Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Malicious Code Hidden in Job Interview: Web3 Developers Targeted Through GitHub Deployment Scam
Security researchers at SlowMist have uncovered a sophisticated scheme where scammers impersonating a Ukraine-based Web3 team use fake job interviews as cover to distribute compromised code repositories. In a recent incident, a developer was asked to locally execute code from a GitHub repository during the interview process—a request that could have proven catastrophic.
The Attack Mechanism: What Happens Behind the Scenes
Upon execution, the seemingly legitimate repository deploys a multi-stage attack. The backdoor payload silently installs malicious dependencies, transforming the victim’s development environment into a gateway for data theft. The malware specifically targets:
Once harvested, all stolen information is exfiltrated to the attacker’s command-and-control server, giving bad actors complete control over the victim’s digital assets and accounts.
Why This Attack Works
The recruitment interview creates a false sense of legitimacy. Developers feel motivated to demonstrate their capabilities and prove their worth to a potential employer. By requesting code execution as part of a “technical assessment,” attackers exploit this psychological dynamic. The targets are typically experienced developers—exactly the people who manage mnemonic phrases and hold significant cryptocurrency holdings.
Critical Defense Measures
Never execute code from unverified sources, regardless of context or social pressure. Before running any repository:
This incident exemplifies how social engineering combined with technical exploitation remains one of the most effective attack vectors in Web3. Staying cautious and implementing these verification steps can prevent devastating losses.