A fake GitHub trading bot posing as a Solana tool has drained users' wallets.
The bot used hidden malicious code to steal private keys and send them to a hacker server.
SlowMist warns users to avoid trusting open-source tools with wallet access.
Beware! A new crypto scam is making the rounds and this time, it’s hiding in plain sight on GitHub.
Cybersecurity firm SlowMist has issued a warning after a user lost their crypto assets by downloading what looked like a legitimate Solana trading bot. The project, called “solana-pumpfun-bot”, claimed to help users trade tokens on Pump.fun, a popular platform in the Solana ecosystem. But instead, it drained the user’s wallet.
Here’s everything you need to know to stay safe.
Innocent Bot With a Dangerous Twist
The user downloaded the open-source bot from GitHub, ran it, and shortly after, their wallet was emptied. At first glance, the project looked normal. It had stars, forks, and even recent commits.
The project was a Node.js app that included a hidden dependency – a package linked from a custom GitHub URL instead of the official NPM registry. This let the malicious package bypass NPM’s security checks, making it harder to detect.
Once installed, the code scanned the victim’s system for wallet data and sent their private keys to a remote server controlled by the attacker.
- Also Read :
- Crypto Hacks in H1 2025 Exceed $2.2B
- ,
GitHub Popularity Was Faked to Build Trust
To make it look safe, the attacker used fake GitHub accounts to star and fork the project, giving it the appearance of being widely used. But according to SlowMist, the entire codebase had been uploaded just three weeks ago, which was a clear sign that something was off.
In a tweet, SlowMist explained:
“The perpetrator disguised a malicious program as a legit open-source project… users unknowingly ran a Node.js project with embedded malicious dependencies, exposing their private keys and losing assets.”
Important Warning for Devs and Traders
SlowMist has advised users to never blindly trust GitHub projects, especially those that require wallet access or deal with private keys. If you need to test tools like this, do it in a sandboxed environment and not with your real assets.
“If you must test them, do so in a sandboxed, isolated environment with no sensitive data,” the team warned.
Why This Matters
As more traders and developers rely on open-source tools in the crypto space, attacks like this are becoming harder to spot.
The takeaway is simple: if a GitHub project deals with your wallet, treat it like it’s high-risk!
Never Miss a Beat in the Crypto World!
Stay ahead with breaking news, expert analysis, and real-time updates on the latest trends in Bitcoin, altcoins, DeFi, NFTs, and more.
FAQs
To protect your crypto, always verify platforms, use reputable exchanges, enable two-factor authentication (2FA), and be skeptical of “too good to be true” returns or unsolicited offers. Store large amounts in secure hardware wallets, never share private keys, and be wary of phishing links.
Common red flags include promises of guaranteed high returns, pressure tactics to invest quickly, anonymous or unknown project teams, poorly written whitepapers, and demands for crypto payments for services or unexpected fees. Check for inconsistent website details, grammar errors, and lack of customer support numbers.
Scammers use various tactics, including creating fake websites or apps, “pig butchering” romance scams that build trust over time, pump-and-dump schemes, and impersonating legitimate companies or government agencies. AI is increasingly used to make these scams more sophisticated and convincing.