GoPlus Security 🚦
GoPlus Security 🚦 @GoPlusSecurity ·
🚀 #GoPlusSecurity API for AI Agents is live Providing security infrastructure for AI Agent developers, DeFi protocols, x402 ecosystem projects — and anyone using AI Agents for on-chain execution. 👉 As AI Agents begin executing on-chain, risks are scaling alongside them — ny address and token safety, autonomous execution can lead to real asset loss, and there’s no security layer tailored for agent-native interactions. Traditional APIs rely on manual authentication and fixed access models, making them unsuitable for autonomous, on-chain AI Agents. 🛡️ GoPlus introduces Security API for AI Agents ⚙️ Key features -Built on x402, natively supports AI Agent interactions -No API keys required, plug & play -Pay-as-you-go (CU model) Covers: - Malicious address detection|Token security|Transaction simulation|Rug-pull detection - Supports 40+ chains|Designed to handle 30M+ calls Security isn’t optional — it’s foundational for AI Agents. 🛡️ 👉 Get stardocs.gopluslabs.io/reference/secu…R4yRm
4
3
941
CHIFU 🏴‍☠️
CHIFU 🏴‍☠️ @0xchifu ·
Web3 security is only as strong as the vigilance we bring to it. In February 2026 alone, $35 million was lost due to exploits like smart contract vulnerabilities, social engineering, and phishing. Every protocol, every chain—security cannot be optional.” #GoPlusSecurity
GoPlus Security 🚦 GoPlus Security 🚦 @GoPlusSecurity ·
9
iNumaki base.eth🚦
iNumaki base.eth🚦 @Togemaki13 ·
zkSNARK verification flaws can have serious consequences. Proper configuration and auditing are critical. ⚠️ #GoPlusSecurity @GoPlusSecurity @GoPlusZH
GoPlus Security 🚦 GoPlus Security 🚦 @GoPlusSecurity ·
🚨 GoPlus Security Alert: #FOOMCASH Exploited — $2.26M in Losses Privacy gaming platform@FOOMCASH was attacked on both #Base and #Ethereum. A total of 24,283,773,519,600 $FOOM (~$2.26M) was drained. 🔍 Root Cause: A misconfigured verification key allowed the attackefs. By exploiting this flaw, the attacker bypassed contract verification logic and extracted a massive amount of $FOOM tokens.
18
iNumaki base.eth🚦
iNumaki base.eth🚦 @Togemaki13 ·
AI-powered malware is becoming more sophisticated. Always avoid installing APKs from unknown sources. ⚠️ #GoPlusSecurity 🛡️@GoPlusSecurity@GoPlusZH
GoPlus Security 🚦 GoPlus Security 🚦 @GoPlusSecurity ·
🚨 Beware of the malicious Android malware #PromptSpy capable of remotely controlling devices PromptSpy is an Android malware whose primary objective is to remotely control victims’ devices. It leverages AI to make real-time malicious behavior decisions, increasing stealth and attack accuracy. Attack flow overview: Phishing website distribution: By impersonating banking websites (such as fake Chase Bank pages), it lures users into downloading and installing an APK (not available on Google Play). Dropper stage: Requests permission to install “apps from unknown sources,” then induces users to install the second-stage payload (the PromptSpy core). Privilege escalation: Requests enabling Accessibility Service to obtain screen-reading and automated interaction capabilities. AI-driven persistence: Calls the Google Gemini API, analyzes the current UI XML structure of the user’s device, and performs remote control and malicious actions. How AI is used: Instead of hardcoding malicious operation logic, it