Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Promotions
AI
Gate AI
Your all-in-one conversational AI partner
Gate AI Bot
Use Gate AI directly in your social App
GateClaw
Gate Blue Lobster, ready to go
Gate for AI Agent
AI infrastructure, Gate MCP, Skills, and CLI
Gate Skills Hub
10K+ Skills
From office tasks to trading, the all-in-one skill hub makes AI even more useful.
GateRouter
Smartly choose from 30+ AI models, with 0% extra fees
CryptoWorld News reports that Polymarket has denied the claims made by dark web user “xorcat” alleging a customer data breach. It said that the information referenced has long been publicly accessible via its API and on-chain data, and is not the result of unauthorized access. The platform also rejected allegations that it lacks a vulnerability reward program. Security researchers have questioned the breach claims, suggesting the data may have been scraped from public sources rather than leaked from internal systems. Polymarket stated that transparency is a core feature of blockchain systems, and that transaction and market data can be openly audited by anyone. The platform mocked the hacker’s allegations on social media, saying that publicly available data was merely collected and repackaged, not leaked. Polymarket also noted that its vulnerability reward program was launched on April 16 and has already received hundreds of submissions, weakening the credibility of the hacker’s narrative.