AI agents are set to power crypto payments, but a hidden flaw could expose wallets

AI agents are set to power crypto payments, but a hidden flaw could expose wallets

Source: CoinDesk

Published:11:32 UTC

BTC Price:$70854.4

Analysis

Price Impact

Trustworthiness

Price Direction

Time Effect

Original Article:

Article Content:

Tech Share Share this article Copy link X icon X (Twitter) LinkedIn Facebook Email AI agents are set to power crypto payments, but a hidden flaw could expose wallets Researchers say a largely invisible layer of AI infrastructure can intercept sensitive data and has already been linked to stolen credentials and a $500,000 wallet drain By Olivier Acuna | Edited by Shaurya Malwa Apr 13, 2026, 11:32 a.m. Make preferred on AI Agent integration into crypto payments may be moving faster than they should, leaving behind security risks that could be exploited by malicious actors, academics note. (Steve A Johnson/Unsplash) What to know : Security researchers warn that "LLM routers"—services that sit between users and AI models—are emerging as powerful attack points that can intercept and alter sensitive data. The team documented real-world abuses, including 26 routers secretly injecting malicious tool calls, stealing credentials and draining a client’s crypto wallet of $500,000. As industry leaders predict AI agents will soon mediate trillions of dollars in commerce and dominate crypto transactions, the researchers say the largely unregulated router infrastructure poses cascading, weakest-link risks to users’ funds and systems. The cryptocurrency industry is racing toward a future where AI agents handle everything from booking flights to executing trades and making payments, but new research suggests the infrastructure underpinning that shift may not be secure. McKinsey recently projected that AI agents could mediate $3 trillion to $5 trillion of global consumer commerce by 2030. Coinbase founder Brian Armstrong said on X that “very soon” there will be more AI agents than humans making transactions on the internet. Binance founder Changpeng Zhao was more bold, predicting agents will make one million times more payments than people, all in crypto. But a group of security academic and crypto researchers have released a paper explaining that a largely overlooked piece of AI infrastructure is already being used to steal credentials and even drain crypto wallets. The authors of the papers are researchers affiliated with the University of California, Santa Barbara, the University of California, San Diego, blockchain firm Fuzzland and World Liberty Financial. Powerful attack points The team found that so-called “LLM routers,” or services that sit between users and AI models, can act as a powerful attack point exploited by malicious actors. These routers are designed to forward requests to models like OpenAI or Anthropic, but they also have full access to everything passing through them, including sensitive data. “LLM agents have moved beyond conversational assistants into systems that book flights, execute code, and manage infrastructure on behalf of users,” the researchers wrote, highlighting how quickly these tools are taking on real-world financial and operational tasks. The LLM routers or attack points leave users extremely vulnerable as they assume they are interacting directly with a reputable AI model such as OpenAI, Grok or otherwise, when in reality many requests pass through intermediary services that can see and modify that data, the researchers said. According to one of the researchers, Chaofan Shou, the problem is no longer theoretical. He wrote on X that “26 LLM routers are secretly injecting malicious tool calls and stealing creds. One drained our client $500k wallet. We also managed to poison routers to forward traffic to us. Within several hours, we can directly take over ~400 hosts.” “A malicious router can replace a benign command with an attacker-controlled one or silently exfiltrate every credential that passes through it,” the researchers wrote. The researchers said that because these systems can operate autonomously, including frequently approving and executing actions without human review, a single altered instruction can immediately compromise systems or funds. For crypto users, the implications are severe as private keys, API credentials and wallet access tokens often pass through these systems in plain text. The researchers found multiple cases where routers simply collected those secrets, the paper reveals. In one instance, a test Ethereum wallet was drained after its private key was exposed. “Once exposed, credentials like private keys can be copied and reused without the user’s knowledge,” the authors of the paper noted. Cascading risks The team also demonstrated how easy it is to expand the attack. By “poisoning” parts of the router ecosystem, essentially tricking services into forwarding traffic, they were able to observe and potentially control hundreds of downstream systems within hours. “A single malicious router in the chain is enough to compromise the entire system,” the researchers wrote, underscoring what they describe as a weakest-link problem. That suggests a cascading risk of even if a user trusts their AI provider, the infrastructure in between may not be trustworthy, they stated in their paper. That creates a potential mismatch as industry leaders increasingly predict AI agents will handle a growing share of crypto activity, while the underlying infrastructure still lacks guarantees that outputs haven’t been tampered with, they added. More For You Attacker mints $1 billion Polkadot tokens on Ethereum, ends up stealing just $250,000 By Shaurya Malwa | Edited by Omkar Godbole 4 hours ago A forged cross-chain message bypassed state proof validation on the bridge contract, granting admin control over the bridged DOT token and allowing the attacker to mint and dump the entire supply for $237,000. What to know : An attacker exploited a vulnerability in Hyperbridge's Ethereum gateway contract to mint 1 billion bridged Polkadot tokens and dump them for about $237,000 in ether. The exploit, which did not affect Polkadot's core network or native DOT, abused a flawed cross-chain message validation path to seize admin control of the... Read full story Latest Crypto News Bitcoin anchors near $70,000 as RAVE's 3,400% surge signals speculative froth 15 minutes ago Crypto markets stall as oil surges past $100 on Strait of Hormuz blockade 59 minutes ago The one metric investors are overlooking in Michael Saylor’s Strategy 1 hour ago StarkWare cuts jobs in reorganization as Starknet revenue plunges 99% from peak 1 hour ago Clarity Act returns to U.S. Senate, bank earnings: Crypto Week Ahead 3 hours ago Bitcoin hit by $20 million-an-hour selling pressure above $70,000 3 hours ago Top Stories WLFI threatens legal action against Justin Sun after he accuses Trump-linked project of deceptive DeFi deals 5 hours ago Alameda moves $16 million in Solana's SOL token for possible creditor distribution 4 hours ago Attacker mints $1 billion Polkadot tokens on Ethereum, ends up stealing just $250,000 4 hours ago Bitcoin hits a wall – the chart just challenged the $88,000 bull case 5 hours ago Super PAC tied to Tether makes first ad buy from firm founded by Tether's U.S. CEO 22 hours ago Strategy signals another bitcoin buy as company needs just 2% annual BTC growth to cover dividends 6 hours ago