Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Promotions
AI
Gate AI
Your all-in-one conversational AI partner
Gate AI Bot
Use Gate AI directly in your social App
GateClaw
Gate Blue Lobster, ready to go
Gate for AI Agent
AI infrastructure, Gate MCP, Skills, and CLI
Gate Skills Hub
10K+ Skills
From office tasks to trading, the all-in-one skill hub makes AI even more useful.
GateRouter
Smartly choose from 40+ AI models, with 0% extra fees
๐๐ฉ๐ซ๐ข๐ฅ ๐๐๐๐ ๐ฆ๐๐ฒ ๐ ๐จ ๐๐จ๐ฐ๐ง ๐๐ฌ ๐จ๐ง๐ ๐จ๐ ๐ญ๐ก๐ ๐ฆ๐จ๐ฌ๐ญ ๐ซ๐๐ฏ๐๐๐ฅ๐ข๐ง๐ ๐ฆ๐จ๐ง๐ญ๐ก๐ฌ ๐๐จ๐ซ ๐๐ซ๐ฒ๐ฉ๐ญ๐จ ๐๐ฑ๐ฉ๐ฅ๐จ๐ข๐ญ๐ฌ.
Not because it had the most hacks.
But because it exposed how the system actually fails.
ฮฑ/ The Data (what actually happened)
~21+ incidents
~$600M+ total losses
Top 2 exploits (Kelp + Drift): majority of losses
Breakdown:
> Kelp: ~$293M (bridge / interoperability failure)
> Drift: ~$285M (admin compromise + price manipulation)
> Grinex: ~$15M (hot wallet)
> Rhea: ~$18.4M (fake collateral)
Everything else:
> Mostly sub-$5M
> Many sub-$500K
This is not a uniform distribution.
Itโs extremely concentrated risk.
ฮฒ/ What This Month Shows
April didnโt produce new exploit types.
It repeated the same ones โ across different scales.
You can group every incident into two systems:
1. High-Frequency Failures (Protocol Logic Layer)
These happen often.
Examples from April:
> Oracle misconfigurations: Silo V2, Singularity
> Fake collateral: Rhea Lend
> Reserve manipulation: BSC pools
> Access control bugs: SubQuery, Aethir
> Accounting flaws: MONA, Dango
> Signature gaps: Giddy
> Bridge logic flaws: Hyperbridge, Purrlend
Pattern:
Known vulnerabilities
Repeated across protocols
Usually contained in size
What this means:
The industry is still shipping with fragile assumptions
Complexity is increasing faster than verification
2. Low-Frequency Failures the (Control + Infrastructure Layer)
These happen rarely.
But dominate outcomes.
Examples:
> Drift: admin compromise + pricing failure
> Kelp: bridge exploit (LayerZero OFT)
> Grinex: wallet-level compromise
> Zerion: social engineering wallet breach
Pattern:
Not just code exploits
Failures of authority, access, and coordination
What this means:
Once control is compromised, contracts donโt matter
Security shifts from code โ who holds power
ฮณ/ The System Model
Crypto is running a two-speed failure system:
Frequent, low-impact logic failures
Rare, high-impact control failures
Both were visible in April.
But only one defines the month.
โ Where the System Actually Breaks
Failures cluster around:
> Oracles: external data assumptions
> Bridges: cross-chain verification
> Admin keys / multisigs: centralized control points
> Accounting logic: internal consistency failures
> Signature systems: validation gaps
These are the invisible layers.
Users donโt see them, but they carry the most risk.
April wasnโt random, it exposed the industryโs vulnerabilities.