Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Futures Kickoff
Get prepared for your futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Gate News Report, March 10 — According to BlockSec monitoring, a suspicious transaction targeting the MT-WBNB liquidity pool was detected on BSC, with an estimated loss of approximately $242,000. The vulnerability stems from a flaw in the buyer restriction mechanism: under deflationary mode, normal buy operations are rolled back, while routers/trading pairs are whitelisted. This allows attackers to bypass restrictions through router swaps and liquidity removals to acquire MT from the trading pair. The attacker then sells MT to accumulate pendingBurnAmount and calls distributeFees() to directly burn MT from the trading pair, artificially inflating the price, then exchanges MT back to WBNB for profit. Additionally, a recommended rule allowing transfers of the first 0.2 MT to bypass buyer restrictions enabled the attacker to initiate the attack.