Solana wallet exploited by a trading bot

-

A user’s Solana wallet has been exploited in what appears to be the first case of an AI poisoning attack. It seems that even AI chatbots aren’t immune to these threats.

In AI we trust?

A user was trying to create a simple crypto app, a token bumper for Pump.fun, when they discovered that ChatGPT isn’t as security-savvy as they thought.

The chatbot provided an API link for the code, and that turned out to be contaminated, leading to an immediate loss of funds.

The token bumper connected to this flawed API, which then requested the wallet’s private key and drained all its assets.

This incident serves as a quite painful reminder that while AI tools can be incredibly useful, they aren’t foolproof when it comes to Web3 security.

solana
X

New kind of exploit

The fake API site has been busy siphoning SOL from multiple wallets, with the exploiter already completing 281 transactions.

Most of these transactions were relatively small, but every wallet involved was compromised.

Rumors about AI poisoning attacks have been floating around for some time, but this is the first full exploit we’ve seen in the crypto space.

The founder of SlowMist, a security firm focused on on-chain protection, confirmed that the likely culprit was a user experimenting with AI without properly verifying the code. The result? A functional bot with a sneaky backdoor.

The exploiter used their malicious API link to swipe some of the latest meme tokens and stash them in a known wallet. The haul included USDC, SOL, and tokens like ELIZA, CHILLGIRL, and AI16Z.

ChatGPT works from public libraries, and they can be infected

What’s particularly alarming is how quickly the site acted after each connection. It’s unclear who else fell victim to this fake API site or how it managed to infiltrate OpenAI’s data.

One theory is that ChatGPT pulls Python code from various repositories, which could lead to infected data being generated.

Ultimately, while AI may amplify these attacks, the intent to steal wallet data comes from human agents behind the scenes.

Interestingly, the code generated by ChatGPT included a request for the private key. According to ScamSniffer, the exploiters intentionally seeded AI-generated Python code that users would deploy to hunt new Pump.fun tokens.

solana
X

Trusting this code was where many users went wrong, especially those eager for Moonshot or Pump.fun trading bots.

Some of these repositories are still active despite reports of their malicious nature. For example, one user’s repository, Solanaapisdev, continues to host risky trading bots that could drain wallets.

Have you read it yet? Trump considers a new government role, the crypto-czar

LATEST POSTS

Hyperliquid Smacks Down Insider Trading Fiasco

Strap in for the latest DeFi drama about Hyperliquid, that perpetual futures DEX that's been riding the HYPE rollercoaster like a gonzo gambler in a...

USDT Crashes the Cash Party: $156B Micropayments in 2025!

Dust off the saloon doors in the town of global finance, here comes USDT, the rootin'-tootin' stablecoin, with $156 billion in micropayments under $1,000. We're...

Crypto’s Third Rail Zaps Trump: Hoskinson’s Wild Rant Shocks the Silence

Out in the neon-lit badlands of blockchain, a lone ranger named Charles Hoskinson saddles up against the orange whirlwind himself, President Donald Trump. Cardano's founder...

Digital Euro’s Loaded Gun: ECB Ready, Politicians Pull Trigger or Chicken Out?

In the grand casino of European finance, Christine Lagarde struts out like the unflappable dealer, slamming down her cards. The digital euro infrastructure gleams, fully operational,...
130FollowersFollow

Most Popular

Guest posts