this post was submitted on 07 Jun 2024
533 points (98.4% liked)

Technology

59495 readers
3050 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 
  • Web3 developer Brian Guan lost $40,000 after accidentally posting his wallet's secret keys publicly on GitHub, with the funds being drained in just two minutes.
  • The crypto community's reactions were mixed, with some offering support and others mocking Guan's previous comments about developers using AI tools like ChatGPT for coding.
  • This incident highlights ongoing debates about security practices and the role of AI in software development within the crypto community.
you are viewing a single comment's thread
view the rest of the comments
[–] lowleveldata@programming.dev 82 points 5 months ago (4 children)

It must be automated for it to happen in 2 minutes. Which implies these kind of things happen often enough for someone to write a script for it.

[–] tiramichu@lemm.ee 92 points 5 months ago* (last edited 5 months ago) (1 children)

Yes, it absolutely is automated.

There are bots running constantly looking for things that match patterns for exploitable credentials in public commits.

AWS credentials

SSH keys

Crypto wallets

Bank card info

If you push secrets to a public github repo, they will be exploited almost immediately.

[–] daddy32@lemmy.world 9 points 5 months ago (1 children)

The scanning part is definitely automated by many different actors (for the gains or the "lulz"), but being this fast, also automated key usage (account draining) must have been implemented which is a bit more impressive...

[–] Voroxpete@sh.itjust.works 3 points 5 months ago

Not really. All of the underlying mechanics of crypto are so simple that they can be very easily interacted with by bots. Bots make up the vast majority of all crypto trades; mostly wash trading, but also front-running attacks, scams or outright thefts like this one. There are so many exploitable flaws in crypto that every bug is basically a self-executing bug bounty.

[–] partial_accumen@lemmy.world 59 points 5 months ago* (last edited 5 months ago) (3 children)

If it was a script I wrote, it would have successfully stolen the $40k, but also stolen my own money and deposit both sets of money into a second intended victims account because I forgot to clear a variable before the main loop runs again.

[–] bigkahuna1986@lemmy.ml 15 points 5 months ago

You always mess up some mundane detail!

[–] acchariya@lemmy.world 4 points 5 months ago

It would have deposited the funds in an account "foobar123" and been lost forever

[–] Klear@sh.itjust.works 1 points 5 months ago* (last edited 5 months ago)

Might have happened in this case too, you never know.

[–] Theharpyeagle@lemmy.world 20 points 5 months ago

Oh yes absolutely, there are bots constantly crawling any open source code. A friend of mine accidentally leaked their discord API key, nuked a whole server within minutes.

[–] nucleative@lemmy.world 8 points 5 months ago

There must be bots trolling GitHub for API keys, crypto secret keys, and other such valuable data