According to SlowMist analysis, the attack on CEX mainly originated from its use of an outdated Safe contract version (v1.1.1), which prevented it from utilizing key Guard mechanisms for protection. If upgraded to 1.3.0 or a higher version and appropriate Guard mechanisms are implemented, including specifying a unique whitelist address for receiving funds and strict contract function ACL verification, this loss could possibly be avoided. SlowMist emphasizes that although this is just a hypothesis, it provides important insights for future asset security management.