captures the current screen’s XML structure (including text, element positions, types, etc.) and sends it to Gemini. Gemini then returns operation instructions which are executed. Essentially, this outsources the “decision-making logic” to a large model. Advantages of using AI: It can better adapt to different phone brands and Android versions, better adapt to different UIs, and does not rely on hardcoded logic, improving flexibility and coverage of the attack. #GoPlus Security recommendations: 1. Never install APKs from unknown sources 2. Be cautious when granting Accessibility permissions 3. Enable Google Play Protect
14
iNumaki base.eth🚦
iNumaki base.eth🚦 @Togemaki13 ·
Critical reminder for developers using OpenClaw. Always keep your tools updated to avoid security risks. ⚠️ #GoPlusSecurity 🛡️@GoPlusSecurity@GoPlusZH
GoPlus Security 🚦 GoPlus Security 🚦 @GoPlusSecurity ·
🦞 #OpenClaw Gateway has a critical vulnerability. Please upgrade to version 2026.2.25 or later immediately. OpenClaw operates through a WebSocket Gateway bound to localhost. This Gateway serves as the core coordination layer of the Agent and is a critical component of OpenClaw. The attack specifically targets weaknesses at the Gateway layer and requires only one condition: the user visits a malicious website controlled by an attacker in their browser. Full Attack Chain: -The victim visits a malicious website controlled by the attacker in their browser; -JavaScript on the page initiates a WebSocket connection to the OpenClaw Gateway running on localhost; -The attack script attempts to brute-force the Gateway password hundreds of times per second; -Once successful, the script silently registers itself as a trusted device; -The attacker gains administrator-level control of the Agent. Security Recommendations: Upgrade immediately to OpenClaw version 2026.2.25 or later; Audit and revoke any unnecessary credentials, API keys, and node permissions granted to Agent instances. Proof of concept / exploit demonstration below 👇youtube.com/watch?v=A15fuH…9a
17
iNumaki base.eth🚦
iNumaki base.eth🚦 @Togemaki13 ·
Another reminder to always check token security before trading. Honeypot scams are still trapping many users. ⚠️ Stay safe with #GoPlusSecurity 🛡️@GoPlusSecurity@GoPlusZH
GoPlus Security 🚦 GoPlus Security 🚦 @GoPlusSecurity ·
🚨 GoPlus Security Alert: Beware of new honeypot tokens on BSC such as #4Agent. KOLs and smart money have already been trapped, with losses reaching $100,000. The Gork4.2-themed #4AGENT: 0x15eadc6a76ebe63758ca917a0a1f526b00ca1111 is a honeypot token. KOLs and smart money havetal losses of 170 #BNB (approximately $100,000). Malicious Dev: 0xc7a15250ef489f2ba958b250baefa820a65855fe Attack proceeds: 123.7 #BNB was transferred to 0xFcc7873C52AE1ADA55a01d6c2976dB381C514EB5; another 46 #BNB was swapped to #ETH via Orbiter and bridged to 0x96f4885d32ffc2b6ba9e429ac777440e3df7e775. The Dev’s funds originated from #Bitget. Tracing back through cross-chain addresses shows that the same Dev previously launched two similar unverified malicious tokens: 0x4C2F9c8dD68bE5B137E5dB2116D0B44d7197e2eD (DEBOT) 0xf46bd4c8A725e5650F927E35b55c3DBACA9CDF2d (U Lottery) 📌 Before trading MEME tokens, please check GoPlus security detection information on your market/trading platform to avoid honeypot losses.
