News

AI Agents: A Crypto Vulnerability?

Source: cointelegraph.com

Published on May 26, 2025

Core topic: AI Agents in Crypto

Keywords: AI agents, crypto, security risks, MCP, data poisoning, JSON injection, attack vectors, trading bots, crypto wallets, proactive security, crypto funds, SlowMist, Fhenix, Secret Foundation

Main keywords: AI agents, crypto security, Model Context Protocol, data poisoning, JSON injection, attack vectors, crypto wallets, trading bots, security risks, MCP framework

Supporting n-grams: AI agents, crypto vulnerabilities, Model Context Protocol (MCP), security risks, attack vectors, data poisoning, JSON injection, cross-MCP call attack, plugin verification, crypto funds, proactive security

AI Agents in Crypto: Unveiling Security Risks

AI agents are rapidly becoming integral to the crypto ecosystem, automating tasks in wallets, trading bots, and on-chain assistants. However, their integration through the Model Context Protocol (MCP) introduces significant security risks that the industry is only beginning to recognize. These risks stem from the agents' flexibility, which also creates a large attack surface vulnerable to malicious exploitation.

According to VanEck, the number of AI agents in crypto surged to over 10,000 by the end of 2024 and is projected to reach 1 million in 2025. This exponential growth underscores the urgency of addressing the security challenges posed by these agents.

The Role of Model Context Protocol (MCP)

MCP acts as a control layer for AI agents, enabling them to manage behavior, select tools, and respond to user inputs. While this flexibility enhances functionality, it also exposes the system to potential attacks. Malicious plugins can manipulate commands, corrupt data, or trick agents into performing harmful actions. Security experts warn that these vulnerabilities could compromise crypto wallets, trading bots, and user funds.

Attack Vectors Identified by SlowMist

Security firm SlowMist has identified four primary attack vectors targeting MCP-based AI agents. These attacks exploit plugins to extend the agents' capabilities, such as retrieving price data or executing trades.

  • Data poisoning: This attack manipulates users by creating false dependencies and inserting malicious logic into the system.
  • JSON injection attack: This technique retrieves data from potentially malicious sources, leading to data leaks or command manipulation.
  • Competitive function override: This method replaces legitimate functions with malicious code, disrupting the system's logic.
  • Cross-MCP call attack: This plugin tricks AI agents into interacting with unverified external services, expanding the attack surface.

SlowMist's co-founder, "Monster Z," emphasizes that the poisoning of agents and MCPs often occurs during the model's interaction phase. He warns that the threat level of poisoning agents is higher than that of standalone AI poisoning, highlighting the need for robust security measures.

Real-World Vulnerabilities and Expert Insights

The use of MCP and AI agents in crypto is relatively new, and SlowMist's audits have already uncovered critical vulnerabilities. One audit revealed a flaw that could have led to private key leaks, underscoring the real-world risks. Guy Itzhaki, CEO of Fhenix, notes that opening systems to third-party plugins extends the attack surface beyond control, emphasizing the importance of secure plugin management.

Lisa Loud, executive director of Secret Foundation, stresses that security must be the top priority when building plugin-based systems in crypto. SlowMist's security experts recommend strict plugin verification, input sanitization, least privilege principles, and regular monitoring of agent behavior to mitigate risks.

Proactive Security Measures

As AI agents become more prevalent in crypto, proactive security is essential to protect wallets, funds, and data. Implementing strong security measures, such as those recommended by SlowMist, can help prevent AI agents from becoming attack vectors. While the MCP framework offers new capabilities, it requires vigilant security to safeguard the crypto ecosystem.

In conclusion, the integration of AI agents in crypto through MCP introduces both opportunities and risks. By understanding the attack vectors and implementing robust security measures, the industry can harness the benefits of AI agents while protecting against potential vulnerabilities.