Drift被盗事件指出,攻击发生前一周,Drift将多签机制调整为“2/5”(1个旧签名者+4个新签名者),且未设置时间锁(timelock)。攻击者随后获取管理员权限,伪造CVT代币、操纵预言机、关闭安全机制,并从资金池中转移高价值资产。", "content_prefix": "Drift发生被盗攻击前一周调整多签机制,且未设置时间锁", "link_name": "原文链接", "link": "https://x.com/evilcos/status/2039507200402726979", "grade": 5, "sort": "", "category": 0, "highlight_color": "", "images": [], "created_at": 1775096856, "created_at_zh": "2026-04-02", "attribute": "", "up_counts": 346, "down_counts": 243, "zan_status": "", "readings": [], "extra_type": 0, "extra": null, "prev": null, "next": null, "word_blocks": [], "is_show_comment": 1, "is_forbid_comment": 0, "comment_count": 0, "analyst_user": null, "show_source_name": "", "vote_id": 0, "vote": null, "date": "2026-04-02"}
TEXT
saved_at
TIMESTAMP (default CURRENT_TIMESTAMP
Update
Cancel