15
iNumaki base.eth🚦
iNumaki base.eth🚦 @Togemaki13 ·
AI mistakes can become real security risks. Even a small command misinterpretation can expose sensitive data. Strong monitoring and isolation are essential for AI agents. 🛡️ #GoPlusSecurity@GoPlusSecurity@GoPlusZH
GoPlus Security 🚦 GoPlus Security 🚦 @GoPlusSecurity ·
🛡️OpenClaw Accidentally Hacks Itself?!” — When using 🦞#OpenClaw for software development or testing, beware of AI misoperations that may lead to secret key leaks! In this incident, OpenClaw used a system tool (calling exec to run Shell commands) to create a GitHub Issue, but it constructed an incorrect Bash command. This caused OpenClaw to unintentionally perform a Bash injection attack on its own host device, resulting in over 100 lines of highly sensitive environment variables (including Telegram keys, authentication tokens, etc.) being directly inserted into the GitHub Issue content and publicly published. Details: 1. AI generated a string wrapped in double quotes "" intended for GitHub. 2. The string contained a word wrapped in backticks: `set`, which Bash interprets as a “command substitution.” As a result, Bash didn’t treat set as plain text but executed it silently as a subcommand. 3. In Bash, running set with no arguments prints all current environment variables. 4. OpenClaw executed set, and over 100 lines of core environment variables were concatenated into the GitHub Issue text and publicly posted. #GoPlusSecurity Recommendations: -Prefer API calls instead of letting AI directly build Shell commands. -Apply the principle of “least privilege” and strictly isolate environment variables. -Disable dangerous execution modes and ensure proper escaping/filters. -Introduce human-in-the-loop verification for critical operations. Further readingsubstack.com/home/post/p-18…ya
11
CryptoJournaal🥇
CryptoJournaal🥇 @CryptoJournaal ·
#GoPlusSecurity ( $GPS ) - #Uitleg 💡 Wat is GoPlusSecurity ( $GPS )? GoPlus Security is een toonaangevend Web3 security infrastructure project dat een gedecentraliseerde beveiligingslaag biedt voor gebruikers, wallets, DeFi-protocollen en blockchains. Het richt zich ope, risico-analyse en bescherming van transacties in de blockchain-wereld, met als doel om beveiliging voor iedereen in Web3 toegankelijk te maken en dreigingen zoals phishing, rug pulls en malafide contracts te bestrijden. Het project positioneert zichzelf als een “security layer” voor Web3 — vergelijkbaar met hoe Chainlink oracles is voor data-feeds, maar dan voor risico- en veiligheidsdata. GoPlus heeft een ecosysteem gebouwd met tools en services die bescherming bieden voor miljoenen wallets en miljarden transacties. Het native token $GPS staat centraal binnen dit ecosysteem en wordt gebruikt voor betalingen van security services, staking, governance en als incentive voor bijdragers van security data. #CryptoEcosysteem ⚙️ Hoe werkt GoPlusSecurity? Het ecosysteem van GoPlus bestaat uit meerdere producten en oplossingen die samenwerken om blockchain-beveiliging te leveren: 🔸 GoPlus App Een persoonlijke security hub (beschikbaar als browser-extension en mobiele app) met wallet scans, transaction simulation en real-time alerts die gebruikers waarschuwt voor risico’s bij inkomende transacties of interacties met slimme contracts. 🔸 Security APIs AI-gedreven tools en API’s die projecten, wallets en chains integreren om risico’s te detecteren, zoals malafide token contracts, NFT-fraude en verdachte addresses. 🔸 GoPlus Security Module (GSM) Een chain-native security layer — een on-chain firewall die rechtstreeks in blockchains kan worden geïntegreerd om beveiligingsregels en risico-analyses uit te voeren binnen transactiestromen van protocollen en nodes. 