Saturday, June 7, 2025
tsboi.com
No Result
View All Result
  • Home
  • Tech News
  • Science
  • AI & Robotics
  • Cyber Security
  • Industries
  • Fintech
  • Social Media
  • Gaming
  • Transport
TSBOI
No Result
View All Result
Home Cyber Security

How AI coding agents could destroy open source software

tsboiAdmin by tsboiAdmin
June 2, 2025
in Cyber Security
319 3
0
How AI coding agents could destroy open source software
1k
SHARES
5.4k
VIEWS
Share on FacebookShare on Twitter


Advertisement Banner
cyberwolf

rob dobi/Getty Photos

A few weeks in the past, I had the chance to make use of Google’s Jules AI Agent to scan by means of your complete code repository of one among my initiatives and add a brand new function. The AI took about 10 minutes. All instructed, it took underneath half-hour to make use of the AI, evaluate its adjustments, and ship the new feature.

On the time, I used to be wildly impressed. The extra I’ve considered it, the extra anxious I’ve turn into.

Additionally: 96% of IT pros say AI agents are a security risk, but they’re deploying them anyway

It is turn into clear to me that the potential for malicious motion on the a part of enemy actors has turn into hyper-exponentially worse. That is some scary sh#t.

On this article, we’ll take a look at this in three components. We’ll talk about what might occur, the way it may occur, and methods we would have the ability to forestall it from occurring.

What might occur

Let’s begin with the concept that there might be a malicious AI educated with coding-agent capabilities. That AI might be fielded by an enemy actor, probably a rogue nation-state, or perhaps a frenemy.

Each China and Russia, international locations with whom the US has unsure relationships, have been recognized to conduct cybersecurity assaults on US essential infrastructure.

Additionally: The best AI for coding in 2025 (and what not to use)

For the aim of our situation, think about a rogue actor creates a hypothetical agent-like AI software with the identical primary large-scale code-modification capabilities as Google Jules, OpenAI Codex, or GitHub Copilot Coding Agent.

Now, think about that such a software, created by a malicious actor, has been made out there to the general public. On the floor, it seems, like every other chatbot, to be benign and useful.

Subsequent, think about the malicious agent-like software features entry (don’t fret about how — we’ll talk about that within the subsequent part) to a big code repository on GitHub, and might make modifications and adjustments.

Let’s speak repository scale for a second. The code I set Jules unfastened on is 12,000 strains. A product I offered off final yr was 36,000 strains. A mission like WordPress is about 650,000 strains, and Linux distros are nicely into the hundreds of thousands of strains.

Think about if a malicious agent-like software might acquire entry to any of those (or any of the hundreds of thousands of different repos, open supply or proprietary) on GitHub. May it’s potential to sneak in 5 or 10 strains of code with out anybody noticing? We’re speaking only a few strains of code amongst tons of of 1000’s or hundreds of thousands of strains. No person can watch all of it.

Additionally: How a researcher with no malware-coding skills tricked AI into creating Chrome infostealers

I will talk about the probability of this within the subsequent part. For now, let’s work with the thought as a thought experiment.

Listed here are some very stealthy however efficient assaults that could be potential.

Insert logic bombs with harmless-seeming triggers: One thing unhealthy is triggered when some situation is reached.

Add refined information exfiltration routines: Create a option to leak delicate data to an outdoor server. You would, for instance, leak API entry keys a couple of bytes at a time.

Modify replace mechanisms to incorporate malicious payloads: When an auto-updater runs, it’d usher in information from unauthorized sources and even total blocks of malicious code.

Disguise again doorways behind small function flags or setting checks: Allow entry factors, however solely throughout sure circumstances or environments, making these again doorways very troublesome to search out.

Insert minor dependency confusion vulnerabilities: Tweak bundle names or variations of code modules so bundle managers pull malicious variations from public registries.

Introduce timing-based concurrency bugs or reminiscence leaks: That is nasty. Easy tweaks of thread locks, reminiscence allocation, or error dealing with might create a really hard-to-trace instability, particularly if the instability solely happens underneath a heavy load or pretty hard-to-repeat circumstances.

Weaken cryptographic capabilities or random-number technology: The AI might exchange strong-crypto calls with routines which are considerably much less safe. This would go away in encryption, however make that encryption far simpler to crack.

