Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Cross-chain bridge vulnerability confirmed! Attackers mint tokens for arbitrage, and DOT was temporarily "created out of thin air." Further details of the Hyperbridge security incident reveal: its Handler V1 contract on Ethereum has a Merkle Mountain Range (MMR) proof replay vulnerability, ultimately causing a loss of approximately $242k. The core issue is that proofs and requests are not bound together. Attackers can reuse historical valid proofs, combined with forged new requests, to bypass verification mechanisms. Specific attack methods include: tampering with DOT Token administrator permissions to "mint" DOT and sell for profit (about $237.4k); using the same method to attack ARGN Token (loss of about $3,800); and ultimately withdrawing funds. Earlier, there was an extreme case where DOT on Ethereum was abnormally minted up to 1 billion tokens, triggering market panic. This vulnerability was discovered by security firm Phalcon Security and analyzed using on-chain tools.