🔸 SecWares & SecNet Een gedecentraliseerd netwerk van node operators en data providers die security-intelligence leveren aan het ecosysteem, waardoor real-time data over dreigingen en risico’s beschikbaar komt. #BlockchainInnovatie 🪙 De rol van $GPS Het $GPS-token vervult meerdere belangrijke functies binnen het GoPlus-ecosysteem: 🔸 Betalingen $GPS wordt gebruikt om te betalen voor security-services, API-calls en geavanceerde analyses binnen het netwerk. 🔸 Staking Node operators, data providers en AVS-operators kunnen $GPS staken om rewards te verdienen en bij te dragen aan de veiligheid en stabiliteit van het netwerk. 🔸 Governance Tokenhouders kunnen via het Governance Portal stemmen over voorstellen, verbeteringen en strategieën voor het ecosysteem. 🔸 Incentives Bijdragers aan security data, alerts en node-activiteiten worden beloond in $GPS, wat adoptie en netwerkparticipatie stimuleert. #Tokenomics 🛠️ Belangrijke kenmerken: 🔸 Totale supply: 10 miljard $GPS 🔸 Circulating supply: Ongeveer 44% van de totale voorraad 🔸 Gebruik: Betalingen voor security-services, staking, governance en incentives binnen het ecosysteem 🔸 Vesting: Team en early investors hebben vesting-schema’s met cliff-periodes en lineaire unlocks om langdurige betrokkenheid te bevorderen 🔸 Incentives: Een substantieel deel van de tokenomics is gereserveerd voor community, ecosystem en beloningen voor bijdragen aan security data #BlockchainVooruitgang 📜 Geschiedenis en ontwikkeling: De ontwikkeling van GoPlusSecurity toont een gefaseerde uitrol van beveiligingsproducten en netwerktools: 2023: Begin van real-time security alerts en app ontwikkeling 2024: Lancering van gedecentraliseerde security layer tools en eerste API-integraties 2025: Officiële token launch van $GPS, staking-mechanismen en governance portal 2026: Verdere uitrol van GSM op meerdere chains en schaalvergroting van SecNet Het team blijft zich richten op innovatie en uitbreiding van beveiligings-infrastructuur voor Web3, met een focus op gedecentraliseerde participatie en AI-gebaseerde risico-analyse. #CryptoGeschiedenis 💸 Markt en gebruikersinformatie: GoPlus Security richt zich op zowel individuele gebruikers als institutionele projecten die behoefte hebben aan realtime beveiligingsoplossingen. De GoPlus App beschermt miljoenen wallets en analyseert dagelijks enorme aantallen transacties om risico’s vroegtijdig te signaleren. #Marktanalyse ✅ Voordelen van GoPlusSecurity: 🔸 Sterke focus op real-time beveiliging en risico-detectie 🔸 Gedecentraliseerd netwerk van data providers en node operators 🔸 Multi-chain ondersteuning voor beveiligingsservices 🔸 Incentives die bijdragen aan netwerkparticipatie 🔸 Governance mechanisme voor community-sturing #DeFiToepassingen ⚠️ Uitdagingen en risico’s: 🔸 Sterke concurrentie van andere security- en risico-analyseprojecten 🔸 Complexiteit van integratie met protocollen en chains 🔸 Afhankelijkheid van brede adoptie voor maximale effectiviteit 🔸 Volatiliteit en onzekerheden in de cryptomarkt kunnen groei beïnvloeden #CryptoUitdagingen 🛠️ Toepassingen en adoptie: De use-cases van GoPlusSecurity zijn breed en praktijkgericht: 🔸 Wallet bescherming: Bescherming van gebruikers tegen scams en malafide interacties 🔸 Protocol integraties: Integratie van security APIs in DeFi-protocollen voor risico-monitoring 🔸 Chain integraties: On-chain beveiligingslaag via GSM voor meerdere blockchains 🔸 Decentralized Security Networks: Samenwerking tussen node operators voor continue threat intelligence #DeFiAdoptie 📊 Koers en marktprestaties: Hoewel prijsbewegingen vaak het middelpunt zijn van aandacht binnen crypto, ligt de kernwaarde van GoPlusSecurity in de securiteitsinfrastructuur die het biedt, de adoptie door wallets en projecten, en de groei van het netwerk van beveiligingsbijdragers. #MarktVolatiliteit 🔮 Toekomstperspectief: De toekomst van GoPlusSecurity richt zich op verdere decentralisatie, meer