Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Promotions
AI
Gate AI
Your all-in-one conversational AI partner
Gate AI Bot
Use Gate AI directly in your social App
GateClaw
Gate Blue Lobster, ready to go
Gate for AI Agent
AI infrastructure, Gate MCP, Skills, and CLI
Gate Skills Hub
10K+ Skills
From office tasks to trading, the all-in-one skill hub makes AI even more useful.
GateRouter
Smartly choose from 40+ AI models, with 0% extra fees
OpenClaw new version prohibits AI models from enabling high-risk configurations through dialogue
ME News message, April 14 (UTC+8). According to monitoring by 1M AI News, the open-source AI Agent platform OpenClaw released v2026.4.14. Unlike the intensive feature updates from the past two weeks, this version has almost no new features. Of more than 50 fixes, about 12 directly target security hardening, making it the most concentrated recent security tightening.
The most important architectural change is tightening (restriction) the permissions for the gateway tool. Previously, AI models could modify instance configurations by calling config.patch and config.apply, including enabling high-risk flag values such as dangerouslyDisableDeviceAuth\ and \allowInsecureAuth. In the new version, such calls are directly blocked at the gateway tool level: any patch request that would newly enable dangerous flags listed in openclaw security audit is rejected. Already enabled flags are not affected, and modifications to non-dangerous configuration items proceed as usual. This means that even if the AI is induced by prompt injection, it cannot bypass the protections in the security audit checklist through conversation.
The remaining security fixes cover multiple attack surfaces:
In terms of functionality, there are only two items: predefining the gpt-5.4-pro model definition and pricing configuration, providing forward compatibility before OpenAI officially launches; and Telegram forum topics can now display human-readable topic names instead of internal IDs.
(Source: BlockBeats)