Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Versions below 1.0.41 of the Claude Chrome extension contain a high-risk vulnerability. Please update promptly.
According to a TechFlow report on March 27, citing Koi, the Claude Chrome extension under Anthropic has a high-risk prompt injection vulnerability, affecting all versions of the extension below 1.0.41.
Attackers can construct malicious web pages that silently load an iframe containing a cross-site scripting (XSS) vulnerability in the background, executing malicious payloads within the a-cdn.claude.ai subdomain. Since this subdomain is on the extension’s trusted whitelist, attackers can directly send malicious prompts to the Claude extension and execute them automatically, all without user authorization or any clicks, leaving victims unaware.
This vulnerability can allow attackers to control the Claude extension to read users’ Google Drive documents, steal business access tokens, or export chat logs, and can also take over the current browser session to perform sensitive actions like sending emails on behalf of the victim.
GoPlus recommends that users immediately update the Claude extension to version 1.0.41 or above, while also being cautious of phishing links.