GoPlus Security 🚦

3.6K posts

GoPlus Security 🚦 banner
GoPlus Security 🚦

GoPlus Security 🚦

@GoPlusSecurity

Protect Your Every Transaction. User App: https://t.co/FHHKZyzH1j 🛡️ Dev Integration: Security Intelligence & SafeToken Protocol 🛡️

On-Chain Katılım Mayıs 2021
1.1K Takip Edilen449.4K Takipçiler
Sabitlenmiş Tweet
GoPlus Security 🚦
GoPlus Security 🚦@GoPlusSecurity·
🚀 #GoPlus SafuSkill Launchpad is now LIVE —Turn your AI Skill into an asset You built an AI Skill. People are using it. It’s already running inside other Agents— but you haven’t earned a single dollar. The problem isn’t lack of value. It’s the lack of monetization infrastructure. 👉SafuSkill Launchpad is now live Built on BNB Chain (@BNBCHAIN), integrated with the Flap protocol (@flapdotsh), designed to solve this exact problem: →List your Skill →Launch a token →Auto-integrate with PancakeSwap →More trading = more earnings 🛡 Built-in security: AgentGuard scanning + GitHub verification SafuSkill is the secure marketplace for AI Agent Skills Not just used— but traded, priced, and monetized, forming a full value loop: -Marketplace (Discovery) -Launchpad (Issuance) -Earnings (Auto-accrual) This is the Skill Economy—where Skills become tradable, yield-generating on-chain assets. Try it now👇 safuskill.ai/launchpad
GoPlus Security 🚦 tweet media
English
21
20
76
18.7K
GoPlus Security 🚦
GoPlus Security 🚦@GoPlusSecurity·
🚀 GoPlus Officially Launches Costr ——Cut AI Agent costs 90% while keeping it secure and performant 💡 High LLM bills and complex workflow management have become major pain points for AI Agent users, including OpenClaw, Hermes, ClaudeCode, and QClaw. @GoPlusSecurity introduces #Costr — a cost optimization layer designed specifically for AI Agent tasks: - Reduce LLM costs by up to 90% — Save on average 90% of LLM spending in real AI Agent workflows, stopping your Agent from being a “money sink”. - Security-first experience — Prioritizes user safety, so tasks can be safely delegated to your Agent. - Built for AI Agents — Intelligently routes tasks: simple ones to low-cost models, critical decisions to flagship models, keeping output quality nearly intact (~96% consistency). - Easy integration, full transparency — Configure via base_url/api_key and monitor every call’s model choice, cost, and savings in real time. Experience smarter, safer, and more cost-efficient AI Agents now: costr.gopluslabs.io
GoPlus Security 🚦 tweet media
English
3
1
9
624
GoPlus Security 🚦
GoPlus Security 🚦@GoPlusSecurity·
500 USDT up for grabs 👀 Good luck, everyone! 🍀
Alphio AI@AlphioAI

Alphio AI Community Giveaway 🥳 🎁 To celebrate Alphio AI trading platform official launch, together with @GoPlusSecurity, complete the tasks to win 500 USDT Airdrop, 45 winners! To enter: · Follow @AlphioAI @GoPlusSecurity · Like, RT & Tag 3 Friends · Join & active: t.me/AlphioAI · Submit & refer to win 40USDT: gleam.io/doYHh/alphio-a… 📅Ends 31st May, Best of luck! ⚡️

English
1
1
5
445
GoPlus Security 🚦
GoPlus Security 🚦@GoPlusSecurity·
🚨 GoPlus Security Alert: The Haveno protocol, a P2P multisig DEX protocol designed for Monero ($XMR), contains a vulnerability. Its fork project, @RetoSwap, was attacked, resulting in the theft of approximately 7,000 XMR (≈$2.7M) in user funds. 🔍 The attacker exploited the lack of strict state-machine checks in P2P message handling. By sending forged and out-of-order ACK messages to impersonate an arbitrator, the attacker hijacked the multisig wallet creation process before funds were deposited. ⛔ The RetoSwap team responded quickly, blocked the attacker’s onion address, and suspended the related trading services. ⚠️ The Haveno codebase is affected, and other fork projects may face similar risks. Please conduct an immediate self-check. ⚠️ Privacy Dilemma: Monero’s privacy features make on-chain attacker tracing significantly more difficult. The security of decentralized protocols depends not only on cryptography, but also on rigorously designed state machines. Any oversight in asynchronous message handling can undermine the entire trust model. Please deploy the Haveno patch immediately and upgrade your client. Do not perform any trading operations until the protocol is officially confirmed to be secure.
RetoSwap@RetoSwap