chain-integraties, uitbreiding van SecNet en de verbetering van AI-gebaseerde risico-analyse tools. Kernpunten voor groei zijn: 🔸 Verdere uitrol van GSM op 30+ chains 🔸 Schaalvergroting van node-netwerk en data-bijdragers 🔸 Strategische partnerships met wallets en DeFi-protocollen 🔸 Verhoogde adoptie van security-services in de bredere Web3-ruimte #DeFiToekomst 🎯 Conclusie: GoPlusSecurity ( $GPS ) is een innovatief Web3-securityproject dat zich richt op het bieden van een gedecentraliseerde beveiligingslaag voor users, wallets, protocollen en chains. Met producten zoals de GoPlus App, security APIs en de GoPlus Security Module, ondersteunt het ecosysteem real-time bescherming en risico-detectie. Het project combineert technologische innovatie met community-participatie en biedt incentives voor bijdragers aan security data en netwerkactiviteiten. Terwijl adoptie en concurrentie uitdagingen blijven, positioneert GoPlusSecurity zich als een belangrijke speler in de Web3-securityruimtaltcoinpedia.notion.site/goplus-securit…� #Click2DYOR 👇 https://t.co/TP8XFKmaSu ───────────────────────── 📚 1Click2DYOR – Doe zelf je huiswerk! ───────────────────────── Wil je dieper graven in je favoriete altcoin? Op onze AltcoinPedia Notion-pagina vind je alles wat je nodig hebt: 🔸 Actuele roadmap (NL & EN) 🔸 Exchanges waar hij genoteerd staat 🔸 Fundamentele informatie (tokenomics, team, use-case) 🔸 Gedetailleerde explainer (NL & EN) 🔸 Officiële links (website, whitepaper, socials) 🔸altcoinpedia.notion.site uitgelegd + roadmaps 👉 https://t.co/V2lz8hAgp1 👈 ───────────────── ⚠️ Belangrijke opmerking: ───────────────── 🔹 Deze post is puur bedoeld voor educatieve doeleinden en vormt **geen financieel advies** of investeringsaanbeveling. 🔹 Doe altijd je eigen onderzoek voordat je investeert in cryptovaluta. 🔹 Cryptovaluta's zijn zeer volatiel – investeer alleen geld dat je bereid bent te verliezen. ────────── 👇Volg ons👇 ────────── 🚨 Volg @CryptoJournaal – dé plek voor onafhankelijke crypto-informatie: 📰 Nieuws | 📊 Feiten | 🧠 Achtergronden | 🎓 Educatie 💬 Geen gesponsorde tokens ❌ Geen betaalde advertenties 📜 Volledig MiCAR-compliant 🔍 Altijd kennis boven hyt.me/+rzO9yxnGyUxhZ…it je aan via: ──────────── 💬 Telegram: hx.com/i/communities/… 👥 CryptoJournx.com/CryptoJournaality: https://t.co/3yFdzLLS2O � X-profiel: https://t.co/fd2bI2MInh #CryptoJournaal #AltcoinPedia #CryptoNieuws #CryptoEducatie #CryptoKoersen
104
CryptoJournaal🥇
CryptoJournaal🥇 @CryptoJournaal ·
#GoPlusSecurity ( $GPS ) - #Explainer 💡 What is GoPlusSecurity ( $GPS )? GoPlus Security is a leading Web3 security infrastructure project that provides a decentralized security layer for users, wallets, DeFi protocols, and blockchains. It focuses on real-time scam detection,nsaction protection across the blockchain ecosystem, aiming to make Web3 security accessible to everyone while combating threats such as phishing, rug pulls, and malicious smart contracts. The project positions itself as the “security layer” of Web3 — similar to how Chainlink serves as an oracle layer for data, but instead focused on risk and security intelligence. GoPlus has built an ecosystem of tools and services that protect millions of wallets and secure billions of blockchain transactions. The native token $GPS is central to this ecosystem and is used for security service payments, staking, governance, and incentivizing contributors who provide security data. #CryptoEcosystem ⚙️ How does GoPlusSecurity work? The GoPlus ecosystem consists of multiple products and solutions that work together to deliver comprehensive blockchain security: 🔸 GoPlus App A personal security hub (available as a browser extension and mobile app) offering wallet scans, transaction simulation, and real-time alerts that warn users about potential risks before interacting with smart contracts or transactions. 