Futures
Hundreds of contracts settled in USDT or BTC
TradFi
Gold
Trade global traditional assets with USDT in one place
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Futures Kickoff
Get prepared for your futures trading
Futures Events
Participate in events to win generous rewards
Demo Trading
Use virtual funds to experience risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and enjoy airdrop rewards!
Futures Points
Earn futures points and claim airdrop rewards
Investment
Simple Earn
Earn interests with idle tokens
Auto-Invest
Auto-invest on a regular basis
Dual Investment
Buy low and sell high to take profits from price fluctuations
Soft Staking
Earn rewards with flexible staking
Crypto Loan
0 Fees
Pledge one crypto to borrow another
Lending Center
One-stop lending hub
VIP Wealth Hub
Customized wealth management empowers your assets growth
Private Wealth Management
Customized asset management to grow your digital assets
Quant Fund
Top asset management team helps you profit without hassle
Staking
Stake cryptos to earn in PoS products
Smart Leverage
New
No forced liquidation before maturity, worry-free leveraged gains
GUSD Minting
Use USDT/USDC to mint GUSD for treasury-level yields
Hackers are exploiting the Claude Code vulnerability to target crypto users; security risks should be taken seriously.
Recently, a serious security threat has emerged: attackers are exploiting a high-risk vulnerability in Anthropic’s Claude Code tool to carry out targeted phishing attacks against cryptocurrency users. According to security researcher Adam Chester and confirmed by the SlowMist security team, this incident has shifted from a theoretical risk to a real threat.
High-Risk Privilege Escalation Vulnerability in Anthropic Claude Code
The vulnerability (CVE-2025-64755) centers on a privilege escalation and command execution flaw, most critically allowing attackers to bypass user authorization and execute commands directly. Researcher 23pds pointed out that this is similar to a previously disclosed vulnerability in the AI code editor Cursor, indicating that such AI programming tools may face systemic security weaknesses. Proof-of-concept (PoC) code has been publicly released, significantly lowering the barrier for exploiting this vulnerability.
SlowMist Security Team Confirms Active Attacks, Cryptocurrency Users as Primary Targets
Worryingly, hackers are not just testing the waters. The SlowMist security team has confirmed through threat intelligence that attackers are actively exploiting this vulnerability via phishing to target cryptocurrency community users. Due to the high asset value, crypto users have become prime targets. Successful attacks could lead to private key leaks, theft of funds, and other serious consequences.
Security Recommendations and Industry Reflection
In response to this threat, users should take proactive protective measures: avoid using Claude Code links from unverified sources, regularly update AI tool versions, and remain cautious of any requests that ask for command execution permissions. Additionally, this incident highlights that rapidly evolving AI programming tools may lack sufficient security review, underscoring the need for the industry to establish stricter security standards and vulnerability response mechanisms.