Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Resolv USR Vulnerability Is Not a Bug - It's a Feature
USR exploit incident from Resolv is not a “bug”—it is the system operating exactly as it was designed. And that is the biggest problem.
When “design” becomes a vulnerability The way USR minting works is extremely simple: Users send USDC to the contract An off-chain service (with privileged private key) decides how much USR to mint The smart contract only checks the minimum, no maximum No collateral ratio limit No cap In other words: the key holder says how much to mint, and the system mints that amount You can send 1 USD… and theoretically mint billions of USR. This design has existed from the very beginning. It’s not a bug. Not a code error. It’s an assumption: 👉 “The key will never be exposed.” And then the inevitable happened The key was compromised. The attack scenario was extremely “clean”: Attacker deposits ~200K USDC through 2 transactions Uses the key to mint 80 million USR without collateral Immediately dumps on DEXes Receives about $23 million worth of ETH No exploit logic needed. No bypassing the contract. Just… using the right permissions. Single Point of Failure — a familiar nightmare The entire system depends on a single private key: No multisig No timelock No mint limit No on-chain collateral ratio check => Once the key is exposed = unlimited money printer activated This is no longer a technical issue. It’s a system architecture problem. “Code is law” — but this law is too dangerous The scariest part is not the $23 million loss. But: 👉 The contract functioned perfectly 👉 No line of code was “wrong” 👉 No bug to fix Yet the system still collapsed. This reveals a truth that DeFi often ignores: A system doesn’t need bugs to fail. A wrong threat model design is enough. Big lesson: Don’t trust things that are not on-chain What happened with USR is a strong reminder: Off-chain authority = unverified risk Private key ≠ trustless “We will keep the key safe” is not a security model A proper DeFi system needs: Clear on-chain limits (mint cap, collateral ratio) Multisig or distributed control Timelock for critical actions Fail-safe mechanisms for emergencies Conclusion USR was not hacked in the traditional sense. It was just used exactly as it was designed to be. And that’s the real concern: When a system allows unlimited minting with just one key — the exploit is not a “if,” but a “when.” In crypto, sometimes the biggest danger isn’t bugs. It’s misplaced trust.