LogoAgentHunter
  • Submit
  • Industries
  • Categories
  • Agency
Logo
LogoAgentHunter

Discover, Compare, and Leverage the Best AI Agents

Featured On

Featured on yo.directory
yo.directory
Featured on yo.directory
Featured on Startup Fame
Startup Fame
Featured on Startup Fame
AIStage
Listed on AIStage
Sprunkid
Featured on Sprunkid
Featured on Twelve Tools
Twelve Tools
Featured on Twelve Tools
Listed on Turbo0
Turbo0
Listed on Turbo0
Featured on Product Hunt
Product Hunt
Featured on Product Hunt
Pipsgames
Game Sprunki
Featured on Game Sprunki
NB2 Hub
AI Toolz Dir
Featured on AI Toolz Dir
Featured on Microlaunch
Microlaunch
Featured on Microlaunch
Featured on Fazier
Fazier
Featured on Fazier
Featured on Techbase Directory
Techbase Directory
Featured on Techbase Directory
backlinkdirs
Featured on Backlink Dirs
Featured on SideProjectors
SideProjectors
Featured on SideProjectors
Submit AI Tools
Featured on Submit AI Tools
AI Hunt
Featured on AI Hunt
Featured on Dang.ai
Dang.ai
Featured on Dang.ai
Featured on AI Finder
AI Finder
Featured on AI Finder
Featured on LaunchIgniter
LaunchIgniter
Featured on LaunchIgniter
Imglab
Featured on Imglab
AI138
Featured on AI138
600.tools
Featured on 600.tools
Featured Tool
Featured on Featured Tool
Dirs.cc
Featured on Dirs.cc
Ant Directory
Featured on Ant Directory
Featured on MagicBox.tools
MagicBox.tools
Featured on MagicBox.tools
Featured on Code.market
Code.market
Featured on Code.market
Featured on LaunchBoard
LaunchBoard
Featured on LaunchBoard
Genify
Featured on Genify
Featured on LaunchDirectories
LaunchDirectories
Featured on LaunchDirectories
ConceptViz
ConceptViz
Featured on Good AI Tools
Good AI Tools
Featured on Good AI Tools
Featured on Acid Tools
Acid Tools
Featured on Acid Tools
Featured on AIGC 160
AIGC 160
Featured on AIGC 160
Featured on AI Tech Viral
AI Tech Viral
Featured on AI Tech Viral
Featured on AI Toolz
AI Toolz
Featured on AI Toolz
Featured on AI X Collection
AI X Collection
Featured on AI X Collection
Featured on Appa List
Appa List
Featured on Appa List
Featured on Appsy Tools
Appsy Tools
Featured on Appsy Tools
Featured on Ash List
Ash List
Featured on Ash List
Featured on Beam Tools
Beam Tools
Featured on Beam Tools
Featured on Best Tool Vault
Best Tool Vault
Featured on Best Tool Vault
Featured on Hunt for Tools
Hunt for Tools
Featured on Hunt for Tools
Featured on Latest AI Updates
Latest AI Updates
Featured on Latest AI Updates
Featured on Launch Scroll
Launch Scroll
Featured on Launch Scroll
Featured on My Start Tools
My Start Tools
Featured on My Start Tools
Featured on My Launch Stash
My Launch Stash
Featured on My Launch Stash
Featured on Power Up Tools
Power Up Tools
Featured on Power Up Tools
Featured on Product List Dir
Product List Dir
Featured on Product List Dir
Featured on Product Wing
Product Wing
Featured on Product Wing
Featured on SaaS Field
SaaS Field
Featured on SaaS Field
Featured on SaaS Hub Directory
SaaS Hub Directory
Featured on SaaS Hub Directory
Featured on SaaS Roots
SaaS Roots
Featured on SaaS Roots
Featured on SaaS Tools Dir
SaaS Tools Dir
Featured on SaaS Tools Dir
Featured on SaaS Wheel
SaaS Wheel
Featured on SaaS Wheel
Featured on Smart Kit Hub
Smart Kit Hub
Featured on Smart Kit Hub
Featured on Software Bolt
Software Bolt
Featured on Software Bolt
Featured on Solver Tools
Solver Tools
Featured on Solver Tools
Featured on Source Dir
Source Dir
Featured on Source Dir
Featured on Stack Directory
Stack Directory
Featured on Stack Directory
Featured on Startup AIdeas
Startup AIdeas
Featured on Startup AIdeas
Featured on Startup Benchmarks
Startup Benchmarks
Featured on Startup Benchmarks
Featured on Startup Vessel
Startup Vessel
Featured on Startup Vessel
Featured on Super AI Boom
Super AI Boom
Featured on Super AI Boom
Featured on That App Show
That App Show
Featured on That App Show
Featured on The App Tools
The App Tools
Featured on The App Tools
Featured on The Core Tools
The Core Tools
Featured on The Core Tools
Featured on The Key Tools
The Key Tools
Featured on The Key Tools
Featured on The Mega Tools
The Mega Tools
Featured on The Mega Tools
Featured on Tiny Tool Hub
Tiny Tool Hub
Featured on Tiny Tool Hub
Featured on Tool Cosmos
Tool Cosmos
Featured on Tool Cosmos
Featured on Tool Find Dir
Tool Find Dir
Featured on Tool Find Dir
Featured on Tool Journey
Tool Journey
Featured on Tool Journey
Featured on Tool Prism
Tool Prism
Featured on Tool Prism
Featured on Tool Signal
Tool Signal
Featured on Tool Signal
Featured on Tools Under Radar
Tools Under Radar
Featured on Tools Under Radar
Featured on Tools List HQ
Tools List HQ
Featured on Tools List HQ
Featured on Top Trend Tools
Top Trend Tools
Featured on Top Trend Tools
Featured on Toshi List
Toshi List
Featured on Toshi List
Featured on Trustiner
Trustiner
Featured on Trustiner
Featured on Unite List
Unite List
Featured on Unite List
Featured on We Like Tools
We Like Tools
Featured on We Like Tools
Copyright © 2026 All Rights Reserved.
Product
  • AI Agents Directory
  • AI Agent Glossary
  • Industries
  • Categories
Resources
  • AI Agentic Workflows
  • Blog
  • News
  • Submit
  • Coummunity
  • Ebooks
Company
  • About Us
  • Privacy Policy
  • Terms of Service
  • Sitemap
Friend Links
  • X AI Creator
  • AI Music API
  • ImaginePro AI
  • Dog Names
  • Readdit Analytics
Back to News List