🔸 Security APIs AI-powered tools and APIs integrated by projects, wallets, and chains to detect risks such as malicious token contracts, NFT fraud, and suspicious addresses. 🔸 GoPlus Security Module (GSM) A chain-native security layer — effectively an on-chain firewall — that can be directly integrated into blockchains to enforce security rules and perform risk analysis within transaction flows. 🔸 SecWares & SecNet A decentralized network of node operators and data providers who contribute real-time security intelligence, enabling continuous threat detection across the ecosystem. #BlockchainInnovation 🪙 The role of $GPS The $GPS token serves multiple core functions within the GoPlus ecosystem: 🔸 Payments $GPS is used to pay for security services, API usage, and advanced risk analysis tools within the network. 🔸 Staking Node operators, data providers, and AVS operators stake $GPS to earn rewards while contributing to the security and reliability of the network. 🔸 Governance Token holders participate in governance through the Governance Portal, voting on proposals, upgrades, and ecosystem strategies. 🔸 Incentives Contributors who provide security data, alerts, and node services are rewarded in $GPS, encouraging active participation and network growth. #Tokenomics 🛠️ Key characteristics: 🔸 Total supply: 10 billion $GPS 🔸 Circulating supply: Approximately 44% of the total supply 🔸 Utility: Payments for security services, staking, governance, and ecosystem incentives 🔸 Vesting: Team and early investors follow vesting schedules with cliff periods and linear unlocks to ensure long-term alignment 🔸 Incentives: A significant portion of the supply is allocated to community growth, ecosystem development, and rewards for security data contributors #BlockchainProgress 📜 History and development: The evolution of GoPlusSecurity reflects a phased rollout of security products and decentralized infrastructure: 2023: Introduction of real-time security alerts and early app development 2024: Launch of decentralized security tools and initial API integrations 2025: Official $GPS token launch, activation of staking mechanisms, and release of the Governance Portal 2026: Expansion of GSM across multiple blockchains and scaling of the SecNet node network The team continues to focus on innovation and the expansion of decentralized security infrastructure for Web3, with strong emphasis on AI-driven risk analysis and decentralization. #CryptoHistory 💸 Market and user information: GoPlus Security serves both individual users and institutional projects requiring real-time security solutions. The GoPlus App protects millions of wallets and processes large volumes of transactions daily to identify risks before damage occurs. #MarketAnalysis ✅ Advantages of GoPlusSecurity: 🔸 Strong focus on real-time security and risk detection 🔸 Decentralized network of data providers and node operators 🔸 Multi-chain support for security services 🔸 Incentive-driven participation model 🔸 Community-based governance structure #DeFiApplications ⚠️ Challenges and risks: 🔸 Intense competition from other blockchain security and risk analysis projects 🔸 Technical complexity of integrating with protocols and blockchains 🔸 Dependence on broad adoption for maximum effectiveness 🔸 Market uncertainty and volatility may impact growth #CryptoChallenges 🛠️ Use cases and adoption: GoPlusSecurity offers a wide range of practical use cases: 🔸 Wallet protection: Safeguarding users against scams and malicious interactions 🔸 Protocol integrations: Embedding security APIs into DeFi protocols for risk monitoring 🔸 Chain integrations: Providing on-chain security via GSM across multiple blockchains 🔸 Decentralized security networks: Collaborative threat intelligence