💙 Gate Square #Gate Blue Challenge# 💙
Show your limitless creativity with Gate Blue!
📅 Event Period
August 11 – 20, 2025
🎯 How to Participate
1. Post your original creation (image / video / hand-drawn art / digital work, etc.) on Gate Square, incorporating Gate’s brand blue or the Gate logo.
2. Include the hashtag #Gate Blue Challenge# in your post title or content.
3. Add a short blessing or message for Gate in your content (e.g., “Wishing Gate Exchange continued success — may the blue shine forever!”).
4. Submissions must be original and comply with community guidelines. Plagiarism or re
Web3 Security Risks: Do Not Ignore Traditional Cybersecurity
The Foundation of Web3 Security: The Importance of Traditional Cybersecurity
In today's rapidly developing Web3 environment, there is a high level of attention to on-chain security and the security of the blockchain ecosystem itself, but more fundamental traditional network security issues are often overlooked. This oversight may stem from the fact that the Web3 industry is still in its early stages of development, and related technologies and security measures are still being improved. However, Web3 is actually built on the infrastructure of Web2, and if there are security vulnerabilities at the Web2 layer, it will pose a serious threat to the entire Web3 ecosystem.
The impact of 0day vulnerabilities in traditional cybersecurity (Web2 0day) on the asset security of Web3 users cannot be ignored. For instance, browser vulnerabilities and mobile vulnerabilities could lead to asset theft without the user's awareness. There have been multiple real cases where Web2 0day or vulnerabilities have been exploited to steal digital assets, including hackers exploiting zero-day vulnerabilities in Bitcoin ATMs to steal cryptocurrencies, North Korean hackers attacking using Chrome zero-day vulnerabilities, and Android system vulnerabilities allowing hackers to steal cryptocurrency wallet information. These cases demonstrate that Web2 vulnerabilities pose a real and far-reaching threat to digital assets.
Therefore, it can be said that without the underlying security of Web2, it is difficult to guarantee the security of the Web3 domain. Some security teams are dedicated to researching underlying security, composed of top security experts from around the world, possessing comprehensive technical capabilities covering both Web2 and Web3 ecosystems. These teams have discovered high-risk vulnerabilities in the Web2 products of several tech giants, as well as security vulnerabilities in multiple well-known Web3 ecosystems.
In addition, industry experts believe that security measures in the Web3 field should not be limited to single methods such as code audits, but should also include more security facilities, such as real-time detection and response to malicious transactions. Security technology is directly related to user assets, and the ability to conduct security research is also an important reflection of a security company's level. As the ancient saying goes, "If you don't know the attack, how can you know how to defend it?" In-depth research on Web2 vulnerabilities helps to better protect the Web3 ecosystem.
Several security teams have discovered and analyzed multiple critical security vulnerabilities, including HTTP privilege escalation vulnerabilities, DHCP service remote code execution vulnerabilities, Chrome v8 engine vulnerabilities, and more. These research findings are significant for enhancing the overall security level of the industry.
In the future, the security research team will continue to expand its research on underlying security technologies and welcomes communication and collaboration with industry peers, technical experts, as well as Web3 institutions, exchanges, wallet providers, and others, to work together to enhance security in the Web3 space. Only by paying attention to and effectively addressing traditional cybersecurity issues can we lay a solid foundation for the healthy development of Web3.