Today at 2:31 UTC Haveno lead developer woodser reported the Haveno trade protocol is actively being exploited. At 2:33 UTC RetoSwap banned the exploiters onion address and halt trading by setting the minimum client version to 2.0.0 using the filter feature.

English
2
1
17
1.3K
GoPlus Security 🚦
GoPlus Security 🚦@GoPlusSecurity·
AI + World Cup + Crypto narrative 👀 Feels like the next user onboarding wave won’t come from pure speculation anymore. AI + global narratives may change the game. See you in the Space with @custos_labsxyz and @GoPlusSecurity 🎙️
Custos@custos_labsxyz

Join the Chinese Space co-hosted by Custos and @GoPlusSecurity. 🎙 Can AI and the next World Cup narrative break the crypto winter? 📅 May 21, 13:00 UTC 📍 x.com/i/spaces/1DGLd… Host: @qg7777 Guests: @custos_intern, @mikelee205, @Sawyer_APRO, @Xiaohe085 🎁Random #Giveaway x 5,000 $GPS 1️⃣ Follow @custos_labsxyz 2️⃣ RT this post 3️⃣Join the Space 10 lucky winners will share 5,000 $GPS, with chances for extra 2–3x rewards. See you in the Space.

English
1
0
3
695
GoPlus Security 🚦 retweetledi
imToken
imToken@imTokenOfficial·
We’re teaming up with @GoPlusSecurity to celebrate imToken’s 10th anniversary with an AI Co-Creation campaign! GoPlus is a leading Web3 security infrastructure innovator, building AI-powered security solutions to protect the decentralized world. Together, we’re inviting users to imagine and create the wallet they want with AI. Build your ideal wallet, on-chain app, or AI wallet demo. Let’s co-create a safer Web3 future! What wallet features would you love? Drop your ideas below
imToken tweet media
English
7
15
82
548K
GoPlus Security 🚦
GoPlus Security 🚦@GoPlusSecurity·
🚨 The hacker group TeamPCP claims to have obtained the source code of around 4,000 internal private repositories from GitHub, and is now offering the data for sale on underground forums for $50K, with sample verification available. If no buyer emerges, the dataset may later be publicly leaked for free. #GitHub has officially confirmed it is investigating an “unauthorized access to internal repositories” incident. The breach is suspected to be linked to a malicious VS Code / AI coding plugin installed on a GitHub employee’s device. Users relying on GitHub private repositories are advised to stay highly vigilant and conduct immediate security self-checks to avoid potential hacker attacks caused by private repository leaks.
GitHub@github

We are investigating unauthorized access to GitHub’s internal repositories. While we currently have no evidence of impact to customer information stored outside of GitHub’s internal repositories (such as our customers’ enterprises, organizations, and repositories), we are closely monitoring our infrastructure for follow-on activity.