through node operators and data providers #DeFiAdoption 📊 Network value and adoption: While market speculation often focuses on price action, the core value of GoPlusSecurity lies in its security infrastructure, adoption by wallets and protocols, and the growing network of contributors supplying real-time threat intelligence. #MarketVolatility 🔮 Future outlook: The future of GoPlusSecurity centers on deeper decentralization, expanded chain integrations, growth of the SecNet network, and continuous improvement of AI-driven security tools. Key growth drivers include: 🔸 Expansion of GSM to 30+ blockchains 🔸 Scaling of the node operator and data provider network 🔸 Strategic partnerships with wallets and DeFi protocols 🔸 Increasing demand for security solutions across Web3 #DeFiFuture 🎯 Conclusion: GoPlusSecurity ( $GPS ) is an innovative Web3 security project focused on delivering a decentralized security layer for users, wallets, protocols, and blockchains. Through products like the GoPlus App, Security APIs, and the GoPlus Security Module, the ecosystem enables real-time protection and risk detection. By combining advanced technology with community-driven participation and incentive mechanisms, GoPlusSecurity positions itself as a critical infrastructure provider within Web3 security. While adoption and competition remain challenges, the project continues to strengthen its role as a foundational security layer for the decentralized internetaltcoinpedia.notion.site/goplus-securit…� #Click2DYOR 👇 https://t.co/TP8XFKmaSu ──────────────────────────── 📚 1Click2DYOR – Do your own homework! ──────────────────────────── Do you want to dig deeper into your favorite altcoin? On our AltcoinPedia Notion page, you’ll find everything you need: 🔸 Current roadmap (NL & EN) 🔸 Exchanges where it is listed 🔸 Fundamental information (tokenomics, team, use-case) 🔸 Detailed explainer (NL & EN) 🔸 Official links (website, whitepaper, socials) altcoinpedia.notion.site explained + roadmaps 👉 https://t.co/V2lz8hAgp1 👈 ───────────── ⚠️ Important note: ───────────── 🔹 This post is purely for educational purposes and does not constitute financial advice or an investment recommendation. 🔹 Always do your own research before investing in cryptocurrencies. 🔹 Cryptocurrencies are highly volatile – only invest money you are willing to lose. ────────── 👇Follow us👇 ────────── 🚨 Follow @CryptoJournaal – the place for independent crypto information: 📰 News | 📊 Facts | 🧠 Backgrounds | 🎓 Education 💬 No sponsored tokens ❌ No paid advertisements 📜 Fully MiCAR-compliant 🔍 Always kt.me/+rzO9yxnGyUxhZ…───── 📲 Join via: ──────── 💬 Telegram: hx.com/i/communities/… 👥 CryptoJournx.com/CryptoJournaality: https://t.co/3yFdzLLS2O � X-profile: https://t.co/fd2bI2MInh #CryptoJournaal #AltcoinPedia #CryptoNews #CryptoEducation #CryptoPrices
93
puputsea
puputsea @pgelaut ·
🚀 $GPS가 이제 🇰🇷 빗썸(Bithumb)에 상장되었습니다! 🎉 한국 Web3 커뮤니티 여러분, 함께 응원합시다! 💪 GoPlus의 보안 솔루션이 한국 유저들에게도 더 가깝게 다가가는 중요한 발걸음입니다. 앞으로의 성장 기대합니다! 🙌 #GoPlusSecurity #GPS #Bithumb #가상자산상장
GoPlus Security 🚦 GoPlus Security 🚦 @GoPlusSecurity ·
🚀 $GPS is now live on Bithumb🇰🇷 To celebrate, we’re kicking off a Korean QT Campaign! Calling all Korea Web3 frens — QT in Korean to show your support and split a 200U reward pool 🔥 ⏰ Deadline: March 6, 4:00 PM (UTC) 🎁 Rewards: 20 winners × 10U each 📝 How to partici+ comment to join the random comment giveaway. 2️⃣ Submit the tweet link + wallet address via the form 🔗forms.gle/Pa3vixRkChejJt…35xh0mO Let’s show some love for #GoPlus #GPS on @BithumbOfficial 🇰🇷🔥
8
Gilang atmajaya
Gilang atmajaya @AtmajayaGilang ·
🚀 $GPS가 국내 최대 거래소 중 하나인 비썸(Bithumb)에 상장되었습니다! 🇰🇷 GoPlus Security 공식 발표에 따르면 이제 GPS/KRW 마켓이 정식으로 오픈되었고, 한국 거래자들도 원화로 직접 $GPS를 거래할 수 있게 되었습니다. 📈 #GPS #GoPlusSecurity #Bithumb 상장은 프로젝트 접근성과 유동성에 큰 의미가 있다고 봅니다!
