23pds (山哥)

14.2K posts

23pds (山哥) banner
23pds (山哥)

23pds (山哥)

@im23pds

Dad/@SlowMist_Team Partner&CISO/#Web3 Security Researcher/RedTeam/Pentester/Ai安全猎人 #bitcoin

不是KOL 不是币圈人 救火队员一名 Katılım Haziran 2014
6K Takip Edilen14.9K Takipçiler
23pds (山哥)
23pds (山哥)@im23pds·
there are two issues: 1. While the link is from the official Coinbase website, directly asking users to transmit their mnemonic phrase to verify assets is extremely foolish. 2. The website linked to has a flawed sitemap. Attackers could easily use tools like ResourcesSaver to download the front-end code and deploy a similar website. If this is combined with a similar domain like Coinbase for phishing attacks, users could easily fall for the scam.
English
2
1
40
5.6K
ZachXBT
ZachXBT@zachxbt·
@evilcos @coinbase @im23pds So basically Coinbase has an official page live threat actors can use to target Coinbase users via seed phrase social engineering if they wanted?
ZachXBT tweet media
English
54
49
559
54.6K
23pds (山哥)
23pds (山哥)@im23pds·
腾讯 Qclaw @TencentAI_News 是聪明的:-) Qclaw 居然优先考虑到用户本地可能会跑小龙虾的情况 🦞
中文
1
0
2
1.7K
23pds (山哥)
23pds (山哥)@im23pds·
🧐目前还在调查中 大家一看有慢雾审计…冲…搞的我们压力很大,大家要看审计报告内容。 有进展随时给大家同步
MoreLoginCN@MoreloginCN

目前针对累积收集到的76 个用户的被盗反馈,进行分析。进展如下 1. 安装版本离散分布,通过对比客户使用的客户端版与官方客户端Hash ,结果无异常,排除客户端问题。 2. 88%的被盗用户(67 人)未开启插件同步,插件数据均保存在客户本地,排除数据存储服务器被入侵的可能。 我们已经跟 @SlowMist_Team 取得联系,目前正在一起联合调查,有进展会进一步更新。同时强烈建议大家不要在浏览器中存放大额加密货币。

中文
4
2
9
10.6K
23pds (山哥) retweetledi
SlowMist
SlowMist@SlowMist_Team·
🦞 Following our previous v2.7 release, OpenClaw Security Practice Guide v2.8 Beta is now live. ⤴️ v2.8 Beta has been validated through hundreds of hours in production, but is still actively evolving. It now covers the latest models including #Gemini / #Opus / #Kimi / #MiniMax / #GPT. 👉 v2.7 remains the stable version — use v2.8 if you want the latest enhancements: github.com/slowmist/openc… Key upgrades vs v2.7: 🤖 Agent-assisted deployment workflow (5-step automation) 🛡️ --light-context Cron anti-hijacking 📝 Hardened inspection script standards 📂 Persistent reports at $OC/security-reports/ + 30-day rotation 🔄 Post-upgrade baseline rebuild process 🔍 Enhanced code audit protocol ⚡ Token optimization (pre-filter in Bash before LLM) 🧠 7 real-world lessons learned (timeouts, model choice, false positives, etc.) ⚠️ Please read the README carefully before use.
SlowMist@SlowMist_Team

⚠️ Running an AI Agent like @openclaw with root/terminal access is powerful but inherently risky. How do we ensure controllable risk and auditable operations without sacrificing capability? Recently, we released the OpenClaw Security Practice Guide — a structured defense matrix designed for high-privilege autonomous agents running in Linux Root environments. cc @evilcos 📖GitHub Version: 👉github.com/slowmist/openc… 🛡️ 3-Tier Defense Matrix 🔹Pre-action — Behavior blacklists & strict Skill installation audit protocols (Anti-Supply Chain Poisoning) 🔹In-action — Permission narrowing & Cross-Skill Pre-flight Checks (Business Risk Control) 🔹Post-action — Nightly automated explicit audits (13 core metrics) & Brain Git disaster recovery 🛠️ Built around four core principles: • Zero-friction operations • High-risk requires confirmation • Explicit nightly auditing • Zero-Trust by default 🚀 Zero-Friction Flow: 1️⃣ Drop the guide directly into your #OpenClaw chat 2️⃣ Ask the Agent to evaluate reliability 3️⃣ Instruct it to deploy the full defense matrix 4️⃣ Use the Red Teaming Guide to simulate an attack and ensure the Agent correctly interrupts the operation 🚨 Honest limitation: this guide is intended for human operators and AI Agents with foundational Linux system administration capabilities, and is particularly designed for OpenClaw operating in high-privilege environments. As AI models and their underlying service environments vary, the security measures provided in this guide are for defensive reference only. Final responsibility always remains with the human operator. Please assess and execute cautiously based on your own environment and capabilities. 🤝 If you have new findings, lessons learned, or improvement suggestions from real-world deployment, we welcome you to share them with the community via Contributions, Issues, or Feature Requests. Special thanks to @leixing0309 for the professional contribution. As we continue unlocking #AI capability, may we remain vigilant and clear-headed about risk.🫡

