Futures
Access hundreds of perpetual contracts
CFD
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Promotions
AI
Gate AI
Your all-in-one conversational AI partner
Gate AI Bot
Use Gate AI directly in your social App
GateClaw
Gate Blue Lobster, ready to go
Gate for AI Agent
AI infrastructure, Gate MCP, Skills, and CLI
Gate Skills Hub
10K+ Skills
From office tasks to trading, the all-in-one skill hub makes AI even more useful.
GateRouter
Smartly choose from 40+ AI models, with 0% extra fees
Malicious Code Hidden in Job Interview: Web3 Developers Targeted Through GitHub Deployment Scam
Security researchers at SlowMist have uncovered a sophisticated scheme where scammers impersonating a Ukraine-based Web3 team use fake job interviews as cover to distribute compromised code repositories. In a recent incident, a developer was asked to locally execute code from a GitHub repository during the interview process—a request that could have proven catastrophic.
The Attack Mechanism: What Happens Behind the Scenes
Upon execution, the seemingly legitimate repository deploys a multi-stage attack. The backdoor payload silently installs malicious dependencies, transforming the victim’s development environment into a gateway for data theft. The malware specifically targets:
Once harvested, all stolen information is exfiltrated to the attacker’s command-and-control server, giving bad actors complete control over the victim’s digital assets and accounts.
Why This Attack Works
The recruitment interview creates a false sense of legitimacy. Developers feel motivated to demonstrate their capabilities and prove their worth to a potential employer. By requesting code execution as part of a “technical assessment,” attackers exploit this psychological dynamic. The targets are typically experienced developers—exactly the people who manage mnemonic phrases and hold significant cryptocurrency holdings.
Critical Defense Measures
Never execute code from unverified sources, regardless of context or social pressure. Before running any repository:
This incident exemplifies how social engineering combined with technical exploitation remains one of the most effective attack vectors in Web3. Staying cautious and implementing these verification steps can prevent devastating losses.