Binance Square

github

66,115 views
92 Discussing
XXYY
·
--
AI tool OpenClaw encountered a “self-attack”: Bash command construction error led to key leak Incident details: Web3 security company GoPlus disclosed that the AI development tool OpenClaw recently experienced a “self-attack.” The system, while automating the creation of GitHub Issues, triggered a command injection vulnerability due to an incorrectly wrapped backtick (set) in the Shell command constructed by AI. Leak details: The Bash environment interpreted the command as an execution command, causing the system to automatically output and publicly disclose over 100 lines of sensitive environment variables. The leaked information included core private data such as Telegram keys, authentication tokens, and more. Technical incentives: This incident highlights the uncontrollability of AI when executing low-level system commands. Due to a lack of syntactic validation of the generated content, the AI inadvertently exploited Bash features to push confidential information to public platforms. Security recommendations: GoPlus advises developers in AI automation scenarios: 1. Prioritize using API calls rather than directly concatenating Shell commands; 2. Follow the principle of least privilege to isolate environment variables; 3. Disable high-risk execution modes and introduce manual review. #GoPlus #OpenClaw #AI安全 #GitHub #密钥泄露
AI tool OpenClaw encountered a “self-attack”: Bash command construction error led to key leak

Incident details: Web3 security company GoPlus disclosed that the AI development tool OpenClaw recently experienced a “self-attack.” The system, while automating the creation of GitHub Issues, triggered a command injection vulnerability due to an incorrectly wrapped backtick (set) in the Shell command constructed by AI.
Leak details: The Bash environment interpreted the command as an execution command, causing the system to automatically output and publicly disclose over 100 lines of sensitive environment variables. The leaked information included core private data such as Telegram keys, authentication tokens, and more.
Technical incentives: This incident highlights the uncontrollability of AI when executing low-level system commands. Due to a lack of syntactic validation of the generated content, the AI inadvertently exploited Bash features to push confidential information to public platforms.
Security recommendations: GoPlus advises developers in AI automation scenarios: 1. Prioritize using API calls rather than directly concatenating Shell commands; 2. Follow the principle of least privilege to isolate environment variables; 3. Disable high-risk execution modes and introduce manual review.

#GoPlus #OpenClaw #AI安全 #GitHub #密钥泄露
AI TAKEOVER: $CLAW just dethroned React! GitHub stars EXPLODED past 250,000. This is NOT a drill. OpenClaw is here to unleash AI for EVERYONE. Developers and netizens, your support fuels this rocket. Get ready for rapid tech updates. The future of AI is being built NOW. Don't get left behind. This is the moment. Disclaimer: This is not financial advice. #Aİ #Crypto #OpenClaw #GitHub 🚀
AI TAKEOVER: $CLAW just dethroned React!
GitHub stars EXPLODED past 250,000. This is NOT a drill. OpenClaw is here to unleash AI for EVERYONE. Developers and netizens, your support fuels this rocket. Get ready for rapid tech updates. The future of AI is being built NOW. Don't get left behind. This is the moment.

Disclaimer: This is not financial advice.

#Aİ #Crypto #OpenClaw #GitHub 🚀
·
--
{future}(BTCUSDT) 🔥 NEXT PARABOLIC RUNNERS REVEALED BY DEVELOPER ACTIVITY! The projects with the most relentless #Github development over the past 9 months are setting the stage for epic breakouts. This isn't just coding; it's a roadmap to massive value. • $ICP, $MINA, $BTC, $LINK, $AVAX, $STORJ, $ETH, $NEAR, $SUSHI, $XLM are building non-stop. • Developer commitment signals future innovation and explosive growth. • Position yourself now for the inevitable liquidity spike. Do not fade this. #Crypto #Altcoins #BullRun #FOMO 🚀 {future}(MINAUSDT) {future}(ICPUSDT)
🔥 NEXT PARABOLIC RUNNERS REVEALED BY DEVELOPER ACTIVITY!
The projects with the most relentless #Github development over the past 9 months are setting the stage for epic breakouts. This isn't just coding; it's a roadmap to massive value.
• $ICP, $MINA, $BTC, $LINK, $AVAX, $STORJ, $ETH, $NEAR, $SUSHI, $XLM are building non-stop.
• Developer commitment signals future innovation and explosive growth.
• Position yourself now for the inevitable liquidity spike. Do not fade this.
#Crypto #Altcoins #BullRun #FOMO
🚀
THE MOST ACTIVE CRYPTOS BASED ON #Github DATA FOR THE LAST 9 MONTHS $ICP $MINA $BTC $LINK $AVAX $STORJ $ETH $NEAR $SUSHI $XLM
THE MOST ACTIVE CRYPTOS BASED ON #Github DATA FOR THE LAST 9 MONTHS

