{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"After the successful upgrade of the Injective chain, what should DEX relay provider pay attention to?","a":"Assess the security and stability of the upgraded chain, closely monitor security risks and potential vulnerabilities, and ensure the safety of user assets."}]}],"pr":"059205e71ba3fa62e7aec88978d7f392cd57f5b6aedecd19f8faf0bb2b23d9c6"}