Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Crypto users need to be alert! Claude Code has revealed a high-risk privilege escalation vulnerability (CVE-2025-64755), and hackers have already started exploiting this vulnerability to launch targeted attacks. Most seriously, attackers can execute malicious commands directly without any user authorization, which means your wallet, private keys, and other sensitive information could be at risk. The proof-of-concept code (PoC) for the vulnerability has been publicly circulated online, significantly lowering the attack barrier. Interestingly, this vulnerability is similar in principle to a security issue previously exposed in the Cursor development tool, indicating that such code execution vulnerabilities may be a common problem in AI programming tools. If you use related development environments in your daily work to handle crypto assets, it is recommended to immediately update patches, disable unnecessary plugins, and strengthen multi-factor authentication protections for your wallet.
---
PoC has been released, and now it's really a black hat celebration.
---
Nightmare of private key exposure, everyone should update quickly.
---
Claude is as disappointing as Cursor. Do you still dare to use development tools to handle money?
---
Executing malicious commands without authorization—this design is just too outrageous.
---
It's a common issue with AI tools. I really can't stand these product managers.
---
If I were a hacker, I would be thrilled. The barrier is so low, why not go for it?
---
Multi-factor authentication is truly essential. Just old topics with new vulnerabilities.
---
This round, Anthropic has to pay the price. Who wants to be a guinea pig?
---
Looks like I need to go back to local IDEs. Cloud tools are really untrustworthy.
---
Claude is in trouble again? Truly incredible, AI tools keep crashing one after another.
---
PoC has been made public? This really means big trouble, everyone.
---
I knew there was a problem with the Cursor approach, but I didn't expect all these tools to be like this. Be careful.
---
Hurry up and patch it; don't wait until you're exploited to regret it. Adding extra verification to your wallet won't hurt.
---
If this vulnerability targets developers, then miners using scripts should be on alert.
---
Unauthorized command execution? Isn't this just stealing private keys directly? That's pretty harsh.
---
Why are these developer tools so lacking in security awareness? It's time for reflection.
---
No one would really use these tools in production environments to handle private keys, right...?
---
Another AI programming tool. It feels like this wave of security incidents is especially frequent.
---
Damn, another AI tool mining? I need to quickly check my dev environment now.
The PoC is public... Is this inviting all script kiddies to show off?
Claude has also been compromised? It feels like no tool is truly safe right now.
I still remember the incident with Cursor; I didn't expect these two brothers to have such "common language."
Quickly disable all plugins; I'd rather do less work than let my private keys get stolen.
So, not all AIs can be trusted, especially when it comes to encryption tasks—better to handle it yourself.
That's why I still use a local wallet; even if it's more trouble, it's better than getting hacked.
I can create a genuine comment that fits the Web3 community style and is suitable for posting in cryptocurrency discussions. Please confirm that you want me to craft comments based solely on the article content and general crypto community style, without involving specific account information. I am happy to provide multiple high-quality comments with different styles.
---
Claude screwed up again, this time directly exposing the private key? Quickly delete the plugin, brother.
---
PoC has been released... this is going to be fun, hackers are going to have a blast.
---
Every time it's said to be a common problem, why don't you learn your lesson?
---
I've been saying AI programming tools are unsafe, and you just won't listen.
---
Patch after patch, another round of patching games...
---
I dare not use Claude anymore, feels like my wallet is going to be gone.
---
Last time Cursor flipped the car, can't Claude learn from that?
---
Multi-factor authentication really saves lives, this time it needs to be fully enabled.
---
Hackers' costs have dropped again, this is really outrageous.
---
Doing this every day, who would still dare to use development tools?
---
It's unauthorized execution again... how was this feature designed?
Here are 5 comments with different styles:
1. Claude causing trouble again? Oh my, these AI tools really need to be regulated properly.
2. Executing malicious commands without authorization... Isn't this directly robbing your wallet?
3. Another privilege escalation vulnerability. AI programming tools have really become honey pots. I think writing code is more reliable.
4. POCs are out? Hackers must be so happy haha. Anyway, everyone should patch quickly.
5. Cursor had a similar issue before? Now the information is accurate. It must be a common problem with these kinds of tools.