$ICP $MINA $BTC $LINK $AVAX $STORJ $ETH $NEAR $SUSHI $XLM
AI + Crypto (AI x Crypto) AI Computing Render (#RNDR ), Akash (AKT) Distributed GPU Rendering/Computing AI Model Marketplace Bittensor ($TAO ) Machine Learning Model Incentive Network AI Data #Grass , Ocean (#OCEAN ) Data Scraping/Trading AI Agents ai16z , Virtuals ($VIRTUAL ) Autonomous AI Agent Economy AI Infrastructure Fetch.ai ($FET ) , SingularityNET (#AGIX ) AI Service Network TAO: AI Sector Leader, Market Cap Once Exceeded $10 Billion, Building Machine Learning Model Bitcoin RNDR: #苹果 , #迪士尼 and others use its rendering services, AI Computing Demand Exploding #ai16z : 2024 2025 Hottest AI Agent Framework, #Github Open Source Project Popularity First Sector Characteristics: Narrative Driven, Highly Volatile, Related to AI Industry (#英伟达 , #OpenAI ) News [币安狂撒千万美金,人人有份!立即点击](https://www.binance.com/game/redpacket/LNY2026-with-binance?ref=GRO_40244_BQ6AP) [币安邀请您加入](https://www.binance.com/join?ref=42775467)
AI + Crypto (AI x Crypto)

AI Computing Render (#RNDR ), Akash (AKT) Distributed GPU Rendering/Computing
AI Model Marketplace Bittensor ($TAO ) Machine Learning Model Incentive Network
AI Data #Grass , Ocean (#OCEAN ) Data Scraping/Trading
AI Agents ai16z , Virtuals ($VIRTUAL ) Autonomous AI Agent Economy
AI Infrastructure Fetch.ai ($FET ) , SingularityNET (#AGIX ) AI Service Network
TAO: AI Sector Leader, Market Cap Once Exceeded $10 Billion, Building Machine Learning Model Bitcoin
RNDR: #苹果 , #迪士尼 and others use its rendering services, AI Computing Demand Exploding
#ai16z : 2024 2025 Hottest AI Agent Framework, #Github Open Source Project Popularity First
Sector Characteristics: Narrative Driven, Highly Volatile, Related to AI Industry (#英伟达 , #OpenAI ) News