English
5
5
21
8.6K
OKX中文
OKX中文@okxchinese·
OKX Onchain OS 全新能力 Agentic Wallet 上线了! 🤖现在,你可以授权 AI Agent 管理你的链上钱包——自主交易、自主签名,替你 24 小时执行;每一笔交易,Agent 都会自己过一遍安全检查,危险的事它不做。 Agent 有所为,有所不为。立即体验⬇️
中文
40
21
130
99.9K
23pds (山哥)
23pds (山哥)@im23pds·
朝鲜黑客组织 Lazarus Group 攻击一台员工的笔记本电脑,黑客窃取旧凭证后进入系统,并获取包含生产密钥的快照,随后扩大权限访问部分数据库及加密钱包,并从热钱包中转移资金。
Bitrefill@bitrefill

March 1st incident report On March 1, 2026, Bitrefill was the target of a cyberattack. Based on indicators observed during the investigation - including the modus operandi, the malware used, on-chain tracing and reused IP + email addresses (!) - we find many similarities between this attack and past cyberattacks by the DPRK Lazarus / Bluenoroff group against other companies in the crypto industries. The initial access originated through a compromised employee laptop, from which a legacy credential was exfiltrated. That credential provided access to a snapshot containing production secrets. From there, the attackers were able to escalate their access to our broader infrastructure, including parts of our database and certain cryptocurrency wallets. We first detected the incident after noticing suspicious purchasing patterns with certain suppliers. We realized that our gift card stock and supply lines were being exploited. At the same time we found some of our hot wallets being drained and funds transferred to attacker-controlled wallets. The moment we identified the breach, we took all of our systems offline as part of our containment response. Bitrefill operates a global e-commerce business with dozens of suppliers, thousands of products, and multiple payment methods across many countries. Safely switching all these things off and bringing them back online is not trivial. Since the incident, our team has been working closely with top industry security researchers, incident response specialists, on-chain analysts and law enforcement to understand what happened and how we can prevent it from happening again. A sincere thank you to @zeroshadow_io, @SEAL_Org, @RecoverisTeam and @fearsoff for their rapid response and support throughout this ordeal. What about your data Based on our investigation and our logs we don’t have reason to think that customer data was the target of this breach. There is no evidence that they extracted our entire database, only that the attackers ran a limited number of queries consistent with probing to understand what there was to steal, including cryptocurrency and Bitrefill gift card inventory. Bitrefill was designed to store very little personal data. We are a store, not a crypto service provider. We don’t require mandatory KYC. When a customer chooses to verify their account - e.g. to access higher purchasing tiers or certain products - that data is kept exclusively with our external KYC provider, with no backups in our system. Still, based on database logs, we know that a subset of purchase records was accessed and we want to be transparent about that. Around 18,500 purchase records were accessed by the attackers. Those records contained limited customer information, such as email addresses, crypto payment address, and metadata including IP address. For approximately 1,000 purchases, specific products required customers to provide a name. That information is encrypted in our database. However, since the attackers may have gotten access to the encryption keys, we are treating this data as potentially accessed. Customers in this category have already been notified directly by email. At this time, based on the information currently available, we do not believe customers need to take specific action. As a precaution, we recommend remaining cautious of any unexpected communications related to Bitrefill or crypto. If this assessment changes, we will of course immediately inform those affected. What we are doing We have already significantly improved our cybersecurity practices, but vow to continue to draw learnings from this experience to make sure user and company balances and data remain maximally safe. Specifically we’re: -Continuing thorough cybersecurity reviews and pentests with multiple external experts and implementing recommendations; -Further tightening internal access controls; -Further improving logging and monitoring for faster detection and more effective response; and -Continuing to refine and test our incident response procedures and automated shutdown procedures. The bottom line Getting hit by a sophisticated attack sucks (a lot). We’ve been in business for over 10 years and it’s the first time we’ve been hit this hard. But we survived. Bitrefill was designed to limit the impact if something like this ever happened. Bitrefill remains well funded, has been profitable for several years and will absorb these losses from our operational capital. Almost everything is back to normal: payments, stock, accounts. Sales volumes are also back to normal, and we are eternally thankful to our customers for your continued confidence in us. We will continue to do our best to continue deserving your trust. Thank you!

