Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Ministry of Industry and Information Technology NVDB issues "Six Do's and Six Don'ts" recommendations on preventing OpenClaw ("Lobster") open-source agent security risks
People’s Financial News, March 11 — Regarding the security risks in typical “Lobster” application scenarios, the Cybersecurity Threat and Vulnerability Information Sharing Platform (NVDB) organized providers of intelligent agents, vulnerability collection platform operators, cybersecurity companies, and others to propose the “Six Do’s and Six Don’ts” recommendations.
(1) Intelligent Office Scenario Main risks include supply chain attacks and internal network infiltration.
(2) Development and Operations Scenario Main risks include sensitive information leakage and hijacking of control over system devices.
(3) Personal Assistant Scenario Main risks include personal information theft and sensitive data leakage.
(4) Financial Trading Scenario Main risks include erroneous transactions and account hijacking.
(1) Use the latest official version. Download the latest stable version from official channels, enable automatic update notifications; back up data before upgrading; restart services after updates and verify patches are effective. Do not use third-party images or older versions.
(2) Strictly control internet exposure. Regularly check for internet exposure; if found, take immediate offline corrective actions. Do not expose “Lobster” agents directly to the internet; if internet access is necessary, use encrypted channels like SSH, restrict access sources, and use strong passwords, certificates, or hardware keys for authentication.
(3) Adhere to the principle of least privilege. Grant only the minimum permissions necessary for tasks; implement secondary confirmation or manual approval for critical operations like file deletion, data transmission, or system configuration changes. Prefer running in containers or virtual machines to isolate permissions; avoid using administrator accounts during deployment.
(4) Use skill marketplaces cautiously. Carefully review “Skill Packs” downloaded from ClawHub; review code before installation. Avoid skill packs requiring “ZIP downloads,” “shell script execution,” or “password input.”
(5) Prevent social engineering attacks and browser hijacking. Use browser sandboxes, web filters, and extensions to block suspicious scripts; enable audit logs; disconnect from the network and reset passwords immediately if suspicious activity is detected. Avoid visiting unknown websites, clicking on unfamiliar links, or opening untrusted documents.
(6) Establish long-term protective mechanisms. Regularly patch vulnerabilities; stay updated with official security advisories from OpenClaw and the Cybersecurity Threat and Vulnerability Information Sharing Platform; combine with cybersecurity tools and mainstream antivirus software for real-time protection; promptly address potential security risks. Do not disable detailed log auditing.