Workflow
TrustedVolumes exploit
icon
Search documents
X @1inch
1inch· 2026-05-08 13:32AI Processing
RT Sergej Kunz (@deacix)Over the last 24 hours, @1inch has been flooded with misleading posts all stemming from one clickbait mention.With a basic understanding of the TrustedVolumes exploit and how 1inch is architected, most of this confusion could have been avoided.Our architecture makes it technically impossible for a TrustedVolumes vulnerability to affect 1inch users. Atomic swaps do not share custodial infrastructure. There is nothing to bridge across.But what matters here goes beyond one correction.In ...