Zurück geht es hier Grüezi! Sie wurden auf finanzen.ch, unser Portal für Schweizer Anleger, weitergeleitet.  Zurück geht es hier.
25.05.2025 15:00:00

AI agents are poised to be crypto’s next major vulnerability

AI agents in crypto are increasingly embedded in wallets, trading bots and onchain assistants that automate tasks and make real-time decisions.Though it’s not a standard framework yet, Model Context Protocol (MCP) is emerging at the heart of many of these agents. If blockchains have smart contracts to define what should happen, AI agents have MCPs to decide how things can happen.It can act as the control layer that manages an AI agent’s behavior, such as which tools it uses, what code it runs and how it responds to user inputs.That same flexibility also creates a powerful attack surface that can allow malicious plugins to override commands, poison data inputs, or trick agents into executing harmful instructions.Amazon- and Google-backed Anthropic dropped MCP on Nov. 25, 2024, to connect AI assistants to data systems. Source: AnthropicMCP attack vectors expose AI agents’ security issuesAccording to VanEck, the number of AI agents in the crypto industry had surpassed 10,000 by the end of 2024 and is expected to top 1 million in 2025.Security firm SlowMist has discovered four potential attack vectors that developers need to look out for. Each attack vector is delivered through a plugin, which is how MCP-based agents extend their capabilities, whether it’s pulling price data, executing trades or performing system tasks.Data poisoning: This attack makes users perform misleading steps. It manipulates user behavior, creates false dependencies, and inserts malicious logic early in the process.JSON injection attack: This plugin retrieves data from a local (potentially malicious) source via a JSON call. It can lead to data leakage, command manipulation or bypassing validation mechanisms by feeding the agent tainted inputs.Competitive function override: This technique overrides legitimate system functions with malicious code. It prevents expected operations from occurring and embeds obfuscated instructions, disrupting system logic and hiding the attack.Cross-MCP call attack: This plugin induces an AI agent to interact with unverified external services through encoded error messages or deceptive prompts. It broadens the attack surface by linking multiple systems, creating opportunities for further exploitation.Sequence diagram showing potential cross-MCP attack vectors and risk points. Source: SlowMistThese attack vectors are not synonymous with the poisoning of AI models themselves, like GPT-4 or Claude, which can involve corrupting the training data that shapes a model’s internal parameters. The attacks demonstrated by SlowMist target AI agents — which are systems built on top of models — that act on real-time inputs using plugins, tools and control protocols like MCP.Related: The future of digital self-governance: AI agents in crypto“AI model poisoning involves injecting malicious data into training samples, which then becomes embedded in the model parameters,” co-founder of blockchain security firm SlowMist “Monster Z” told Cointelegraph. “In contrast, the poisoning of agents and MCPs mainly stems from additional malicious information introduced during the model’s interaction phase.” “Personally, I believe [poisoning of agents] threat level and privilege scope are higher than that of standalone AI poisoning,” he said.MCP in AI agents a threat to cryptoThe adoption of MCP and AI agents is still relatively new in crypto. SlowMist identified the attack vectors from pre-released MCP projects it audited, which mitigated actual losses to end-users. However, the threat level of MCP security vulnerabilities is very real, according to Monster, who recalled an audit where the vulnerability may have led to private key leaks — a catastrophic ordeal for any crypto project or investor, as it could grant full asset control to uninvited actors.Crypto developers may be new to AI security, but it’s an urgent issue. Source: Cos“The moment you open your system to third-party plugins, you’re extending the attack surface beyond your control,” Guy Itzhaki, CEO of encryption research firm Fhenix, told Cointelegraph.Related: AI has a trust problem — Decentralized privacy-preserving tech can fix it“Plugins can act as trusted code execution paths, often without proper sandboxing. This opens the door to privilege escalation, dependency injection, function overrides and — worst of all — silent data leaks,” he added. Securing the AI layer before it’s too lateBuild fast, break things — then get hacked. That’s the risk facing developers who push off security to version two, especially in crypto’s high-stakes, onchain environment.The most common mistake builders make is to assume they can fly under the radar for a while and implement security measures in later updates after launch. That’s according to Lisa Loud, executive director of Secret Foundation.“When you build any plugin-based system today, especially if it’s in the context of crypto, which is public and onchain, you have to build security first and everything else second,” she told Cointelegraph.SlowMist security experts recommend developers implement strict plugin verification, enforce input sanitization, apply least privilege principles, and regularly review agent behavior.Loud said it’s “not difficult” to implement such security checks to prevent malicious injections or data poisoning, just “tedious and time consuming” — a small price to pay to secure crypto funds.As AI agents expand their footprint in crypto infrastructure, the need for proactive security cannot be overstated. The MCP framework may unlock powerful new capabilities for those agents, but without robust guardrails around plugins and system behavior, they could turn from helpful assistants into attack vectors, placing crypto wallets, funds and data at risk.Magazine: Crypto AI tokens surge 34%, why ChatGPT is such a kiss-ass: AI EyeWeiter zum vollständigen Artikel bei Cointelegraph Weiter zum vollständigen Artikel bei Cointelegraph Weiter zum vollständigen Artikel bei Cointelegraph Weiter zum vollständigen Artikel bei Cointelegraph