中文
2
1
11
6.1K
23pds (山哥) retweetledi
Cos(余弦)😶‍🌫️
🦞OpenClaw 极简安全实践指南 v2.8 Beta 出来了,数个独立 OpenClaw 来回测试了几百个小时,覆盖 Gemini/Opus/Kimi/MiniMax/GPT 等最新模型。 github.com/slowmist/openc… v2.8 Beta 先完全独立,包括对应给人类参考的巡检脚本。如果你感兴趣,可以尝鲜👀 ⚠️注意,用之前务必仔细阅读仓库的 README。
Cos(余弦)😶‍🌫️ tweet mediaCos(余弦)😶‍🌫️ tweet media
Cos(余弦)😶‍🌫️@evilcos

🦞OpenClaw 极简安全实践指南 (Security Practice Guide) 是面向 OpenClaw 的黑手册。 我尝试了其他一些方式来试图加固 OpenClaw,包括 Skill 方式,但是发现还不如给 OpenClaw 植入一个安全“思想钢印”来的有意思,这个“思想钢印”形成一个 md 文档,包含安全事前、事中、事后需要做的策略,但这里有个前提: 尽量不影响 OpenClaw 的日常使用,安全不要干扰用户体验,需要给这只🦞足够的自由。但是吧,江湖险恶,一只有 Root 权限且诞生才一个多月的🦞,安全不让人放心… 于是,这份面向 OpenClaw 的极简安全实践指南诞生了,目前是 v2.7 版本,此前我们内测了许多版本,也踩了不少坑。现在公布出来,大家玩之前务必仔细看这份指南的 README⚠️: github.com/slowmist/openc… 注意里面的说法。我相信你会很有收获。里面还推荐了我们实测在 OpenClaw 场景下聪明的模型,如果你有自己的感受,一定要和我们反馈。 一切都很新,一定有不完善的地方,请大家多指正! ⚠️最后,务必认真阅读 README,也务必肉眼扫描下你将喂给你🦞的“OpenClaw极简安全实践指南.md”,相信我,会非常有意思。

中文
13
51
252
48.4K
23pds (山哥) retweetledi
Tencent AI
Tencent AI@TencentAI_News·
Something we've been quietly testing. More tomorrow 🦞
Tencent AI tweet media
English
134
74
825
258K
NVIDIA AI Developer
NVIDIA AI Developer@NVIDIAAIDev·
Ready to deploy AI agents? NVIDIA NemoClaw simplifies running @openclaw always-on assistants with a single command. 🦞 Deploy claws more safely ✨ Run any coding agent 🌍 Deploy anywhere Try now with a free NVIDIA Brev Launchable 🔗 nvidia.com/nemoclaw
NVIDIA AI Developer tweet media
NVIDIA Newsroom@nvidianewsroom

#NVIDIAGTC news: NVIDIA announces NemoClaw for the OpenClaw agent platform. NVIDIA NemoClaw installs NVIDIA Nemotron models and the NVIDIA OpenShell runtime in a single command, adding privacy and security controls to run secure, always-on AI assistants. nvda.ws/47xOPqQ

English
248
612
4.1K
859K
23pds (山哥)
23pds (山哥)@im23pds·
AI 开始PUA 稳住…稳住… 问题不大!🙂‍↔️
23pds (山哥) tweet media
中文
3
0
7
3.7K
23pds (山哥)
23pds (山哥)@im23pds·
现在连AI都知道币圈是骗局了 ಠ_ಠ
23pds (山哥) tweet media
中文
0
0
4
1.6K
23pds (山哥)
23pds (山哥)@im23pds·
🧐生成式 AI 百亿级GEO(生成引擎优化)灰色产业链曝光 🧐黑帽 GEO 从业者通过批量制造虚假排行榜、低质内容「投毒」大模型语料,导致豆包、DeepSeek、文心一言、Kimi 等主流 AI 频繁输出错误推荐。实测显示,虚构一个不存在的保健品品牌,仅需购买黑帽服务,半天内即可被多家大模型优先置顶首位,已形成成熟付费闭环,行业劣币驱逐良币现象严重。
23pds (山哥)@im23pds

大胆预测下,随着AI、AI Agent 普及度、使用度越来越高,未来 GEO(AI搜索营销)投毒、 AI 搜索偏移 将会给用户带来新的挑战。🧐

中文
2
3
14
5.4K