GoPlus Security 🚦 GoPlus Security 🚦 @GoPlusSecurity ·
🚀 $GPS is now live on Bithumb🇰🇷 To celebrate, we’re kicking off a Korean QT Campaign! Calling all Korea Web3 frens — QT in Korean to show your support and split a 200U reward pool 🔥 ⏰ Deadline: March 6, 4:00 PM (UTC) 🎁 Rewards: 20 winners × 10U each 📝 How to partici+ comment to join the random comment giveaway. 2️⃣ Submit the tweet link + wallet address via the form 🔗forms.gle/Pa3vixRkChejJt…35xh0mO Let’s show some love for #GoPlus #GPS on @BithumbOfficial 🇰🇷🔥
62
Sirk
Sirk @SirkError404 ·
🚨 Safety first! Protect your devices: Update #Chrome to v143.0.7499.192+ to patch the #Gemini panel vulnerability (CVE-2026-0628). Don’t let malicious extensions access your camera, mic, or files. Stay secure! 💻🔒 #GoPlusSecurity@GoPlus@ZH @GoPlusSecurity
GoPlus Security 🚦 GoPlus Security 🚦 @GoPlusSecurity ·
🚨 GoPlus Security Alert: A #Chrome browser vulnerability allows malicious extensions to escalate privileges via the #Gemini panel. Please upgrade Chrome to version 143.0.7499.192 or later immediately. This vulnerability allows malicious extensions to control the Gemini Live panel in the Chrome browser and escalate privileges, enabling access to the camera and microphone, capturing screenshots, and accessing local files without user permission. The vulnerability is tracked as CVE-2026-0628. Google patched the issue in early January 2026 in Windows/Mac versions 143.0.7499.192/.193 and Linux version 143.0.7499.192. Please check your Chrome version and update immediately. Source �thehackernews.com/2026/03/new-ch…Rc
New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

Chrome CVE-2026-0628 let malicious extensions hijack Gemini panel for privilege escalation, local file access, and surveillance.

From thehackernews.com
62
Sirk
Sirk @SirkError404 ·
AI isn’t just for productivity malware like #PromptSpy shows it can make attacks smarter and stealthier. Stay safe: never install unknown APKs, be careful with permissions, and keep Google Play Protect on. #GoPlusSecurity 🚨 @GoPlusSecurity@GoPlusZH
GoPlus Security 🚦 GoPlus Security 🚦 @GoPlusSecurity ·
🚨 Beware of the malicious Android malware #PromptSpy capable of remotely controlling devices PromptSpy is an Android malware whose primary objective is to remotely control victims’ devices. It leverages AI to make real-time malicious behavior decisions, increasing stealth and attack accuracy. Attack flow overview: Phishing website distribution: By impersonating banking websites (such as fake Chase Bank pages), it lures users into downloading and installing an APK (not available on Google Play). Dropper stage: Requests permission to install “apps from unknown sources,” then induces users to install the second-stage payload (the PromptSpy core). Privilege escalation: Requests enabling Accessibility Service to obtain screen-reading and automated interaction capabilities. AI-driven persistence: Calls the Google Gemini API, analyzes the current UI XML structure of the user’s device, and performs remote control and malicious actions. How AI is used: Instead of hardcoding malicious operation logic, it captures the current screen’s XML structure (including text, element positions, types, etc.) and sends it to Gemini. Gemini then returns operation instructions which are executed. Essentially, this outsources the “decision-making logic” to a large model. Advantages of using AI: It can better adapt to different phone brands and Android versions, better adapt to different UIs, and does not rely on hardcoded logic, improving flexibility and coverage of the attack. #GoPlus Security recommendations: 1. Never install APKs from unknown sources 2. Be cautious when granting Accessibility permissions 3. Enable Google Play Protect
47