Sonic teams up with Kaito to reward Yappers in S token airdrop

2025/06/28 03:26

Sonic, the decentralized finance blockchain, has joined forces with Web3 platform Kaito in a move that will see users who drive the conversation around the Sonic token and ecosystem rewarded in the Sonic Season 2 airdrop.

Kaito’s ecosystem rewards its community for high-quality engagement around the Web3 platform on X. Yaps in the decentralized finance ecosystem, tracked by Kaito’s AI-powered dashboard, also form part of the activity that users earn from on the platform.

In an announcement, Sonic Labs said this effort by “Yappers” will also see its community earn points for engagement around the Sonic (S) token.

With the Sonic integration, users now have a chance to share quality content and insights on S and its DeFi landscape. This will allow them to earn points and get rewarded during Sonic’s Season 2 airdrop. Specifically, driving conversation around the S token on X and securing a spot on the Sonic Yapper Leaderboard is the path to eligibility.

Sonic explained in a blog post:

Pushing Sonic on social media

The dashboard will track engagement around tweets that specifically mention Sonic features such as fee monetization, apps, and DeFi. Notably, users who intentionally mislead or post malicious content could see their airdrop allocation reduced.

Sonic will open claims for its Season 1 airdrop “a few weeks after June 18,” with availability set to go live once the protocol completes a review to filter out bots and Sybils. The goal is to ensure only real users receive the rewards.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Share Insights

You May Also Like

Massive Software Supply-Chain Hack Targeting Crypto Ends with Pennies Stolen

Massive Software Supply-Chain Hack Targeting Crypto Ends with Pennies Stolen

The post Massive Software Supply-Chain Hack Targeting Crypto Ends with Pennies Stolen appeared on BitcoinEthereumNews.com. One web developer’s compromised npm account triggered a large-scale supply chain attack, but the hacker only got a few cents in crypto, analysts say. An unknown hacker pulled off what may be the largest software supply-chain attack ever, but still made less than the price of many memecoins. On Monday, Sept. 8, a hacker broke into the account of a well-known JavaScript developer known as “qix” and pushed malicious updates to dozens of widely used software tools for building websites and apps, which together are downloaded more than two billion times each week. After gaining access, the hacker added malicious code to all of the developer’s packages, which wasn’t a virus in the traditional sense but was still designed to steal cryptocurrency from users’ crypto wallets in browsers. The attack immediately caused chaos as developer updates are usually automatically trusted, so when new versions come in, many projects and apps accept them without checking, letting the hacker’s code spread fast. Snir Levi, founder and CEO of compliance and threat management platform Nominis, told The Defiant that the modern software supply chain is “incredibly interconnected,” as a single compromised npm account can cascade across thousands of projects and businesses in minutes, because code reuse is the “backbone of the entire ecosystem.” Npm is a registry for JavaScript software packages. “The stakes aren’t just technical – a malicious package in a critical dependency can impact millions of users, move billions of dollars, and undermine trust in the integrity of the industry. This incident highlights that security isn’t just about protecting infrastructure; it’s about protecting every link in a vast, invisible web of trust,” Levi explained. The malicious code, mainly targeting Ethereum and Solana transactions, was created to swap destination addresses to the hacker’s wallet, the Security Alliance wrote in a post-attack blog…
Share
BitcoinEthereumNews2025/09/11 01:27
Share