[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.] #  @guardrailai Guardrail • Real-Time Web3 Security Guardrail • Real-Time Web3 Security posts on X about 1inch, uniswap, protocol, $96m the most. They currently have XXX followers and X posts still getting attention that total XX engagements in the last XX hours. ### Engagements: XX [#](/creator/twitter::1641820305923481603/interactions)  - X Week XX -XX% - X Month XXXXX +9.60% - X Months XXXXX +2,159% ### Mentions: X [#](/creator/twitter::1641820305923481603/posts_active)  ### Followers: XXX [#](/creator/twitter::1641820305923481603/followers)  - X Week XXX +4.70% - X Month XXX +20% - X Months XXX +113% ### CreatorRank: undefined [#](/creator/twitter::1641820305923481603/influencer_rank)  ### Social Influence [#](/creator/twitter::1641820305923481603/influence) --- **Social category influence** [exchanges](/list/exchanges) XXXX% **Social topic influence** [1inch](/topic/1inch) 12.5%, [uniswap](/topic/uniswap) 12.5%, [protocol](/topic/protocol) 12.5%, [$96m](/topic/$96m) XXXX% ### Top Social Posts [#](/creator/twitter::1641820305923481603/posts) --- Top posts by engagements in the last XX hours "The root issue was in SwapLogic._swapViaRouter(): The assumption: router would always be a legitimate DEX (Uniswap 1inch) The reality: the attacker registered their own contract as both the router AND the whitelisted Arcadia account"  [@guardrailai](/creator/x/guardrailai) on [X](/post/tweet/1948780487230566919) 2025-07-25 16:20:49 UTC XXX followers, XX engagements "Timeline: 12:18 AM - vault deployed 1:53 AM - $9.6M stolen 2:53 AM - protocol emergency response"  [@guardrailai](/creator/x/guardrailai) on [X](/post/tweet/1944791265662447706) 2025-07-14 16:09:04 UTC XXX followers, XX engagements "Step 1: The attacker first took flash loan & did account setup Step 2: Through repay health checks were bypassed Step 3: Changed the router address via injection Step 4: Access control were bypassed Step 5: Drainage of funds from victims account"  [@guardrailai](/creator/x/guardrailai) on [X](/post/tweet/1948780484705595556) 2025-07-25 16:20:48 UTC XXX followers, XX engagements
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
Guardrail • Real-Time Web3 Security posts on X about 1inch, uniswap, protocol, $96m the most. They currently have XXX followers and X posts still getting attention that total XX engagements in the last XX hours.
Social category influence exchanges XXXX%
Social topic influence 1inch 12.5%, uniswap 12.5%, protocol 12.5%, $96m XXXX%
Top posts by engagements in the last XX hours
"The root issue was in SwapLogic._swapViaRouter(): The assumption: router would always be a legitimate DEX (Uniswap 1inch) The reality: the attacker registered their own contract as both the router AND the whitelisted Arcadia account" @guardrailai on X 2025-07-25 16:20:49 UTC XXX followers, XX engagements
"Timeline: 12:18 AM - vault deployed 1:53 AM - $9.6M stolen 2:53 AM - protocol emergency response" @guardrailai on X 2025-07-14 16:09:04 UTC XXX followers, XX engagements
"Step 1: The attacker first took flash loan & did account setup Step 2: Through repay health checks were bypassed Step 3: Changed the router address via injection Step 4: Access control were bypassed Step 5: Drainage of funds from victims account" @guardrailai on X 2025-07-25 16:20:48 UTC XXX followers, XX engagements
/creator/x::guardrailai