TLDR UC researchers found 26 third-party LLM routers injecting malicious code or stealing credentials One router drained Ether from a researcher-owned decoy walletTLDR UC researchers found 26 third-party LLM routers injecting malicious code or stealing credentials One router drained Ether from a researcher-owned decoy wallet

What Are Malicious LLM Routers and How Can They Steal Your Crypto?

2026/04/13 15:34
3분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 [email protected]으로 연락주시기 바랍니다

TLDR

  • UC researchers found 26 third-party LLM routers injecting malicious code or stealing credentials
  • One router drained Ether from a researcher-owned decoy wallet
  • Routers have full plaintext access to messages, including private keys and seed phrases
  • A setting called “YOLO mode” lets AI agents run commands automatically without user confirmation
  • Researchers recommend never letting private keys pass through an AI agent session

University of California researchers have found that some third-party AI routing tools can steal crypto credentials and inject malicious code into developer workflows.

The findings were published in a paper this week measuring what the researchers called “malicious intermediary attacks” on the large language model (LLM) supply chain.

What Are Malicious LLM Routers and How Can They Steal Your Crypto?

LLM routers are third-party services that sit between a developer and AI providers like OpenAI, Anthropic, and Google. They manage and route API requests across multiple providers.

The problem is that these routers terminate encrypted internet connections. That gives them full, unencrypted access to every message passing through them.

Developers using AI coding tools like Claude Code to build smart contracts or crypto wallets may be sending private keys and seed phrases through these routers without knowing it.

The researchers tested 28 paid routers and 400 free routers gathered from public communities.

Their findings showed nine routers actively injecting malicious code, two using adaptive evasion tactics, and 17 accessing researcher-owned Amazon Web Services credentials.

One router drained Ether from a wallet the researchers had set up as a decoy. The total loss was reported as under $50.

The researchers said the line between normal credential handling and theft is nearly impossible for users to detect, since routers already read sensitive data in plaintext as part of their standard operation.

The YOLO Mode Risk

The paper also flagged a setting found in many AI agent frameworks called “YOLO mode.” In this mode, an AI agent executes commands automatically, without asking the user to approve each step.

This makes the risk worse. If a router is injecting malicious instructions, YOLO mode means those instructions could run without any human review.

The researchers also found that previously safe routers can be quietly turned malicious without the operator knowing. Free routers, in particular, may be offering cheap API access as a way to attract users while stealing credentials in the background.

What Researchers Recommend

Developers were advised to strengthen client-side defenses and to never allow private keys or seed phrases to pass through an AI agent session.

The longer-term fix, the researchers said, is for AI companies to cryptographically sign their responses. This would let developers verify that the instructions an agent receives actually came from the intended model.

The researchers concluded that LLM API routers sit on a critical trust boundary that the broader AI ecosystem currently treats as safe by default.

No details such as transaction hashes for the drained wallet were provided in the paper.

The post What Are Malicious LLM Routers and How Can They Steal Your Crypto? appeared first on CoinCentral.

시장 기회
Mode Network 로고
Mode Network 가격(MODE)
$0.0001243
$0.0001243$0.0001243
+0.81%
USD
Mode Network (MODE) 실시간 가격 차트
면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, [email protected]으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

USD1 Genesis: 0 Fees + 12% APR

USD1 Genesis: 0 Fees + 12% APRUSD1 Genesis: 0 Fees + 12% APR

New users: stake for up to 600% APR. Limited time!