Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Newcomers ask me how to see “trustworthiness” from GitHub, audit reports, and upgrade multi-sigs. I generally don’t teach tricks… Let me start with something counterintuitive: don’t rush to trust the label system. Recently, haven’t people been complaining about on-chain data tools’ address labels lagging behind—sometimes even being misleading? And the “security/decentralization” labels the project team posts themselves can be changed at any time. Like matching delays, surface numbers that look good don’t necessarily mean the execution quality is good.
I’d first flip through GitHub to look for the “human side”: is there long-term maintenance? Are issues answered? Are changes centered around the same logic—rather than suddenly a big batch of commits and then silence. When it comes to audit reports, don’t just look at “passed.” See what it actually pointed out, which risks were “accepted,” and whether those were truly fixed afterward. Don’t leave one PDF sitting there like a talisman. Upgrading multi-sigs is even more practical: who the signers are may not be easy to understand, but you can at least tell by the threshold, whether there’s a timelock, and whether emergency permissions have limits—those details can help you judge who can change the rules with a single click if something goes wrong.
What I’ve learned isn’t tricks, but this: treat it like an execution path—who can change it, how they change it, and how long it takes before you find out after it’s changed. Read this way, it’s less likely to put you to sleep by things that only “look safe.”