Analysen zu Ai Holdings Corp

  • Alle
  • Kaufen
  • Hold
  • Verkaufen
  • ?
Zu diesem Datensatz liegen uns leider keine Daten vor.
Eintrag hinzufügen

Erfolgreich hinzugefügt!. Zu Portfolio/Watchlist wechseln.

Es ist ein Fehler aufgetreten!

Kein Portfolio vorhanden. Bitte zusätzlich den Namen des neuen Portfolios angeben. Keine Watchlisten vorhanden. Bitte zusätzlich den Namen der neuen Watchlist angeben.

CHF
Hinzufügen

Dividendenstrategie: Sicherheit, Chancen & persönliche Insights von Lisa von Aktiengram

Wie stabil ist eine Dividendenstrategie in turbulenten Börsenzeiten? Welche Sektoren bieten aktuell attraktive Einstiegschancen – und wie geht man mit Dividendensenkungen um? Lisa von Aktiengram gibt im exklusiven Interview auf der Invest 2025 in Stuttgart spannende Einblicke in ihre persönliche Anlagestrategie, ihre Erfahrungen als Privatanlegerin und den Umgang mit Marktvolatilität.

🔍 Das erwartet dich im Video::

🔹 Warum Dividenden Ruhe und Stabilität ins Depot bringen?
🔹 Welche Branchen Lisa jetzt im Fokus hat?
🔹 Wie Lisa mit Dividendensenkungen umgeht?
🔹 Persönlicher Umgang mit Marktschwankungen
🔹 Eindrücke auf ihren ARD-TV-Auftritt
🔹 Community-Feedback & direkte Fragen von Leserinnen
🔹 Lisa’s Tipps für langfristige Anlegerinnen
🔹 Ausblick: Börsentag Zürich im September

Für alle die es nicht erwarten können – sicher die jetzt dein Ticket schon für den Börsentag in Zürich und triff Lisa
📍20. September 2025 🕔 9:30 bis 17:00 Uhr im Kongresshaus Zürich
🎫🎫🎫 https://bxplus.ch/bloggerlounge/

Dividendenstrategie: Sicherheit, Chancen & persönliche Insights von Lisa von Aktiengram | BX Swiss TV

Mini-Futures auf SMI

Typ Stop-Loss Hebel Symbol
Short 12’653.80 18.60 BNRSDU
Short 12’886.27 13.50 SS4MTU
Short 13’355.79 8.78 B02SIU
SMI-Kurs: 12’339.76 27.05.2025 17:30:00
Long 11’716.12 19.68 BX7SBU
Long 11’419.66 13.19 BXGS2U
Long 10’971.81 8.88 B38SLU
Die Produktdokumentation, d.h. der Prospekt und das Basisinformationsblatt (BIB), sowie Informationen zu Chancen und Risiken, finden Sie unter: https://keyinvest-ch.ubs.com

finanzen.net News

Datum Titel
{{ARTIKEL.NEWS.HEAD.DATUM | date : "HH:mm" }}
{{ARTIKEL.NEWS.BODY.TITEL}}