Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Promotions
AI
Gate AI
Your all-in-one conversational AI partner
Gate AI Bot
Use Gate AI directly in your social App
GateClaw
Gate Blue Lobster, ready to go
Gate for AI Agent
AI infrastructure, Gate MCP, Skills, and CLI
Gate Skills Hub
10K+ Skills
From office tasks to trading, the all-in-one skill hub makes AI even more useful.
GateRouter
Smartly choose from 30+ AI models, with 0% extra fees
I just read something that should concern anyone using AI assistants with their crypto wallets. It turns out that more than 300 malicious plugins have been discovered, specifically designed to steal wallet data and exchange account information. And the worst part is that you probably don’t even realize it’s happening.
Look, AI is becoming increasingly integrated into our computers. It’s no longer just a chatbot: now they are digital agents with system-level access. They can read local files, execute commands, access browser data, connect to wallets, handle trading tools. Basically, they hold the keys to your digital house.
The problem is that when an attacker infects an AI tool, they gain access to all of that. And for crypto users, this is especially dangerous. Researchers found that these malicious plugins can steal seed phrases, private key files, trading passwords, 2FA codes, API keys. All silently, without pop-up windows, without warnings. The malware runs in the background, collects wallet data without you noticing, and sends everything to the attackers.
The insidious part is how it works. Attackers can directly read your wallet files, obtain exchange credentials, capture verification codes, reset passwords. And they don’t need your active permission. It’s as if someone had a copy of all your keys.
That’s why AI assistants have become targets. They have more permissions than any other software. Access to file systems, browsers, email, wallets, APIs. They are automated executors with admin privileges. Once compromised, it’s like the attackers control your entire computer.
If your AI assistant is infected, the risks are real. A compromised mnemonic phrase means total control of the wallet. Attackers can restore it and transfer all your assets. Or take over your exchange account: log in with your credentials, change security settings, withdraw funds. Stolen API keys allow malicious operations. And if they compromise your email, they compromise multiple accounts because email is the foundation of all account security.
So what to do? First, never store seed phrases or private keys in AI tools. No entering them into chats, no saving them in text files. Use offline storage and hardware wallets. Don’t allow AI tools to access wallet files.
Second, use a separate device for critical operations. Don’t install experimental AI tools on the same device where you operate. Keep devices separate.
Third, be careful with which plugins you install. Especially plugins from unofficial sources or unverified GitHub projects. Attackers use fake plugins and fake tools to deploy malware. If you need to use API keys, restrict permissions and disable withdrawals.
Fourth, enable all available security layers. Login passwords, trading passwords, two-factor authentication, Passkeys. Each additional layer reduces risks.
And finally, regularly verify your device’s security. Check what software is installed, what extensions your browser has, if there’s abnormal login activity.
The reality is that any software with system permissions can become an entry point for attacks. And in crypto, once your wallet data or credentials are compromised, assets can be lost permanently. It’s not paranoia; it’s common sense.