Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Alright, this Claude Code source code leak should be considered more of a clickbait headline:
I tried using this source code to reverse engineer something, and the result was:
It can be reverse engineered, but it’s not very meaningful. Because Claude Code isn’t actually closed source to begin with.
Actual situation:
- The code for Claude Code CLI has always been readable in the npm package (minified JS), source maps just make it readable TypeScript
- Anthropic has never considered the client-side logic of Claude Code a secret — the core barrier is the Claude model itself, not the CLI tool
- You can now just cat /opt/homebrew/lib/node_modules/@anthropic-ai/claude-code/dist/*.js to see all the logic
What can be reverse engineered:
- Full system prompt content (already visible, the long intro at the start of each conversation)
- Tool invocation orchestration logic (plan/execute/observe cycle)
- Context window management strategies (compression/truncation rules)
- MCP protocol implementation details
- Permission/security check logic
What cannot be reverse engineered:
- Claude model weights (hosted on Anthropic servers)
- API authentication bypass
- Training data
In one sentence: this isn’t a “leak,” it’s more like someone just pretty-printed the minified code.
But it can indeed be used to reconstruct your own connector MCP gateway, and by using CLI headless mode to bypass some of its remote trigger restrictions, it’s still useful.