Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
#隐私币和隐私钱包 A $1.5 million contract vulnerability was exposed on ARB, and the funds were anonymized through Tornado Cash. This incident serves as a wake-up call for us—when chasing gains, don’t just focus on airdrop rewards; project team’s account security measures also deserve a look.
Event recap: Attackers exploited a proxy contract permission vulnerability to control USDGambit and TLP projects, transferring assets directly to Ethereum and then into Tornado Cash. What does this indicate? It suggests that some project deployers may have issues with private key management or permission configurations that leave blind spots.
Practical advice: Before interacting with new projects, check whether their contracts have been audited and if admin permissions are set reasonably. If a project’s proxy contract management is a mess, the risk of an airdrop attack skyrockets. Additionally, we should also enhance the privacy protection of our own wallets—use privacy wallets or privacy coins for large transactions to reduce targeted risks.
The most heartbreaking part of this incident is that the stolen funds disappeared without a trace through mixing services, indicating that privacy tools have become the last link in the attack chain. When chasing gains, we should also leverage these tools effectively to protect our interaction footprints and assets. The bottom line is: choose projects based on technology, and protect yourself with privacy.