Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Vercel: Third-party AI tools were compromised, leading to unauthorized access to internal systems; no sensitive data has been tampered with.
Deep Tide TechFlow News, April 21 — Vercel announced an security incident analysis, stating that some of its internal systems experienced unauthorized access. The cause was a third-party AI tool, Context.ai, used by an employee, which was compromised. The attacker used this to take over the employee’s Google Workspace account and access certain environment configuration data. The initial impact involved a small number of customers’ environment variables (such as API keys, tokens, etc.) that were not marked as “sensitive” and may have been leaked. Affected users have been notified and advised to rotate credentials immediately. There is currently no evidence that data marked as “sensitive” or supply chain components (such as npm packages) have been tampered with.
Vercel states that the attacker possesses a high level of technical skill, and has partnered with Mandiant and multiple security agencies to investigate. They have also reported the incident to law enforcement. The company emphasizes that platform services are still operating normally. Users are advised to enable multi-factor authentication, thoroughly rotate potentially leaked environment variables, and review account activity logs and deployment records to prevent further risks.