
SlowMist
4K posts

SlowMist
@SlowMist_Team
SlowMist is a Blockchain security firm established in 2018, providing services such as security audits, security consultants, red teaming, and more.














** Correction on key compromise ** A week ago, Drift moved to a new multisig, created by a signer from the old multisig. This signer did not add themselves to the new one. The exploiter also initiated the proposal in the old multisig to hand over admin control to this new wallet. Of the 5 signers on the new multisig, only 1 came from the previous setup; the other 4 were brand-new. The wallet was set with a 2/5 threshold and a 0-second timelock. ~Five hours ago, that sole carryover signer used the new multisig to propose changing Drift’s admin. One of the new signers co-signed a second later, instantly meeting the 2/5 threshold. With no timelock in place, the transaction was executed immediately. ** Note ** Some of the relevant Solana programs are not verified, which limits full analysis. We're continuing to dig into the onchain data and will publish a more thorough post-mortem covering the multisig migration, Solana DeFi contagion, and vault exposure in a follow-up.

We're thrilled to announce Keywolf, @SlowMist_Team's Partner and CPO, as a speaker for #Web3Festival. Join us in Hong Kong, where we bring together Web3 professionals, investors, and enthusiasts across the globe to connect, learn and be inspired. 🗓️20-23, April |📍HKCEC 👉luma.com/hkweb3festival…

🚨 Another major supply chain incident 🚨 axios — one of the most widely used npm packages — has been compromised. Malicious versions axios@1.14.1 and axios@0.30.4 were published and are actively dropping malware. The attack pulls in a newly created dependency plain-crypto-js@4.2.1, confirmed as a malicious loader: it executes obfuscated payloads, runs shell commands, and attempts to evade detection while wiping traces. With 100M+ weekly downloads, this is a live, large-scale supply chain attack. More details: stepsecurity.io/blog/axios-com…


🚨 CRITICAL: Active supply chain attack on axios -- one of npm's most depended-on packages. The latest axios@1.14.1 now pulls in plain-crypto-js@4.2.1, a package that did not exist before today. This is a live compromise. This is textbook supply chain installer malware. axios has 100M+ weekly downloads. Every npm install pulling the latest version is potentially compromised right now. Socket AI analysis confirms this is malware. plain-crypto-js is an obfuscated dropper/loader that: • Deobfuscates embedded payloads and operational strings at runtime • Dynamically loads fs, os, and execSync to evade static analysis • Executes decoded shell commands • Stages and copies payload files into OS temp and Windows ProgramData directories • Deletes and renames artifacts post-execution to destroy forensic evidence If you use axios, pin your version immediately and audit your lockfiles. Do not upgrade.















每月下载量高达 9700 万次的 LiteLLM 发生 PyPI 供应链攻击: 通过 pip install litellm 即可窃取敏感信息,包括 SSH 密钥、云凭据(AWS/GCP/Azure)、Kubernetes 配置、Git 凭据、环境变量(API 密钥)、Shell 历史、加密钱包及数据库密码等。

⚠️ As AI Agents shift from "assistive tools" to "autonomous executors", traditional security fails against "cognitive-layer hijacking" like prompt injection and malicious code. How can an AI Agent determine what is truly SAFE? In response, we officially introduce SlowMist Agent Security Skill — a comprehensive security review framework built on real-world adversarial experience. 👉 github.com/slowmist/slowm… 🔅 It empowers AI Agents to: 🔹 Skill/MCP Risks – Detect malicious patterns before installation 🔹 Supply Chain Threats – Identify runtime secondary downloads & build-time injection 🔹 Social Engineering – Defense against prompt injection & pseudo-authority traps 🔹 Code Vulnerabilities – #Audit GitHub repos for exfiltration & backdoors 🔹 On-Chain Risks – Integrated #AML risk assessment 🛡️ Core Defense Libraries: 🔸 patterns/red-flags.md: Code-level dangerous patterns (11 categories) 🔸 patterns/social-engineering.md: Social engineering, prompt injection, and deceptive narratives (8 categories) 🔸 patterns/supply-chain.md: Supply chain attack patterns (7 categories) 🤝 Synergy with @MistTrack_io: When combined with MistTrack Skills, it creates a closed loop from "behavioral logic review" to "fund flow monitoring," leveraging 400M+ address labels. 🛠️ How to Deploy? 1️⃣ Download: Get the latest release from GitHub & extract to your #OpenClaw workspace. 2️⃣ Activate: Automatically triggers when agents encounter external inputs (Skills, URLs, Addresses). 3️⃣ Standardize: Generates structured risk reports (🟢 Safe / 🟡 Caution / 🔴 High / ⛔ Reject) using built-in templates. ✨ Usage Examples: "Analyze this Solana address for AML risks before I interact." "Review this document for potential prompt injection attempts." Ready to make your #AI Agents safer and smarter? Integrate SlowMist Agent Security Skill today and build trust into every autonomous action. 🔗Learn more: slowmist.medium.com/slowmist-agent…











⚠️ Running an AI Agent like @openclaw with root/terminal access is powerful but inherently risky. How do we ensure controllable risk and auditable operations without sacrificing capability? Recently, we released the OpenClaw Security Practice Guide — a structured defense matrix designed for high-privilege autonomous agents running in Linux Root environments. cc @evilcos 📖GitHub Version: 👉github.com/slowmist/openc… 🛡️ 3-Tier Defense Matrix 🔹Pre-action — Behavior blacklists & strict Skill installation audit protocols (Anti-Supply Chain Poisoning) 🔹In-action — Permission narrowing & Cross-Skill Pre-flight Checks (Business Risk Control) 🔹Post-action — Nightly automated explicit audits (13 core metrics) & Brain Git disaster recovery 🛠️ Built around four core principles: • Zero-friction operations • High-risk requires confirmation • Explicit nightly auditing • Zero-Trust by default 🚀 Zero-Friction Flow: 1️⃣ Drop the guide directly into your #OpenClaw chat 2️⃣ Ask the Agent to evaluate reliability 3️⃣ Instruct it to deploy the full defense matrix 4️⃣ Use the Red Teaming Guide to simulate an attack and ensure the Agent correctly interrupts the operation 🚨 Honest limitation: this guide is intended for human operators and AI Agents with foundational Linux system administration capabilities, and is particularly designed for OpenClaw operating in high-privilege environments. As AI models and their underlying service environments vary, the security measures provided in this guide are for defensive reference only. Final responsibility always remains with the human operator. Please assess and execute cautiously based on your own environment and capabilities. 🤝 If you have new findings, lessons learned, or improvement suggestions from real-world deployment, we welcome you to share them with the community via Contributions, Issues, or Feature Requests. Special thanks to @leixing0309 for the professional contribution. As we continue unlocking #AI capability, may we remain vigilant and clear-headed about risk.🫡

We are currently analyzing the 76 reported user theft cases we have accumulated. Progress is as follows: 1. The installed client versions are dispersed. By comparing the client versions used by users with the official client Hash, no abnormalities were found, ruling out client-side issues. 2. 88% of affected users (67 people) did not enable the extension sharing setting, and all extension data is stored locally on users’ devices. This rules out the possibility of data storage server compromise. We have contacted @SlowMist_Team and are conducting a joint investigation. We will provide further updates as progress is made. In the meantime, we strongly advise all users not to store large amounts of cryptocurrency in browsers.