币安狂撒千万美金,人人有份!立即点击

币安邀请您加入
#Microsoft 's Independent Strategy in the AI Race: On the Path to a $5 Trillion Valuation Microsoft is advancing its #Aİ capabilities beyond its OpenAI partnership, leading analysts to hope its market value could reach $5 trillion by 2026. The company's current value is $3.59 trillion. Microsoft's AI Empire: With and Without OpenAI Microsoft has invested approximately $13 billion in OpenAI to date, securing a 27% ownership stake. However, the majority of Microsoft's AI revenue (75%) comes from its own Azure AI services, not from reselling OpenAI's models (which accounts for only 6%). Microsoft has made a $5 billion investment in Anthropic, which will purchase $30 billion in Azure computing. The company has locked in $250 billion in Azure commitments and intends to spend $80 billion on AI infrastructure by 2025. Integrating AI into Every Product Microsoft has implemented AI across all its major product lines: Copilot has been integrated into Microsoft 365, Windows, and #Github . AI capabilities are now part of the Azure cloud, Office apps, Bing, Edge, and developer tools. According to experts, the company's broad reach (Azure training, GitHub Copilot, Office AI) is its biggest advantage for the next decade. The Next Step: Agentic AI Analysts believe Agentic AI (AI capable of handling multi-step tasks) could be Microsoft's next breakthrough, where it will lead alongside ServiceNow and Salesforce. Risks and Challenges Heavy infrastructure investments by Microsoft could be at risk if AI demand weakens or competing models improve. The company could face challenges if market sentiment is affected by AI delivery outcomes. Microsoft continues to strengthen its independent position in the AI race, where the OpenAI partnership is an important pillar, but only one part of the overall strategy. #USJobsData #TrumpTariffs {future}(BTCUSDT) {future}(SOLUSDT)
#Microsoft 's Independent Strategy in the AI Race: On the Path to a $5 Trillion Valuation
Microsoft is advancing its #Aİ capabilities beyond its OpenAI partnership, leading analysts to hope its market value could reach $5 trillion by 2026. The company's current value is $3.59 trillion.
Microsoft's AI Empire: With and Without OpenAI
Microsoft has invested approximately $13 billion in OpenAI to date, securing a 27% ownership stake.
However, the majority of Microsoft's AI revenue (75%) comes from its own Azure AI services, not from reselling OpenAI's models (which accounts for only 6%).
Microsoft has made a $5 billion investment in Anthropic, which will purchase $30 billion in Azure computing.
The company has locked in $250 billion in Azure commitments and intends to spend $80 billion on AI infrastructure by 2025.
Integrating AI into Every Product
Microsoft has implemented AI across all its major product lines:
Copilot has been integrated into Microsoft 365, Windows, and #Github .
AI capabilities are now part of the Azure cloud, Office apps, Bing, Edge, and developer tools.
According to experts, the company's broad reach (Azure training, GitHub Copilot, Office AI) is its biggest advantage for the next decade.
The Next Step: Agentic AI
Analysts believe Agentic AI (AI capable of handling multi-step tasks) could be Microsoft's next breakthrough, where it will lead alongside ServiceNow and Salesforce.
Risks and Challenges
Heavy infrastructure investments by Microsoft could be at risk if AI demand weakens or competing models improve.
The company could face challenges if market sentiment is affected by AI delivery outcomes.
Microsoft continues to strengthen its independent position in the AI race, where the OpenAI partnership is an important pillar, but only one part of the overall strategy.

#USJobsData #TrumpTariffs
How Hackers Use GitHub to Stay Under the RadarIn the world of cybersecurity, attackers are always evolving, finding new ways to hide in plain sight, and one of the latest examples shows just how creative they’ve become. The case of the Astaroth banking trojan demonstrates how hackers are now using legitimate platforms like GitHub to stay invisible to security experts while continuing to steal sensitive information It all begins with a simple phishing email that looks completely normal, often disguised as an official message asking you to download an important document. The attached file, usually with a .lnk extension that appears harmless, is actually a trap. Once opened, it silently installs malware onto your device and begins its work in the background. What follows is a stealthy operation where the trojan quietly records your keystrokes, capturing logins, passwords, and other personal data connected to your bank accounts and crypto wallets. All that stolen information is then sent back to the attackers who control the malware’s network But the truly fascinating part is how Astaroth manages to remain undetected for so long. Most trojans rely on a central command server that coordinates all infected machines. Once authorities discover and take down that server, the entire operation falls apart. Astaroth, however, doesn’t play by those rules. Instead, it uses GitHub — the same platform developers use to host and share open-source code — as part of its communication system. The malware doesn’t store any dangerous files there but hides a small configuration file in a GitHub repository. That file contains new instructions, such as where to connect next if the main server goes offline. In essence, GitHub acts as a message board for the trojan, telling it where to find the next command center without ever raising suspicion According to cybersecurity experts at McAfee, this trick makes Astaroth remarkably resilient. Even if one part of its infrastructure is destroyed, it can quickly recover and continue its operations using legitimate channels that no one expects to be part of a cyberattack. To make things even more sophisticated, the trojan is programmed to avoid drawing attention from analysts in certain countries. If it detects that it’s running on a system based in the United States or another English-speaking region, it deletes itself immediately, leaving no trace behind. Its main focus has been users in South America, particularly in Brazil, Argentina, and Chile, where it has caused significant damage So what can regular users do in the face of such clever tactics? The answers may sound familiar, but they are more important than ever. Never open attachments or click on links from unknown senders, no matter how legitimate they appear. Keep your antivirus software updated and make sure it’s actively monitoring your system. Most importantly, use two-factor authentication on all your critical accounts, especially for online banking and crypto exchanges. Even if your password is stolen, the attacker will need an additional code to access your funds The Astaroth case is a powerful reminder that even trusted and widely used platforms like GitHub can be misused for malicious purposes. It challenges the very idea of online safety, showing that in today’s digital landscape, the line between good and bad tools depends entirely on how they’re used. Perhaps there is no truly safe place on the internet anymore only safer habits and smarter vigilance that help us stay one step ahead #GitHub #Cybersecurity #CryptoNews #McAfee #OnlineSafety

