[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.] #  @guardrailai Guardrail • Real-Time Web3 Security Guardrail • Real-Time Web3 Security posts on X about 1inch, uniswap, protocol, $96m the most. They currently have XXX followers and XX posts still getting attention that total XX engagements in the last XX hours. ### Engagements: XX [#](/creator/twitter::1641820305923481603/interactions)  - X Week XX -XX% - X Month XXXXX +9.60% - X Months XXXXX +2,159% ### Mentions: X [#](/creator/twitter::1641820305923481603/posts_active)  ### Followers: XXX [#](/creator/twitter::1641820305923481603/followers)  - X Week XXX +4.70% - X Month XXX +20% - X Months XXX +113% ### CreatorRank: undefined [#](/creator/twitter::1641820305923481603/influencer_rank)  ### Social Influence [#](/creator/twitter::1641820305923481603/influence) --- **Social category influence** [exchanges](/list/exchanges) **Social topic influence** [1inch](/topic/1inch), [uniswap](/topic/uniswap), [protocol](/topic/protocol), [$96m](/topic/$96m) ### Top Social Posts [#](/creator/twitter::1641820305923481603/posts) --- Top posts by engagements in the last XX hours "The root issue was in SwapLogic._swapViaRouter(): The assumption: router would always be a legitimate DEX (Uniswap 1inch) The reality: the attacker registered their own contract as both the router AND the whitelisted Arcadia account"  [@guardrailai](/creator/x/guardrailai) on [X](/post/tweet/1948780487230566919) 2025-07-25 16:20:49 UTC XXX followers, XX engagements "Timeline: 12:18 AM - vault deployed 1:53 AM - $9.6M stolen 2:53 AM - protocol emergency response"  [@guardrailai](/creator/x/guardrailai) on [X](/post/tweet/1944791265662447706) 2025-07-14 16:09:04 UTC XXX followers, XX engagements "Step 1: The attacker first took flash loan & did account setup Step 2: Through repay health checks were bypassed Step 3: Changed the router address via injection Step 4: Access control were bypassed Step 5: Drainage of funds from victims account"  [@guardrailai](/creator/x/guardrailai) on [X](/post/tweet/1948780484705595556) 2025-07-25 16:20:48 UTC XXX followers, XX engagements
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
Guardrail • Real-Time Web3 Security posts on X about 1inch, uniswap, protocol, $96m the most. They currently have XXX followers and XX posts still getting attention that total XX engagements in the last XX hours.
Social category influence exchanges
Social topic influence 1inch, uniswap, protocol, $96m
Top posts by engagements in the last XX hours
"The root issue was in SwapLogic._swapViaRouter(): The assumption: router would always be a legitimate DEX (Uniswap 1inch) The reality: the attacker registered their own contract as both the router AND the whitelisted Arcadia account" @guardrailai on X 2025-07-25 16:20:49 UTC XXX followers, XX engagements
"Timeline: 12:18 AM - vault deployed 1:53 AM - $9.6M stolen 2:53 AM - protocol emergency response" @guardrailai on X 2025-07-14 16:09:04 UTC XXX followers, XX engagements
"Step 1: The attacker first took flash loan & did account setup Step 2: Through repay health checks were bypassed Step 3: Changed the router address via injection Step 4: Access control were bypassed Step 5: Drainage of funds from victims account" @guardrailai on X 2025-07-25 16:20:48 UTC XXX followers, XX engagements
/creator/x::guardrailai