⚠️【Script Security Warning】 Exposing a developer who steals private keys @web3_cryptoguy The reason is that someone in the script group mentioned a hacker's GitHub repository today. This person has long disguised himself as a Web3 "tool author," writing scripts for a bunch of popular projects, such as @boundless_xyz, @fortytwonetwork, etc. In his fortytwo script link, it can be found that this script quietly scans local sensitive files, including: - Private keys .key/.keystore - Wallets .wallet - Configurations .env/.toml/.conf - JSON files, code, mnemonics, etc. This data will be secretly uploaded to anonymous servers, and you will hardly notice the whole process. What's even more outrageous is that this hacker has already been exposed before, but has recently become active again. We must expose this heavily while reminding everyone not to casually run scripts from unknown sources. It's best to first throw it to AI or security tools to review the code. The tweet indeed matches his behavior, just waiting to steal others' coins.
21.13K