How Hackers Use GitHub to Stay Under the Radar

In the world of cybersecurity, attackers are always evolving, finding new ways to hide in plain sight, and one of the latest examples shows just how creative they’ve become. The case of the Astaroth banking trojan demonstrates how hackers are now using legitimate platforms like GitHub to stay invisible to security experts while continuing to steal sensitive information

It all begins with a simple phishing email that looks completely normal, often disguised as an official message asking you to download an important document. The attached file, usually with a .lnk extension that appears harmless, is actually a trap. Once opened, it silently installs malware onto your device and begins its work in the background. What follows is a stealthy operation where the trojan quietly records your keystrokes, capturing logins, passwords, and other personal data connected to your bank accounts and crypto wallets. All that stolen information is then sent back to the attackers who control the malware’s network

But the truly fascinating part is how Astaroth manages to remain undetected for so long. Most trojans rely on a central command server that coordinates all infected machines. Once authorities discover and take down that server, the entire operation falls apart. Astaroth, however, doesn’t play by those rules. Instead, it uses GitHub — the same platform developers use to host and share open-source code — as part of its communication system. The malware doesn’t store any dangerous files there but hides a small configuration file in a GitHub repository. That file contains new instructions, such as where to connect next if the main server goes offline. In essence, GitHub acts as a message board for the trojan, telling it where to find the next command center without ever raising suspicion

According to cybersecurity experts at McAfee, this trick makes Astaroth remarkably resilient. Even if one part of its infrastructure is destroyed, it can quickly recover and continue its operations using legitimate channels that no one expects to be part of a cyberattack. To make things even more sophisticated, the trojan is programmed to avoid drawing attention from analysts in certain countries. If it detects that it’s running on a system based in the United States or another English-speaking region, it deletes itself immediately, leaving no trace behind. Its main focus has been users in South America, particularly in Brazil, Argentina, and Chile, where it has caused significant damage

So what can regular users do in the face of such clever tactics? The answers may sound familiar, but they are more important than ever. Never open attachments or click on links from unknown senders, no matter how legitimate they appear. Keep your antivirus software updated and make sure it’s actively monitoring your system. Most importantly, use two-factor authentication on all your critical accounts, especially for online banking and crypto exchanges. Even if your password is stolen, the attacker will need an additional code to access your funds

The Astaroth case is a powerful reminder that even trusted and widely used platforms like GitHub can be misused for malicious purposes. It challenges the very idea of online safety, showing that in today’s digital landscape, the line between good and bad tools depends entirely on how they’re used. Perhaps there is no truly safe place on the internet anymore only safer habits and smarter vigilance that help us stay one step ahead

#GitHub #Cybersecurity #CryptoNews #McAfee #OnlineSafety
·
--
@Torkelrogstad: Brand new scam technique just dropped: #github bots trying to phish you into downloading #Malware . Within a minute of creating an issue mentioning the words "seed derivation" and "xpriv", a shady-looking link was posted by a bot. Stay vigilant, folks! #phishing #Hacked
@Torkelrogstad: Brand new scam technique just dropped: #github bots trying to phish you into downloading #Malware .

Within a minute of creating an issue mentioning the words "seed derivation" and "xpriv", a shady-looking link was posted by a bot.

Stay vigilant, folks! #phishing #Hacked
·
--
(#Cryptodiffer ) Top-15 Projects by average daily development activity growth on #github in the last 30 days$PHA $FIO $POLYX $WLD $SAITO $RPL $JUP $XYO $MINA $BZZ $KDA $PNK $GNO $ZIL #1INCH
(#Cryptodiffer )
Top-15 Projects by average daily development activity growth on #github in the last 30 days$PHA $FIO $POLYX $WLD $SAITO $RPL $JUP $XYO $MINA $BZZ $KDA $PNK $GNO $ZIL #1INCH
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number