Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Recently, the methods used to attack cryptocurrency users have been upgrading. Security researcher 23pds issued a warning that phishing hackers are frequently using new social engineering and technical tactics, with actual cases already exposed. Simply put—don't click on unfamiliar links, and be extra cautious with suspicious transactions.
But that's not all. Researcher Adam Chester also discovered a more troubling issue: a privilege escalation and command execution vulnerability (CVE-2025-64755) in Anthropic's Claude Code. This vulnerability is quite severe; attackers can execute commands directly without user authorization. Even worse, the proof-of-concept code has already been made public. Ironically, similar vulnerabilities have appeared before in Cursor tools, indicating that the security reinforcement of AI programming assistance tools still needs to be improved.
That permission flaw in Claude—does it allow execution without authorization? Isn't that basically opening a backdoor for hackers?
Phishing is getting more sophisticated. I’ve received a few suspicious links recently and didn’t click on any of them
The PoC has been made public, which is really outrageous. We need to update quickly
It feels like security vulnerabilities are popping up one after another. This life is getting a bit exhausting
AI programming tools still need more polishing; otherwise, I wouldn’t dare to use them
Damn, Cursor had the same problem before? How does this industry keep repeating the same mistakes?
You really shouldn’t click on any unfamiliar links. I’ve set mine to automatically ignore them
Public disclosure of vulnerabilities is really the worst. Hurry up and patch them, everyone
Once you confirm the language, I will immediately generate a social comment in the style of the ETH Reserve Bank account.