TL;DR:
- The prediction market platform referred to as the allegations “full and utter nonsense” and guaranteed that there was no compromise of its inside programs.
- The alleged attacker claimed to have obtained 300,000 data, however the firm demonstrated that these are knowledge legally collected via its public APIs.
- Cybersecurity consultants help the official model, noting that the incident is definitely “internet scraping” of open data on the blockchain.
Sturdy rumors of insecurity, printed on Darkish Internet boards, triggered the decentralized finance ecosystem to shudder, however in a short while Polymarket stepped up and denied the alleged knowledge leaks. A risk actor underneath the pseudonym “xorcat” claimed to have extracted delicate data from greater than 300,000 data, together with names and pockets addresses.
Full & utter nonsense.
— Polymarket Builders (@PolymarketDevs) April 28, 2026
The corporate’s response was forceful. They took the time to elucidate that the information cited by the hacker was already publicly accessible via their APIs and on-chain data of the blockchain. Consequently, the agency argued that what the hacker presents as a theft is just a set of data that any developer can legitimately seek the advice of.
The inherent transparency of blockchain-based programs permits transaction histories to be auditable by anybody. As a result of this open structure, the platform mocked the attacker’s claims, suggesting that they tried to promote as a “leak” what is definitely a means of gathering public knowledge or “scraping.”

Dismantling the attacker’s narrative and the Bug Bounty program
A essential level within the accusation was the supposed absence of a bug bounty program; the hacker took benefit of this to justify the leak. Nevertheless, this model misplaced credibility when Polymarket confirmed that this program has been energetic since mid-April and has already processed lots of of requests.
Moreover, unbiased safety researchers expressed skepticism concerning the veracity of the huge assault, agreeing that there isn’t a proof of an intrusion into inside servers. Because of this technical help, the funding group has regained its calm, understanding that the platform’s Gamma and CLOB infrastructure stays strong.
Regardless of threats to launch extra data within the coming days, the platform’s stance stays agency in defending the actual privateness of its customers. Due to this fact, the incident appears to be recorded as an extortion try primarily based on knowledge that was already a part of the general public area of the crypto ecosystem.
The prediction market continues to function usually whereas monitoring protocols are strengthened to keep away from future confusion. The episode highlights the significance of distinguishing between the publicity of public knowledge on the blockchain and a real breach of company data safety.
