Skip to main content

58 posts tagged with "Security"

Cybersecurity, smart contract audits, and best practices

View all tags

Gondi's $230K NFT Lending Exploit: How a Missing Caller Check Drained 78 Blue-Chip NFTs

· 7 min read
Dora Noda
Software Engineer

A single missing authorization check. Seventeen days undetected. Seventy-eight blue-chip NFTs — including Art Blocks, Doodles, and Beeple pieces — siphoned from wallets that never initiated a transaction. The Gondi exploit of March 9, 2026 is a masterclass in how "convenience features" can become attack surfaces, and why the NFT lending sector faces security challenges that fungible-token DeFi never had to confront.

The $50M AAVE Swap Disaster: When DeFi 'Working as Designed' Costs a Whale Everything

· 10 min read
Dora Noda
Software Engineer

On March 12, 2026, a single Ethereum transaction turned $50.4 million in USDT into 327 AAVE tokens worth roughly $36,000. The loss was not caused by a hack, an exploit, or a smart contract bug. Every protocol involved — Aave, CoW Swap, SushiSwap — functioned exactly as designed. The user confirmed a 99.9% price impact warning on a mobile device, checked a box, and watched nearly fifty million dollars evaporate into MEV bots in under thirty seconds.

This incident is the most expensive UX failure in DeFi history, and it forces an uncomfortable question: if permissionless systems "working as designed" can destroy this much value, who is responsible for preventing it?

The $128M Rounding Error: How a Sub-Penny Math Bug Drained DeFi's Oldest AMM Across Nine Chains

· 10 min read
Dora Noda
Software Engineer

Eight wei. That is roughly 0.000000000000000008 of a token — a quantity so small it has no meaningful dollar value. Yet on November 3, 2025, an attacker turned rounding errors at that scale into $128 million in stolen assets, draining Balancer's Composable Stable Pools across nine blockchains in under thirty minutes.

The Balancer V2 exploit is now the largest single-vulnerability, multi-chain DeFi exploit in history. It wiped 52% of Balancer's total value locked overnight, survived more than ten security audits by the industry's top firms, and forced one chain — Berachain — to execute an emergency hard fork just to claw back funds. The vulnerability? A single line of code that rounded in the wrong direction.

CrossCurve's $3M Bridge Exploit: How One Missing Validation Check Drained a Multi-Chain Protocol in Minutes

· 8 min read
Dora Noda
Software Engineer

It took less than an hour. On January 31, 2026, an attacker discovered that a single smart contract function on CrossCurve's bridge infrastructure lacked a critical validation check — and systematically drained $3 million across Ethereum, Arbitrum, and other networks before anyone could react. No sophisticated zero-day. No insider key compromise. Just a fabricated message and a function call that anyone on the blockchain could make.

The CrossCurve incident is a stark reminder that cross-chain bridges remain the most dangerous attack surface in decentralized finance — and that even protocols boasting multi-layered security architectures can collapse when a single contract falls through the cracks.

Google Cloud's MCP Web3 Security Framework: How to Keep AI Agents from Draining Your Wallet

· 8 min read
Dora Noda
Software Engineer

AI agents that can autonomously trade tokens, rebalance DeFi positions, and pay for their own compute sound revolutionary — until one gets prompt-injected into sending your life savings to an attacker. Google Cloud's newly published MCP Web3 security framework tackles exactly this nightmare, laying out an enterprise-grade blueprint for securing Model Context Protocol agents that interact with blockchains.

Here is what the framework recommends, why it matters, and how it stacks up against competing approaches from Coinbase, Ledger, and the emerging x402 payment standard.

Venus Protocol's $3.7M Heist: How a Nine-Month Plot Exploited a Known Vulnerability on BNB Chain

· 8 min read
Dora Noda
Software Engineer

A security audit flagged the exact attack vector months earlier. The team dismissed it. On Sunday, an attacker walked away with $3.7 million.

Venus Protocol, the dominant lending platform on BNB Chain with roughly $1.47 billion in total value locked, suffered a devastating price manipulation exploit on March 15, 2026. The attacker targeted THE — the native token of decentralized exchange Thena — inflating its price from $0.27 to nearly $5 through a carefully orchestrated loop of deposits, borrows, and purchases. The result: over $3.7 million drained in BTC, CAKE, USDC, and BNB, with approximately $2.15 million persisting as unrecoverable bad debt.

What makes this attack remarkable is not just its scale, but the patience behind it — and the fact that the vulnerability was hiding in plain sight.

Multi-Agent Trust Architecture: How TEE-Backed Wallets Solve the 'Autonomous Agent Can't Be Trusted' Problem

· 9 min read
Dora Noda
Software Engineer

Every week in 2026, another startup announces an "autonomous AI agent" that can trade crypto, manage DeFi positions, or govern DAOs. But here is the question nobody wants to answer: why should anyone trust a piece of software with real money?

