Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Flow Network Security Breach: FLOW Token Halved Amid Recovery Strategy Debate
The Flow network fell victim to a significant security exploit over the weekend, with attackers leveraging a flaw in the execution layer to drain approximately $3.9 million in digital assets. The incident triggered an immediate market reaction, sending the FLOW token into sharp decline—plummeting from $0.173 to as low as $0.079 before stabilizing around $0.107 in the short term. According to current market data, FLOW is trading at $0.09 with a 24-hour decline of 5.77%.
The Rollback Controversy
In response to the breach, the Flow Foundation moved swiftly to contain the damage by taking the network offline and proposing a return to network state from before the attack occurred. However, this proposed rollback strategy encountered fierce resistance from multiple stakeholders. Bridge protocol partners and community members raised critical concerns about the risks inherent in such an approach, particularly the potential for duplicate asset creation and state inconsistencies across connected systems. These technical complications threatened to create cascading problems throughout the ecosystem.
Shift to Alternative Recovery Path
Recognizing the severity of these objections, Flow Foundation withdrew the rollback proposal and pivoted toward an alternative framework called “isolation recovery.” This methodology preserves all legitimate transaction history while avoiding a full network reset. By maintaining the integrity of authentic user activities, the approach sidesteps the systemic complications that would accompany comprehensive network reorganization.
Current Status and Outlook
The network continues operating through a structured recovery phase as the team works to fully restore operational normalcy. This incident highlights the ongoing tensions between rapid incident response and ecosystem stability, particularly when decisions affect multiple interconnected protocols and stakeholder groups.