Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Promotions
AI
Gate AI
Your all-in-one conversational AI partner
Gate AI Bot
Use Gate AI directly in your social App
GateClaw
Gate Blue Lobster, ready to go
Gate for AI Agent
AI infrastructure, Gate MCP, Skills, and CLI
Gate Skills Hub
10K+ Skills
From office tasks to trading, the all-in-one skill hub makes AI even more useful.
GateRouter
Smartly choose from 30+ AI models, with 0% extra fees
I just came across a very concerning security issue that many people may not yet realize the severity of.
More and more people are using AI assistants to handle daily tasks—organizing files, analyzing transactions, managing emails, and even directly connecting to wallets and trading tools. It sounds very convenient, but the problem is that once AI gains system-level permissions, it becomes an entry point for hackers to access your accounts. For those of us doing transactions, this is not just a privacy risk; it could directly lead to account attacks and fund losses.
Recently, security researchers discovered a frightening phenomenon: over 300 malicious plugins have been found in the AI assistant plugin ecosystem. What can these plugins do? They can steal browser passwords, extract encrypted wallet data, obtain SSH keys, API keys, and even local files and chat logs. Some malicious programs are equipped with keyloggers, remote control capabilities, and so-called backdoor functions—meaning attackers can control your device long-term without your knowledge.
The most terrifying part is that all of this happens silently in the background. No pop-ups, no warnings, users are completely unaware of any abnormality, but attackers already have full control over your account.
If your AI assistant is infected with malicious code, attackers could: directly read wallet files, obtain exchange login credentials, intercept email verification codes, reset account passwords, and ultimately transfer your assets away. All this can happen without your explicit permission.
Why have AI assistants become new attack targets? Simply put, they have higher permissions and broader data access than ordinary software. Traditional malware can only steal limited data, but AI agents can access file systems, browsers, emails, wallets, chat logs, and API permissions—they’re like automated executors with system administrator privileges. Once compromised, it’s equivalent to attackers gaining control over your entire computer.
For crypto users, the risks are even more specific: if the assistant gets your seed phrase, attackers can recover your wallet and transfer all assets; if they obtain your exchange login info and email verification codes, they can log into your accounts, change security settings, and withdraw funds; if they control your email, they can reset passwords for multiple accounts.
How to protect yourself? Here are some key recommendations:
First, never store seed phrases or private keys in AI tools, and avoid saving them in plain text on your computer. Use hardware wallets or offline storage instead.
Second, do not allow AI tools to access your wallet files, and do not place these files in public directories.
Third, use a dedicated device for trading, and avoid installing experimental AI tools on your trading device.
Fourth, do not casually install unknown AI plugins, especially from unofficial channels or unverified projects. Attackers often spread malicious programs through fake plugins, fake tools, and fake updates. This backdoor-style attack method is particularly covert.
Fifth, enable all security features on exchanges—login passwords, trading passwords, two-factor authentication—to effectively reduce risks.
Sixth, if using APIs, restrict permissions and disable withdrawal rights.
Seventh, regularly check your device’s security—review installed software, browser plugins, and unusual login activities.
Ultimately, any software with system-level permissions can become an attack vector. In the crypto world, once seed phrases or account credentials are leaked, assets could be lost forever. This is not an alarmist warning; it’s a real threat. If you’re using AI assistants, now is the time to reassess your security settings. Recently, I’ve been following some related security news and project updates on Gate. If you're interested, let’s discuss together.