Without prior coding experience, any user could copy the original attackers’ transaction call data and replace the address with theirs to exploit the protocol
Without prior coding experience, any user could copy the original attackers’ transaction call data and replace the address with theirs to exploit the protocol