[Coin World] Recently, a rather dangerous thing has been circulating in the security circle — a developer of a Polymarket copy trading bot embedded malicious code in the GitHub repository.
The situation is as follows: once the user starts this program, it will automatically scan your “.env” file (where wallet private keys are usually stored) and then secretly send the private keys to the hacker's server. The result is that the funds are completely drained. What's worse is that this guy knows what bad things he has done and repeatedly modifies the code, submitting it multiple times to GitHub, trying to hide the malicious package even deeper.
The information security experts at Slow Mist Technology point out that this kind of trick has been seen more than once. When using open-source code or third-party tools, one really needs to be cautious. Especially for programs related to trading and wallets, it is essential to check the source code before downloading, or at least test it in an isolated environment first. Such attack methods will continue to emerge, and our awareness of prevention needs to keep up.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
12 Likes
Reward
12
4
Repost
Share
Comment
0/400
DuskSurfer
· 7h ago
Another one? These developers really think we're fools, embedding malicious programs in the code and still daring to submit multiple times. They really have a lot of nerve.
View OriginalReply0
ApeEscapeArtist
· 7h ago
Wow, this is too ruthless, directly mining Private Key? This operation is truly a cancer in the industry.
View OriginalReply0
WhaleWatcher
· 7h ago
I deeply understand why I never touch unknown source Bots scripts.
This guy is really something, and has submitted hidden malicious code multiple times, what a talent.
Things like this on GitHub need to be audited by yourself, otherwise, the Wallet can be emptied in seconds.
Polymarket indeed has many pitfalls, copy trading Bots sound tempting but the risks are outrageous.
Well, now I have to be extra cautious, Open Source code really shouldn't be run casually.
View OriginalReply0
FarmToRiches
· 7h ago
Damn, these unscrupulous developers are really outrageous, and they keep submitting code to cover it up. Why are they so ruthless?
Beware! A certain Polymarket copy trading bot contains malicious code that automatically steals wallet Private Keys.
[Coin World] Recently, a rather dangerous thing has been circulating in the security circle — a developer of a Polymarket copy trading bot embedded malicious code in the GitHub repository.
The situation is as follows: once the user starts this program, it will automatically scan your “.env” file (where wallet private keys are usually stored) and then secretly send the private keys to the hacker's server. The result is that the funds are completely drained. What's worse is that this guy knows what bad things he has done and repeatedly modifies the code, submitting it multiple times to GitHub, trying to hide the malicious package even deeper.
The information security experts at Slow Mist Technology point out that this kind of trick has been seen more than once. When using open-source code or third-party tools, one really needs to be cautious. Especially for programs related to trading and wallets, it is essential to check the source code before downloading, or at least test it in an isolated environment first. Such attack methods will continue to emerge, and our awareness of prevention needs to keep up.