The industry's answer is converging on a surprisingly elegant stack — Trusted Execution Environments (TEEs), on-chain identity registries, and programmable guardrails — that turns "trust the agent" into "verify the agent." In the span of three months, Coinbase shipped Agentic Wallets, MoonPay integrated Ledger hardware signing for AI agents, and the Ethereum Foundation ratified two new standards (ERC-8004 and ERC-8183) that together form the skeleton of a machine-native trust layer. This article maps the architecture that is quietly making autonomous agents bankable.

From 'Code Is Law' to 'Spec Is Law': How Formal Verification Could End DeFi's $3.4 Billion Exploit Crisis

· 9 min read
Dora Noda
Software Engineer

A single rounding error — a sub-penny precision loss in Solidity's integer division — drained $128 million from Balancer across nine blockchains in under 30 minutes. The pools had been live for years. Multiple audits had reviewed the code. Nobody caught it. This is the state of DeFi security in 2026: billions of dollars protected by a paradigm that has demonstrably, repeatedly failed.

Now a16z crypto is proposing a radical rethink. In their 2026 "Big Ideas" report, the venture firm argues that the industry must abandon "code is law" — the foundational belief that deployed smart contract code is the ultimate authority — and replace it with "spec is law," where mathematically defined safety properties become the enforceable standard. The shift could fundamentally reshape how protocols are built, audited, and defended.

AI Agents and the Future of Crypto Wallet Security: MoonPay's Ledger Integration

· 9 min read
Dora Noda
Software Engineer

Every AI agent needs a wallet. But who holds the keys?

On March 13, 2026, MoonPay answered that question by launching the first AI agent platform secured by a Ledger hardware signer — a move that forces every transaction through a physical device where private keys never touch the internet. In a market where 60–80% of global crypto trading volume is already AI-driven and autonomous agents manage billions in assets, MoonPay's bet is that the winning architecture isn't the one that moves fastest, but the one that humans still trust.

The Key Problem Nobody Solved

The crypto AI agent explosion of 2025–2026 created a paradox. Autonomous agents need wallet access to trade, bridge, stake, and pay for services. But wallet access means key access — and key access means trusting software with everything you own.

Before MoonPay's Ledger integration, the industry offered two imperfect options:

  • Full autonomy, zero security. Give the agent your private key or seed phrase. It can act instantly, but a single vulnerability — a prompt injection, a compromised dependency, a rogue API call — drains the wallet. In February 2026, supply chain attacks targeting dYdX through compromised npm and Python packages, linked to the Lazarus Group, demonstrated how real this threat is.

  • Full security, zero autonomy. Keep keys locked in cold storage and approve every transaction manually. Safe, but it defeats the purpose of autonomous agents entirely. You become the bottleneck in a system designed to operate at machine speed.

MoonPay's Ledger integration introduces a third path: autonomous strategy, human-verified execution. The AI agent handles research, portfolio analysis, swap routing, and trade construction. But every on-chain transaction must be physically confirmed on a Ledger device before it executes. The agent is the brain; the hardware wallet is the lock.

How It Actually Works

MoonPay Agents, initially released on February 24, 2026 as a command-line interface (CLI) tool, lets AI agents manage wallets, execute trades, and transact across multiple blockchains. The March 13 update adds native Ledger signer support, making it the first CLI wallet with this integration.

The technical flow is straightforward:

  1. Connect any Ledger signer (Nano S Plus, Nano X, Gen5, Stax, or Flex) via USB to the MoonPay CLI
  2. The agent automatically detects wallets across all supported networks — Ethereum, Solana, Base, Arbitrum, Polygon, Optimism, BNB Chain, and Avalanche
  3. The AI agent constructs transactions based on its strategy logic
  4. Each transaction is routed to the Ledger device for physical verification and signing
  5. Only after the user confirms on the hardware device does the transaction broadcast

The critical security property: private keys are generated and stored inside the Ledger's secure element chip. They never leave the device, never touch the host computer's memory, and never enter the AI agent's execution environment. The agent can propose any action, but it cannot execute without human approval.

Available now in MoonPay CLI version 0.12.3 at moonpay.com/agents.

The Agent Security Spectrum

MoonPay's approach sits at one end of a security spectrum that the crypto industry is rapidly defining. Each major player has staked out a different position, and the tradeoffs reveal fundamentally different visions for how humans and AI agents should interact.

Coinbase Agentic Wallets: Hosted Custody with Guardrails

Coinbase launched its Agentic Wallets in February 2026, built on multi-party computation (MPC). Every action is signed by the agent using MPC and recorded on-chain on Ethereum or Base. Creators retain an emergency administrative key that can freeze or recover funds if malicious behavior is detected.

The model prioritizes programmability. Developers set spending limits, whitelisted contract interactions, and automated guardrails. The agent operates within defined boundaries without needing transaction-by-transaction human approval. It's closer to giving an employee a corporate card with spending limits than requiring a manager's signature on every purchase.

