Close Menu
    Facebook X (Twitter) Instagram
    ScoopSquare24
    • Home
    • News
    • AI
    • Crypto
    • Finance
    • Stocks
    Facebook X (Twitter) Instagram
    ScoopSquare24
    Home»News»Dangerous AI Routers Are Draining Crypto Wallets: What Developers Must Know
    News

    Dangerous AI Routers Are Draining Crypto Wallets: What Developers Must Know

    Oli DaleBy Oli DaleApril 13, 2026No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Key Takeaways

    • University of California study identified 26 compromised third-party LLM routing services targeting crypto developers
    • Researchers witnessed one routing service drain Ethereum from a test wallet setup
    • These routing services can read all transmitted data in plain text, exposing sensitive information like wallet keys
    • Automatic execution features like “YOLO mode” enable AI systems to run injected malicious instructions without human oversight
    • Security experts urge developers to keep cryptocurrency credentials completely separate from AI-assisted coding sessions

    A team from the University of California has uncovered a troubling vulnerability in the artificial intelligence development ecosystem: compromised routing services capable of siphoning cryptocurrency credentials and embedding harmful code into software projects.

    26 LLM routers are secretly injecting malicious tool calls and stealing creds. One drained our client $500k wallet.

    We also managed to poison routers to forward traffic to us. Within several hours, we can directly take over ~400 hosts.

    Check our paper: https://t.co/zyWz25CDpl pic.twitter.com/PlhmOYz2ec

    — Chaofan Shou (@Fried_rice) April 10, 2026

    The research team published their discoveries this week in a comprehensive study examining what they termed “adversarial intermediary threats” targeting the large language model infrastructure chain.

    These LLM routing platforms function as intermediary services positioned between software developers and major AI providers such as OpenAI, Anthropic, and Google. Their purpose is to orchestrate and distribute API traffic across various AI service providers.

    The security weakness stems from how these platforms handle encrypted communications. They must decrypt traffic to function, which grants them unrestricted access to view all information flowing through their systems.

    Developers leveraging AI-powered development tools like Claude Code for building blockchain applications or cryptocurrency storage solutions may unknowingly transmit sensitive wallet keys and recovery phrases through these compromised intermediaries.

    The research team evaluated 28 commercial routing platforms alongside 400 free-tier services collected from developer communities.

    Their investigation revealed nine platforms actively embedding malicious instructions, two employing sophisticated detection-avoidance techniques, and 17 harvesting researcher-controlled Amazon Web Services authentication tokens.

    One particular routing service successfully withdrew Ethereum from a deliberately created honeypot wallet. The researchers documented losses totaling less than $50.

    According to the study, distinguishing between legitimate credential processing and outright theft presents an essentially insurmountable challenge for end users, given that routing platforms inherently process sensitive information in unencrypted form during normal operations.

    The Dangers of Automatic Execution

    The study highlighted an especially concerning feature present in numerous AI automation frameworks known as “YOLO mode.” When activated, this configuration allows AI systems to perform operations immediately without requesting user confirmation.

    This capability amplifies the security threat significantly. When a routing platform injects harmful commands, YOLO mode enables those commands to execute completely unsupervised.

    The research team also discovered that previously trustworthy routing services can become compromised covertly without operators being aware. Free-tier platforms especially may advertise discounted API connectivity as bait while secretly harvesting authentication credentials.

    Security Recommendations for Developers

    The researchers urged software developers to implement stronger client-side security measures and categorically prohibit cryptocurrency keys or recovery phrases from being transmitted through AI-assisted development environments.

    For a sustainable solution, the research team suggested that AI service providers should implement cryptographic signature verification for their outputs. This would enable developers to authenticate that instructions received by AI agents genuinely originated from the intended model provider.

    Co-author Chaofan Shou shared on X that “26 LLM routers are secretly injecting malicious tool calls and stealing creds.”

    The researchers emphasized that LLM API routing platforms occupy a critical security perimeter that the wider artificial intelligence industry currently assumes to be inherently trustworthy.

    The published study did not include specific details such as blockchain transaction identifiers for the compromised wallet incident.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Oli Dale
    • Website

    Related Posts

    Circle Internet (CRCL) Hit with Class Action Lawsuit Over $280M Drift Protocol Breach

    April 17, 2026

    JPMorgan Analysts Say CLARITY Act Could Pass Before Midterm Elections

    April 17, 2026

    Solana (SOL) Approaches Critical Price Level as Network Surpasses $1 Trillion Milestone

    April 17, 2026
    Leave A Reply Cancel Reply

    Breaking News
    Parameter

    Applied Materials (AMAT) Stock: Q2 Earnings Spike as AI Chip Demand Surges

    Parameter
    May 14, 2026 9:27 PM
    Coincentral

    HYPE Price Jumps 13% as Bitwise Hyperliquid ETF Prepares NYSE Debut

    Coincentral
    May 14, 2026 9:23 PM
    Blockonomi

    Kraken Migrates kBTC to Chainlink CCIP as LayerZero Exodus Grows

    Blockonomi
    May 14, 2026 9:23 PM
    Coincentral

    Kelp Reopens rsETH Withdrawals as Kraken Moves Wrapped Assets to Chainlink CCIP

    Coincentral
    May 14, 2026 9:07 PM
    Parameter

    Odysight.ai (ODYS) Stock: Defense and Industrial Deals Support Growth Outlook

    Parameter
    May 14, 2026 9:05 PM
    Parameter

    Xanadu Quantum Technologies (XNDU) Stock: Q1 Revenue Jumps 4x as Quantum Roadmap Gains Momentum

    Parameter
    May 14, 2026 8:57 PM
    Coincentral

    CLARITY Act Advances From Senate Banking Committee in 15-9 Vote, What Next?

    Coincentral
    May 14, 2026 8:50 PM
    Parameter

    Figma (FIG) Stock: Shares Jump After Q1 Revenue Growth Accelerates to 46%

    Parameter
    May 14, 2026 8:37 PM
    Coincentral

    XRP Price Prediction as CME Group Adds XRP to Its New Nasdaq Crypto Index

    Coincentral
    May 14, 2026 8:23 PM
    Parameter

    Fermi America (FRMI) Stock: Eyes Growth With Project Matador Power Campus

    Parameter
    May 14, 2026 8:19 PM
    Parameter

    Cerebras Systems (CBRS) Stock: Surge 69% as AI Chipmaker Soars After Blockbuster Nasdaq Listing

    Parameter
    May 14, 2026 8:12 PM
    Parameter

    POET Technologies (POET) Stock: $50M Lumilens Deal Sparks 39% Rally

    Parameter
    May 14, 2026 7:39 PM
    Moneycheck

    Strive (ASST) Stock Rallies on Daily Dividend Strategy and Bitcoin Holdings Expansion

    Moneycheck
    May 14, 2026 7:33 PM
    Blockonomi

    Strive (ASST) Stock Climbs on Daily Dividend Strategy and Bitcoin Holdings Growth

    Blockonomi
    May 14, 2026 7:20 PM
    Coincentral

    Strive (ASST) Stock: Surge as Daily Dividend Plan Fuels Bitcoin Treasury Buzz

    Coincentral
    May 14, 2026 7:10 PM
    Facebook X (Twitter) Instagram Pinterest
    ScoopSquare24

    Copyright © 2013 - 2026 Kooc Media Ltd. All rights reserved. Registered Company No.05695741
    Our Sites: FlowPresets / GardenBeast / GolfMonster / Blockonomi / Money Check / CoinCentral / Parameter / Circlo / Computing.net

    Type above and press Enter to search. Press Esc to cancel.