Daniel Felts
1 min readApr 27, 2018

--

By exploiting the bug, attackers can generate an extremely large amount of tokens,

--

--