Futures
Hundreds of contracts settled in USDT or BTC
TradFi
Gold
Trade global traditional assets with USDT in one place
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Futures Kickoff
Get prepared for your futures trading
Futures Events
Participate in events to win generous rewards
Demo Trading
Use virtual funds to experience risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and enjoy airdrop rewards!
Futures Points
Earn futures points and claim airdrop rewards
Investment
Simple Earn
Earn interests with idle tokens
Auto-Invest
Auto-invest on a regular basis
Dual Investment
Buy low and sell high to take profits from price fluctuations
Soft Staking
Earn rewards with flexible staking
Crypto Loan
0 Fees
Pledge one crypto to borrow another
Lending Center
One-stop lending hub
VIP Wealth Hub
Customized wealth management empowers your assets growth
Private Wealth Management
Customized asset management to grow your digital assets
Quant Fund
Top asset management team helps you profit without hassle
Staking
Stake cryptos to earn in PoS products
Smart Leverage
New
No forced liquidation before maturity, worry-free leveraged gains
GUSD Minting
Use USDT/USDC to mint GUSD for treasury-level yields
Truebit Protocol experienced a serious security incident on January 8, 2026. According to the analysis report by security firm SlowMist, the attack originated from a critical vulnerability in the Purchase contract.
Specifically, the issue was in the price calculation module. Due to the use of Solidity version 0.6.10, which lacks built-in overflow protection mechanisms, the contract was at risk of integer overflow during addition operations. The attacker exploited this by carefully constructing a series of extreme minting operations. By inputting abnormally large minting amounts, they caused the contract's price calculation to drop directly to zero.
With the zero-price vulnerability, subsequent arbitrage became trivial. The attacker repeatedly executed a "mint—burn" cycle, profiting at no cost each time. This process continued until the contract's reserve pool was completely drained. According to statistics, the hacker gained approximately 8,535 ETH from this attack.
This incident serves as a reminder to developers that extreme caution must be exercised when handling integer operations. Even seemingly simple addition operations require explicit safety measures before automatic checks were introduced in higher versions of Solidity. For DeFi projects, the price calculation logic is of utmost importance— a tiny computational error can escalate into significant economic losses.