Sharp Credit – Credit News – Credit Information
Here’s the jist with the appropriate report linked up for you wonderful people:
A report from Adevt pinpoints the origin of ICON’s security vulnerability in the Pickle third party library which is used to send and receive data. If this vulnerability were exploited, a hacker could execute malicious code and possibly take over the entire loopchain. The malicious code could also be used to manipulate the trading price of ICON in the cryptocurrency market.