🚀 Kaia v2.1.0 Update Enhances MEV Auction Support and Performance
#Kaia #MEVAuction #KIP249 #API #storageperformance #BidTx #websocket #LevelDB #snappycompression #archiveNodes #FlatTrie #Erigon #RocksDB #EIP7702 #compressioncontrol #performanceoptimizations #stability
According to PANews, the latest update for Kaia, version 2.1.0, has been released, focusing on supporting MEV Auction (KIP-249) and improving API and storage performance without requiring a hard fork. This new version allows the reception of BidTx, enabling external auctioneers to transmit winners via websocket connection in the auction namespace. It is recommended to enable websocket and restrict access using a firewall or allowlist.
For full nodes, LevelDB now defaults to snappy compression, allowing users to reclaim disk space through chain database compression, although this process is time-consuming and increases I/O load. For archive nodes, an experimental FlatTrie feature has been introduced, which can be implemented through Erigon-style state layout but requires resynchronization and temporarily disables some functions such as eth_getProof, live pruning, and rollback.
Additionally, version 2.1.0 introduces support for RocksDB, RPC block parameters 'safe' and 'finalized', the EIP-7702 verification mechanism, and more refined compression control along with performance and stability optimizations.#Kaia #MEVAuction #KIP249 #API #storageperformance #BidTx #websocket #LevelDB #snappycompression #archiveNodes #FlatTrie #Erigon #RocksDB #EIP7702 #compressioncontrol #performanceoptimizations #stability
🚀 Binance Futures to Upgrade WebSocket URL Architecture for Enhanced Stability
#Binance #Futures #WebSocket #Upgrade #Stability #Scalability #MarketData #PublicData #PrivateData #API #Trading
According to the announcement from Binance, the company has upgraded its USDⓈ-M Futures WebSocket URL architecture to support sustained growth in WebSocket traffic and enhance overall stability and scalability. This new structure aims to separate traffic by data category—Public, Market, and Private—thereby providing clearer routing, improved connection management, and better operational isolation.
The upgrade introduces three dedicated WebSocket base URLs: Public for high-frequency public market data, Market for regular market data, and Private for user data streams. The URLs are as follows: wss://fstream.binance.com/public for Public, wss://fstream.binance.com/market for Market, and wss://fstream.binance.com/private for Private. Both ws mode (path-based subscription) and stream mode (?streams=; Private uses listenKey + events) remain supported, along with combined streams. The Private URL supports listenKey + events subscription, allowing for multiple listenKeys and multiple events.
The new endpoints are available immediately, and users are advised to migrate to the new /public, /market, and /private WebSocket base URLs. This migration should be completed before 2026-04-23 to avoid trading interruptions when legacy URLs are permanently retired. An example of the new method includes Public (ws mode) at wss://fstream.binance.com/public/ws/btcusdt@depth, Market (stream mode) at wss://fstream.binance.com/market/stream?streams=btcusdt@markPrice, and Private (listenKey + events) at wss://fstream.binance.com/private/ws?listenKey=&events=ORDER_TRADE_UPDATE.
Users can find more information about endpoint and stream mapping in the API Change Log and the full API documentation on Binance Futures. It is crucial for users to ensure streams are routed to the correct endpoint category to maintain uninterrupted trading services.#Binance #Futures #WebSocket #Upgrade #Stability #Scalability #MarketData #PublicData #PrivateData #API #Trading
🚀 AI TRENDS | OpenClaw Gateway WebSocket Vulnerability Confirmed by Founder
#AI #CyberSecurity #Vulnerability #WebSocket #ZeroDay #OpenClaw #Exploit #InformationSecurity #CNVD #GatewaySecurity
A critical vulnerability in the OpenClaw Gateway WebSocket has been confirmed by its founder, Peter, according to PANews. The 360 Security Cloud team received an official email from Peter, acknowledging the exclusive discovery of the unauthenticated upgrade flaw by the 360 team.
The high-risk vulnerability has been reported to the National Information Security Vulnerability Sharing Platform (CNVD) by 360, aiming to swiftly eliminate the risk across the network. This WebSocket unauthenticated upgrade flaw is classified as a zero-day (0Day) vulnerability, which attackers can exploit to silently bypass permission authentication via WebSocket, potentially gaining control over the intelligent gateway. This could lead to resource exhaustion or a complete system crash.#AI #CyberSecurity #Vulnerability #WebSocket #ZeroDay #OpenClaw #Exploit #InformationSecurity #CNVD #GatewaySecurity