Technology ❯ Blockchain ❯ Security ❯ Vulnerabilities
On-chain analysts link the theft to MEV-style, preemptive execution via a builder address.