Daniel Felts·Follow1 min read·Apr 27, 2018--ShareBy exploiting the bug, attackers can generate an extremely large amount of tokens,