🎉 親愛的廣場小夥伴們,福利不停,精彩不斷!目前廣場上這些熱門發帖贏獎活動火熱進行中,發帖越多,獎勵越多,快來 GET 你的專屬好禮吧!🚀
🆘 #Gate 2025年中社区盛典# |廣場十強內容達人評選
決戰時刻到!距離【2025年中社區盛典】廣場達人評選只剩 1 天,你喜愛的達人,就差你這一票衝進 C 位!在廣場發帖、點讚、評論就能攢助力值,幫 Ta 上榜的同時,你自己還能抽大獎!iPhone 16 Pro Max、金牛雕塑、潮流套裝、合約體驗券 等你抱走!
詳情 👉 https://www.gate.com/activities/community-vote
1️⃣ #晒出我的Alpha积分# |曬出 Alpha 積分&收益
Alpha 積分黨集合!帶話題曬出你的 Alpha 積分圖、空投中獎圖,即可瓜分 $200 Alpha 代幣盲盒,積分最高直接抱走 $100!分享攢分祕籍 / 兌換經驗,中獎率直線上升!
詳情 👉 https://www.gate.com/post/status/12763074
2️⃣ #ETH百万矿王争霸赛# |ETH 鏈上挖礦曬收益
礦工集結!帶話題曬出你的 Gate ETH 鏈上挖礦收益圖,瓜分 $400 曬圖獎池,收益榜第一獨享 $200!誰才是真 ETH 礦王?開曬見分曉!
詳情 👉 https://www.gate.com/pos
Rogue AI Code Assistant Targets Ethereum Developer, Steals Crypto Funds - Crypto Economy
TL;DR
Ethereum core developer Zak Cole recently experienced a sophisticated crypto wallet-draining attack involving a rogue AI code assistant. Cole installed the “contractshark.solidity-lang” extension, which appeared legitimate with professional design and over 54,000 downloads, but secretly transmitted his private key to an attacker’s server. Over three days, the attacker gained access to his hot wallet before draining the funds.

Cole reported the loss on X, noting it amounted to only a few hundred dollars in Ether due to his careful use of small, project-specific wallets. The incident also highlights how even experienced developers can be deceived by increasingly polished and realistic-looking tools.
Extensions Become Major Attack Vector For Crypto Builders
Malicious VS Code and browser extensions are increasingly recognized as major attack vectors, according to Hakan Unal, senior security operations lead at blockchain security firm Cyvers. Threat actors use tactics like fake publishers, typosquatting, and professional-looking copy to trick developers into granting access to private keys. Wallet drainers are now even sold on a software-as-a-service basis, sometimes renting for as little as $100 USDt, making attacks accessible to a wider range of scammers. These developments suggest that the barrier for entry into crypto-targeted cybercrime is lower than ever, allowing even less technical attackers to compromise wallets successfully.
Historical Incidents Highlight Persistent Risks
This incident follows similar attacks, including a September 2024 WalletConnect Protocol scam that stole over $70,000 from investors while masquerading as a legitimate app on Google Play for more than five months. Fake reviews were used to mimic genuine feedback, illustrating the lengths attackers go to exploit trust. Experts recommend vetting all third-party extensions, avoiding storing secrets in plain text, using hardware wallets, and developing in isolated environments to reduce exposure.

Cole’s experience demonstrates that even highly experienced blockchain developers are not immune to emerging threats. Nevertheless, by adhering to strong security practices, crypto professionals can limit their risk, protect major holdings, and continue innovating confidently in the blockchain space. As attackers adopt AI-driven tactics and scalable SaaS models, vigilance and proper safeguards remain essential for anyone interacting with digital assets, whether for development, investment, or experimental testing purposes.