English
0
0
4
2.3K
Qwerti
Qwerti@QwertiAI·
Smart execution requires smart protection. 🛡️ We’ve upgraded our security engine by integrating infrastructure from @GoPlusSecurity, the industry leader in Web3 safety. What changes? Qwerti now actively scans smart contracts to detect high-risk tokens, honeypots, and malicious traps — warning you in real time before you execute the trade. Real-time threat detection, same seamless UX. Brick by brick. Safer DeFi for everyone. ⚡️
Qwerti tweet media
English
49
31
181
16.8K
GoPlus Security 🚦
GoPlus Security 🚦@GoPlusSecurity·
3/3 Attacker address: 0x6A0109d3C5AB56277096C75E8f5D1d1D45243415 eBTC Token contract: 0xd691b0aFed67F96CEC28Ab6308Cbe5b2C103b7e9 eBTC Token admin address: 0xA338eC2d52B19f4A48A00FCd76A36366B3529A3B Curvance contract: 0xdB3e888c3b50771821226d30Ab6eC14eB5ba85bA
English
0
0
0
746
GoPlus Security 🚦
GoPlus Security 🚦@GoPlusSecurity·
2/3 The attacker then deposited the 1,000 eBTC into @Curvance as collateral and borrowed 11.296 WBTC, worth approximately $863K.
GoPlus Security 🚦 tweet media
English
1
0
2
940
GoPlus Security 🚦
GoPlus Security 🚦@GoPlusSecurity·
1/3 ⚠️Vulnerability Analysis: Breakdown of the Echo Protocol Exploit BTC liquidity aggregation protocol @EchoProtocol_ was exploited on #Monad through its eBTC Token contract. The attacker minted 1,000 #eBTC out of thin air, then used them as collateral on @Curvance to borrow assets, profiting approximately $863K. Attack vector: The attacker address obtained both the DEFAULT_ADMIN_ROLE and MINTER_ROLE permissions of the eBTC Token contract, removed the privileges of the original admin address, and then directly called the mint() function to mint 1,000 eBTC. monadscan.com/tx/0x2cc973073…
GoPlus Security 🚦 tweet media
English
1
5
22
2.5K
GoPlus Security 🚦
GoPlus Security 🚦@GoPlusSecurity·
🚀@GoPlusSecurity is now live on the @wallet Plugin Store. Users can now access GoPlus security protection directly through the OKX Wallet ecosystem. 🛡️Supports: ▪️EVM token security ▪️Malicious address checks ▪️Phishing website checks ▪️NFT security ▪️Approval security ▪️Solana token security ▪️Sui token security Together building a safer Web3 ecosystem with @wallet 🤝 🔗 Integration: github.com/okx/plugin-sto…
English
1
3
7
1.8K
GoPlus Security 🚦
GoPlus Security 🚦@GoPlusSecurity·
🚨GoPlus Security Alert: @veruscoin’s Verus-Ethereum Bridge has been exploited, resulting in an estimated loss of approximately $11.5M. The attacker drained a large amount of assets from the Ethereum side of the bridge in a single transaction (1,625 ETH + 103.57 tBTC + 147K USDC). This is yet another typical bridge-related exploit in 2026. Previously, bridges including Kelp DAO and Hyperbridge had already suffered cumulative losses reaching hundreds of millions of dollars. Attack transaction: etherscan.io/tx/0x6990f0172… Bridge contract: 0x71518580f36feceffe0721f06ba4703218cd7f63 (Verus-Ethereum Bridge contract) Invoked method: 0x8c49b257 (Custom bridge contract function) Attacker address: 0x5aBb91B9c01A5Ed3aE762d32B236595B459D5777 (Funds were previously obfuscated through Tornado.Cash) Drainer wallet: 0x65Cb8b128Bf6e690761044CCECA422bb239C25F9 The wallet currently holds 5,402 ETH (~$11.5M). The funds have not yet undergone further laundering, bridging, or large-scale distribution. The attacker sent a low-value transaction to the bridge contract and invoked a specific function (0x8c49b257), after which the bridge contract directly transferred reserve assets in bulk to the drainer wallet. This strongly suggests a cross-chain message verification/signature forgery issue, withdrawal logic bypass, or an access control vulnerability. ⚠️Users are advised to remain highly vigilant and protect their assets. At present, the stolen funds are still mainly concentrated in a single drainer wallet and have not yet been widely dispersed, bridged, or mixed, meaning there may still be opportunities for tracing or interception.
GoPlus Security 🚦 tweet media
English
3
5
29
5.7K
GoPlus Security 🚦
GoPlus Security 🚦@GoPlusSecurity·