AI Crypto Plugins Pose Security Risks as Vulnerabilities Exposed

May 25, 2025•Mikaia ANDRIAMAHAZOARIMANANA•Original Link•4 minutes
Cryptocurrency
AI Security
Blockchain

AI plugins designed to assist with cryptocurrency management may inadvertently expose wallets to hackers due to critical vulnerabilities in MCP protocols.

Published: Sun 25 May 2025 | 5 min read | By Mikaia A.

Robot hand sending a transaction in a crypto wallet interface

Key Takeaways

  • Crypto AI agents use the Model Context Protocol (MCP), which is flexible but vulnerable to targeted attacks.
  • Malicious plugins can hijack AI agents to steal private keys and crypto funds.
  • SlowMist identified four major attack vectors through an educational project called MasterMCP.
  • Securing plugins, behaviors, and privileges must become a top priority for crypto AI developers.

The Emergence of a New Threat

Artificial intelligence is rapidly entering the crypto space. By the end of 2024, over 10,000 crypto AI agents were active, with projections exceeding one million by 2025. These AI agents, seen as a revolution in the sector, are not standalone models like GPT-4 but extensions connected in real time to wallets, bots, or dApps.

Their mission? To make automated decisions and execute on-chain actions. All based on the Model Context Protocol (MCP). However, this flexibility is also its weakness. MCP acts as the brain of these agents, deciding which tools to use and how to respond. According to SlowMist, this architecture opens an "uncontrollable surface without strict sandboxing." Malicious plugins can hijack an agent, inject toxic data, or make it call trapped external functions.

Sequence diagram showing potential attack vectors and risk points. Source: SlowMist

Security expert Monster Z explains:

"Poisoning of agents and MCPs results from malicious information introduced during the interaction phase."

In short, even a well-trained agent can betray if it receives a toxic instruction at the wrong time. Worse: this threat surpasses classic AI model poisoning in severity.

A System That Can Self-Destruct from Within

The attacks are diverse, precise, and sneaky. SlowMist documents four main ones in its report. The MasterMCP project reproduces them to help developers understand the danger.

  1. Data poisoning uses plugins to make the agent perform absurd tasks or mislead the user.
  2. JSON injection allows bypassing security by calling malicious data locally.
  3. Function substitution replaces critical operations with obfuscated code.
  4. Inter-MCP calls encourage an agent to interact with unsecured servers to widen the vulnerability.

All these attacks start from unverified plugins. Yet in the crypto world, any plugin connected to a wallet is an entry point. Guy Itzhaki, CEO of Fhenix, summarizes:

"Opening your system to third-party plugins is opening a breach beyond your control."

Behind a simple AI assistant hides a risk of private key leaks, fund thefts, and order manipulation. And as Lisa Loud, director of Secret Foundation, points out: "Beta versions are the most common times to get hacked."

What to Do? Secure AI Before It Feasts on Our Cryptos

Against this threat, the reaction should not be panic but prevention. SlowMist recommends:

  • Verify each plugin.
  • Limit privileges.
  • Isolate environments.
  • Continuously analyze agent behaviors.

These measures must be native, integrated from the first line of code. Developers must also train their teams, raise user awareness, and document expected behaviors. It is not about stopping the use of AI, but about not skimping on security.

While AI agents threaten our cryptos, another worry grows among financial giants. BlackRock wonders: can bitcoin survive the quantum era? Because if AIs can fool a plugin, a quantum computer could decrypt our private keys. And then, no more blockchain, no more wallet: just data stolen silently. The crypto revolution will also have to survive the revolution of physics.

Maximize your Cointribune experience with our "Read to Earn" program! For every article you read, earn points and access exclusive rewards. Sign up now and start earning benefits.

Related News

October 3, 2025•Stephanie Barnett

AI Agents Fuel Identity Debt Risks Across APAC

Organizations must adopt secure authorization flows for AI environments rather than relying on outdated authentication methods to mitigate identity debt and stay ahead of attackers.

AI Security
Identity Debt
APAC Tech
September 30, 2025•Gogulakrishnan Thiyagarajan

Dynamic Context Firewall Enhances AI Security for MCP

A Dynamic Context Firewall for Model Context Protocol offers adaptive security for AI agent interactions, addressing risks like data exfiltration and malicious tool execution.

AI Security
Model Context Protocol
Cybersecurity

About the Author

Dr. Lisa Kim

Dr. Lisa Kim

AI Ethics Researcher

Leading expert in AI ethics and responsible AI development with 13 years of research experience. Former member of Microsoft AI Ethics Committee, now provides consulting for multiple international AI governance organizations. Regularly contributes AI ethics articles to top-tier journals like Nature and Science.

Expertise

AI Ethics
Algorithmic Fairness
AI Governance
Responsible AI
Experience
13 years
Publications
95+
Credentials
2
LinkedInResearchGate

Agent Newsletter

Get Agentic Newsletter Today

Subscribe to our newsletter for the latest news and updates