Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
The QuantMaster project was hacked for hundreds of thousands of U, and preliminary investigations confirmed that malicious code was implanted by a person.
According to Wu, member of the encryption community Cat and project party developer Thomson disclosed that the QuantMaster project was compromised due to a hardcoded malicious address in the contract, resulting in the theft of hundreds of thousands of USDT. The employee involved submitted code containing the malicious address via Git, claiming it was automatically generated by AI. However, the founder of Slow Mist, Yu Xian, pointed out that the related address does not match the AI completion result, effectively ruling out the possibility of AI wrongdoing. The project party has reported the case, and the suspect has been identified as the employee who submitted the code, with relevant devices and records clearly pointing to them.