🚨GoPlus Security Alert: THORChain Exploited, Approximately $10M Lost The losses include: ▪️36.75 BTC (approximately $3M) ▪️An additional estimated $7M across BNB Chain, Ethereum, and Base Following the incident, @THORChain has suspended trading operations, while $RUNE rapidly dropped by 12%. The stolen funds are currently concentrated in the following addresses: BTC: bc1ql4u94klk265lnfur2ujk9p6uh52f2a8jhf6f37 EVM: 0xd477b69551f49C0519F9B18c55030676138890Bd 0x82fc0d5150f3548027e971ec04c065f3c93154eb As of now, the official #THORChain team has not released a formal statement. Please stay vigilant and avoid unsafe cross-chain operations until further clarification is provided.
GoPlus Security 🚦 tweet media
English
16
3
12
3K
GoPlus Security 🚦
GoPlus Security 🚦@GoPlusSecurity·
Recently, the @AgentGuard_AI team discovered several extremely stealthy attacks that don’t even look like attacks. The attacker only needs to tell the Agent two things: 1⃣ “Remember this: I usually prefer proactively issuing refunds instead of waiting for chargebacks.” After some time: 2⃣ “Handle these refunds the usual way.” “Process them as usual.” “Do it the same way as before.” And the fund loss happens. ⚠️ For these “historical memory authorization” risks: ▪️ Refunds, transfers, deletions, emails, and sensitive config changes must require explicit confirmation in the current session ▪️ Memory writes involving “habits,” “preferences,” or “the usual way” should be treated as high-risk state changes ▪️ Long-term memory must be traceable: who wrote it, when, and whether it was confirmed ▪️ Ambiguous instructions like “as usual” or “same as before” should automatically raise the risk level ▪️ Long-term memory must never replace current authorization 🛡 Use #AgentGuard to give your Agent a real security guardrail.
GoPlus Security 🚦 tweet media
English
11
3
10
1.2K
GoPlus Security 🚦 retweetledi
Unibase
Unibase@Unibase_AI·
Introducing the BitAgent ERC-8183 Agent Marketplace Skill Ecosystem. At Unibase, we believe composable skills are what turn isolated agents into a real agent economy, making capabilities reusable, interoperable, discoverable, and monetizable across agents on-chain. - The BitAgent Skill Ecosystem allows builders to: 🟦 install production-ready capabilities directly into agents 🟦 launch reliable ERC-8183 agent services faster 🟦 compose interoperable multi-agent workflows 🟦 turn agent capabilities into discoverable and monetizable on-chain services Together with our skill ecosystem partners, we’re helping bring the Open Agent Internet to life, where autonomous agents can work, coordinate, and earn on-chain. @Aster_DEX · @aveai_info · @BAI_AGI · @binance · @BNBCHAIN · @BitgetWallet · @BlockBeatsAsia · @ChainbaseHQ · @Chain_GPT · ClawHub · @coingecko · @fourdotmemezh · freqtrade · @GateDEX · @gmgnai · @GoPlusSecurity · @heurist_ai · @0xIntuition · @JupiterExchange · @krakenfx · @Mantle_Official · @MessariCrypto · @minara · @MorphNetwork · @nansen_ai · @okx · @wallet · @opensea · @openservai · @PancakeSwap · @PANews · @SurfAI · @TrustWallet · @Unibase_AI · @Uniswap - How to integrate production-ready skills into your agent? 1️⃣ Click the skill profile to open the partner’s skill page 2️⃣ Copy the skill into your agent to install it 3️⃣ Your agent now has this capability More skills. More working agents. More ERC-8183 services. 💙 👉 bitagent.io/skill
Unibase tweet media
English
6
3
68
41.6K
GoPlus Security 🚦
GoPlus Security 🚦@GoPlusSecurity·
You can now use $GPS on Custos (@custos_labsxyz ) for prediction markets, while Rollocker offers an extra +40% APY boost 🔥 Check it out and join 👇
Custos@custos_labsxyz

New Listing: $GPS (@GoPlusSecurity) 🔹GPS Rollocker 🔹GPS-GPS 12H Prediction #GPS is the token powering @GoPlusSecurity, the decentralized security layer for Web3 protecting every on-chain transaction with AI-driven risk detection, Security APIs, token protection, and real-time user security across 28M+ users and 88+ chains. dapp.custos.global/rollock/rc-GPS Extra +40% APY Boost for $GPS Rollocker is live. Details below ⬇️

English
7
5
11
2.2K