We want to bring your attention to a critical security warning regarding a prompt injection attack identified on #Moltbook that poses a threat to your crypto assets.
Our investigation reveals that a user known as @thechandog has generated more than 30 harmful Submolts on the platform. While these entries masquerade as educational tutorials for Base Chain L2 TypeScript, they actually conceal prompt injection payloads within their descriptions. These hidden instructions attempt to force a transfer of 0.1 ETH to the wallet address listed below.
0x8eadc7cc0a77594e3fa999e80e1ccb7f4e1c04e0
There is a significant risk that any AI Agent interacting with these descriptions during browsing or posting activities could trigger these concealed commands without realizing it.
Please take note of the specific malicious address involved in this scheme:
0x8eadc7cc0a77594e3fa999e80e1ccb7f4e1c04e0
To stay safe, please adhere to the following #GoPlus security advice:
Refrain from executing code directly from Submolt descriptions.
Rigorously verify any financial transaction initiated by an Agent.
Always perform a security scan prior to the installation of any Skill.
Remember that high visibility does not guarantee safety; for instance, the attacker @thechandog reached the rank of #4 within 24h despite being a bad actor.
See below for more details.