{"id":80784,"date":"2026-04-14T02:31:32","date_gmt":"2026-04-14T02:31:32","guid":{"rendered":"https:\/\/dogewisperer.com\/?p=80784"},"modified":"2026-04-14T02:31:32","modified_gmt":"2026-04-14T02:31:32","slug":"crypto-security-faces-new-test-as-rogue-ai-agents-emerge","status":"publish","type":"post","link":"https:\/\/dogewisperer.com\/?p=80784","title":{"rendered":"Crypto Security Faces New Test As Rogue AI Agents Emerge"},"content":{"rendered":"<div>\n<p>Researchers from the University of California set up a trap \u2014 a crypto wallet loaded with a small amount of <a href=\"https:\/\/www.coingecko.com\/en\/coins\/ethereum\" target=\"_blank\" rel=\"noopener nofollow\">Ether<\/a> and connected to third-party AI routing infrastructure. One of the routers took the bait. The wallet was drained. The loss was under $50, but the implications reached far beyond the dollar amount.<\/p>\n<p>That experiment was part of a broader study published recently, in which researchers tested 428 large language model routers \u2014 28 paid and 400 free \u2014 collected from public online communities.<\/p>\n<p>What they found was alarming. Nine routers were actively <a href=\"https:\/\/x.com\/Fried_rice\/status\/2042423713019412941\" target=\"_blank\" rel=\"noopener nofollow\">inserting malicious code<\/a> into traffic passing through them. Two were using evasion techniques to avoid detection. Seventeen accessed AWS credentials belonging to the researchers. One stole actual cryptocurrency.<\/p>\n<h2>How Routers Became A Security Blind Spot<\/h2>\n<p>LLM routers sit between a developer\u2019s application and AI providers such as OpenAI, Anthropic, and Google. They work as intermediaries, bundling API access into a single pipeline.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">26 LLM routers are secretly injecting malicious tool calls and stealing creds. One drained our client $500k wallet.<\/p>\n<p>We also managed to poison routers to forward traffic to us. Within several hours, we can directly take over ~400 hosts.<\/p>\n<p>Check our paper: <a href=\"https:\/\/t.co\/zyWz25CDpl\" rel=\"nofollow\">https:\/\/t.co\/zyWz25CDpl<\/a> <a href=\"https:\/\/t.co\/PlhmOYz2ec\" rel=\"nofollow\">pic.twitter.com\/PlhmOYz2ec<\/a><\/p>\n<p>\u2014 Chaofan Shou (@Fried_rice) <a href=\"https:\/\/twitter.com\/Fried_rice\/status\/2042423713019412941?ref_src=twsrc%5Etfw\" rel=\"nofollow noopener\" target=\"_blank\">April 10, 2026<\/a><\/p>\n<\/blockquote>\n<p>The problem is structural. These routers terminate encrypted internet connections \u2014 known as <a href=\"https:\/\/www.cloudflare.com\/learning\/ssl\/transport-layer-security-tls\/\" target=\"_blank\" rel=\"noopener nofollow\">TLS<\/a> \u2014 and read every message in plain text before passing it along. That means anything sent through them, including private keys, seed phrases, and login credentials, is fully visible to whoever operates the router.<\/p>\n<p>According to the researchers, the line between normal credential handling and outright theft is invisible from the client\u2019s end. Developers have no way to tell the difference. A router that looks like a legitimate service can silently forward sensitive data to a third party without triggering any alarm.<\/p>\n<p>Co-author Chaofan Shou said on X that 26 routers were found to be \u201csecretly injecting malicious tool calls and stealing creds.\u201d<\/p>\n<p><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-full wp-image-675769\" src=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/a_5c3ebf.png?resize=1024%2C576\" alt=\"Crypto\" width=\"1024\" height=\"576\" srcset=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/a_5c3ebf.png?w=1279 1279w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/a_5c3ebf.png?w=640 640w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/a_5c3ebf.png?w=768 768w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/a_5c3ebf.png?w=980 980w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/a_5c3ebf.png?w=750 750w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/a_5c3ebf.png?w=1140 1140w\" sizes=\"(max-width: 1000px) 100vw, 1000px\"><\/p>\n<p>The study also flagged what researchers called \u201cYOLO mode\u201d \u2014 a setting built into many <a href=\"https:\/\/www.pega.com\/ai-agent?utm_source=google&amp;utm_medium=cpc&amp;utm_campaign=G_APAC_NonBrand_AgenticAI_CE_Exact_(CPN-111067)_EN&amp;utm_term=ai%20agent&amp;gloc=9067225&amp;utm_content=pcrid%7C761558758468%7Cpkw%7Ckwd-485494843589%7Cpmt%7Ce%7Cpdv%7Cc%7C&amp;gclsrc=aw.ds&amp;gad_source=1&amp;gad_campaignid=22173135300&amp;gbraid=0AAAAAD_i2S3AOS3OBMUjA1HAoTJCslw3O&amp;gclid=Cj0KCQjwqPLOBhCiARIsAKRMPZrs1o2TbWD-FmvQdg692CvawNvNqTtsfz9ZOD5WWgnAyGzdSv5bAswaAvuzEALw_wcB\" target=\"_blank\" rel=\"noopener nofollow\">AI agent<\/a> frameworks that lets agents run commands without stopping to ask users for approval.<\/p>\n<p>A malicious router combined with an auto-executing agent could move funds or exfiltrate data before a developer even notices something went wrong.<\/p>\n<h2>Crypto Security: Free Access Used As Bait<\/h2>\n<p><a href=\"https:\/\/www.slashgear.com\/2139154\/rogue-ai-agent-started-mining-cryptocurrency-scientists-concerned\/\" rel=\"nofollow noopener\" target=\"_blank\">Reports<\/a> from the study indicate that free routers are especially suspect. Cheap or no-cost API access appears to be used as an incentive to get developers to route traffic through infrastructure that may be harvesting credentials in the background.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full\" src=\"https:\/\/www.tradingview.com\/x\/rRwHr5ns\/\" width=\"1835\" height=\"925\"><\/p>\n<p>Even routers that start out clean are not safe \u2014 the researchers found that previously legitimate routers can be quietly turned malicious once operators reuse leaked credentials through poorly secured relay systems.<\/p>\n<p>The recommended fix for now is straightforward: keep private keys and seed phrases out of any AI agent session entirely.<\/p>\n<p>For the long term, researchers say AI companies need to cryptographically sign their responses so that the instructions an agent executes can be mathematically traced back to the actual model \u2014 cutting off the ability of any middleman to tamper with them undetected.<\/p>\n<p><em>Featured image from Xage Security, chart from TradingView<\/em><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Researchers from the University of California set up a trap \u2014 a crypto wallet loaded with a small amount of Ether and connected to third-party AI routing infrastructure. One of the routers took the bait. The wallet was drained. The loss was under $50, but the implications reached far beyond the dollar amount. That experiment [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":0,"footnotes":""},"categories":[2],"tags":[3,4,5],"class_list":["post-80784","post","type-post","status-publish","format-standard","hentry","category-news","tag-crypto","tag-doge","tag-news"],"_links":{"self":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/80784","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=80784"}],"version-history":[{"count":0,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/80784\/revisions"}],"wp:attachment":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=80784"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=80784"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=80784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}