Tradeoff: Keys are managed in Coinbase's hosted infrastructure, not on a physical device the user controls. This is convenient for developers building autonomous systems but requires trusting Coinbase's custodial infrastructure.

x402 Protocol: Fully Autonomous Machine Payments

At the opposite extreme, Coinbase's x402 protocol enables fully autonomous machine-to-machine payments with no human in the loop at all. Built directly into the HTTP layer, x402 lets AI agents pay for API calls, compute credits, and data access automatically using USDC on Base.

Alchemy integrated x402 in February 2026, creating a flow where an AI agent independently purchases compute credits and accesses blockchain data without any human intervention. The protocol has processed over 50 million transactions in testing, though daily real-world volume remains modest at roughly $28,000 — a sign that the infrastructure is ahead of adoption.

Tradeoff: Maximum speed and automation, but zero human oversight per transaction. Suitable for micropayments and API access, but risky for large trades or portfolio management.

MetaMask: Session Keys and Scoped Access

MetaMask's approach uses session keys — temporary, scoped permissions that allow AI agents to perform specific actions while users retain full custody. Think of it as giving a valet your car key but programming it so it can only drive below 25 mph and can't open the trunk.

Tradeoff: More granular than MoonPay's all-or-nothing Ledger approval, but session keys are software-based, making them vulnerable to the same class of attacks that hardware wallets are designed to prevent.

Where MoonPay Fits

MoonPay's Ledger integration occupies the maximum-security end of the spectrum. No transaction executes without a physical button press. This makes it the slowest option for high-frequency trading but the most resistant to software-based attacks, agent compromise, and unauthorized transactions.

As Ledger's chief experience officer noted: "There is a new wave of CLI and agent-centric wallets emerging, and these will need Ledger security as a feature, too."

The $30 Trillion Question

The stakes are enormous. The agentic economy is projected to grow to $30 trillion by 2030, according to industry estimates. Microsoft reported in February 2026 that more than 80% of Fortune 500 companies now use active AI agents. In crypto specifically, over 550 AI agent projects exist with a combined market cap exceeding $4.3 billion, and AI quant funds reported average returns of 52% in 2025 while 84% of retail traders lost money.

The question isn't whether AI agents will manage crypto portfolios — they already do. The question is what security architecture becomes the institutional standard.

Three models are competing:

  1. Hardware-in-the-loop (MoonPay + Ledger): Maximum security, human approval required, slower execution
  2. Hosted MPC with guardrails (Coinbase): Programmable boundaries, developer-friendly, custodial trust required
  3. Fully autonomous (x402, Alchemy): Maximum speed, zero friction, suitable only for low-value transactions

For retail users managing personal portfolios, hardware-in-the-loop may be ideal — the latency of pressing a button on a Ledger is irrelevant when you're making a few trades per day. For institutional quantitative strategies executing thousands of trades per second, it's a non-starter. For machine-to-machine micropayments, full autonomy is the only viable path.

The likely outcome isn't a single winner but a layered security stack. AI agents will use fully autonomous payments for sub-dollar API calls, MPC-secured wallets with spending limits for mid-range operations, and hardware-signed authorization for high-value transactions — the same way humans use tap-to-pay for coffee, a PIN for groceries, and a notary for real estate.

What This Means for Builders

MoonPay's move signals that the AI agent infrastructure war is entering its security-differentiation phase. The first wave was about capability — can agents trade, bridge, and swap? That's solved. The second wave is about trust — can users and institutions deploy agents without risking catastrophic loss?

For developers building on-chain AI agents, the practical takeaways are:

  • Security architecture is now a product differentiator. Users will choose agent platforms based on how keys are managed, not just what strategies agents can execute.

  • Multi-tier security is inevitable. No single model serves all use cases. Build with pluggable key management that can support hardware signers, MPC, and session keys depending on transaction value and risk profile.

  • Regulatory scrutiny is coming. As AI agents manage larger portfolios, regulators will ask who is responsible when an agent makes unauthorized trades. Hardware-in-the-loop creates a clear audit trail: every transaction has a human-verified signature.

The Trust Inflection Point

MoonPay's Ledger integration isn't a breakthrough in AI capability — the agents themselves don't get smarter. It's a breakthrough in the trust infrastructure that determines whether those agents get deployed at scale.

The crypto industry spent a decade learning that "not your keys, not your coins" is more than a slogan — it's an engineering requirement validated by exchange hacks, custodial failures, and billions in losses. Now, as AI agents ask for the same key access that centralized exchanges demanded, the industry faces the same question again: who holds the keys?

MoonPay's answer — a physical device that requires human confirmation for every transaction — is the most conservative possible response to the most important question in autonomous finance. In a market racing toward full automation, that conservatism might be exactly what institutions need to participate.

The agent economy will be built. The only question is whether it's built on a foundation of speed or a foundation of trust. MoonPay is betting that trust wins.


BlockEden.xyz provides enterprise-grade RPC and API infrastructure across Ethereum, Solana, Base, and 20+ blockchain networks — the foundational layer that AI agents depend on for reliable on-chain data and transaction submission. As autonomous agents demand secure, high-availability infrastructure, explore our API marketplace to build on foundations designed for the agentic era.