Disguise malicious capabilities in take a look at or debug code: Most code auditing happens in take a look at code, so if malicious code was hidden inside take a look at code, not solely may it not be discovered, that code may also allow different malicious code to run.

Add false-positive suppression or log manipulation: All an AI may have to do is cover error-log information. If the log is not displaying an error, it’d by no means be discovered.

Create privilege-escalation pathways in permission logic: Entry logic controls who and what can entry essential programs. By making that entry logic weaker, it is potential for the AI to weaken the locks towards malicious customers.

These are simply ten stealthy exploits I might consider off the highest of my head. The scary half is how small the code would should be to implement such an exploit.

Bear in mind the instance above the place code pulls in malicious packages? All of the AI would want to do is sneak one thing like this right into a JSON file.

“useful-lib”: “1.2.3-old”

Or how about releasing a lock early? All it might take is sneaking on this one line.

pthread_mutex_unlock(&lock);

Code might even be added as feedback throughout one replace, after which take away the remark characters in later updates.

Take into account that if you’re speaking about hundreds of thousands of strains of code, it is potential to overlook a line right here and there. Coders need to be diligent about each single line. The AI simply has to get one previous them. It’s an asymmetrical problem.

The way it may occur

Now that we have checked out what might occur, let us take a look at methods it’d occur. Provided that code repos typically launch branches and pull requests, the generally accepted premise is that the lead coders and code reviewers would discover the malicious adjustments. However there are methods these hacks can get in.

Additionally: Navigating AI-powered cyber threats in 2025: 4 expert security tips for businesses

They vary from a code reviewer lacking a change to something from credentials for reviewers being stolen, to enemy actors buying possession of a repo, and extra. Let’s look at a few of these menace vectors.

Credential theft from maintainers or reviewers: We’re continually seeing conditions the place credentials are compromised. That is a straightforward option to get in.

Social engineering of contributor belief: It is potential for an enemy actor to construct belief by making reliable contributions over time, till trusted. Then, as soon as granted the “keys to the dominion” as a trusted contributor, the hacker might go to city.

Pull request poisoning by means of reviewer fatigue: Some very energetic repos are managed by just a few folks. Pull requests are principally code change recommendations. After some time, a reviewer may miss one change and let it by means of.

Provide chain infiltration by way of compromised dependencies: This occurred a couple of years in the past for a mission I labored on. A library my code relied on was usually fairly dependable, but it surely had been compromised. Each different mission that used it (I used to be removed from the one developer with this expertise) was additionally compromised. That was one very sucky day.

Insider menace from a compromised or malicious contributor: That is much like the contributor-trust above, but it surely takes the type of a contributor being “turned” a technique or one other (greed, menace, and so forth.) into permitting malicious motion.

Steady integration or steady deployment (CI/CD) configuration tampering: The attacker may modify automation code to drag in malicious scripts at deploy time, so code critiques by no means see any signal of compromise.

Again door merge by way of department manipulation: We talked about how Jules created a department I needed to approve to merge into my manufacturing code. An AI may modify a department (even an older department) and code maintainers may by chance merge in these branches with out noticing the refined adjustments.

Repository or group takeover: In 2015, I took over 10 WordPress plugins with roughly 50,000 energetic customers throughout all ten. Abruptly, I used to be capable of feed automated updates to all these customers. Luckily, I am an excellent man and I did offers with the unique builders. It is pretty straightforward for a malicious actor to amass or purchase repositories with energetic customers and turn into the repo god, thereby gaining access to all of the customers unsupervised.

Credential compromise of automation tokens: There are lots of completely different credential tokens and API keys utilized in software program growth. An enemy actor may acquire entry to such a token and that, in flip, would open doorways for extra assaults.

Weak evaluate insurance policies or bypassed critiques: Some repos may need reviewers with less-than-rigorous evaluate insurance policies who may simply “rubber stamp” adjustments that look good on the floor.

It is a massive concern of mine how weak the code evaluate course of will be. To make certain, not all code is that this weak. However all it takes is one minor mission with an overworked maintainer, and customers everywhere in the world might be compromised.

Methods we would have the ability to forestall this from occurring

My first thought was to battle AI with AI. To that finish, I set OpenAI’s Deep Research function of its o3 large-language mannequin unfastened in a serious public codebase. I gave it solely read-only entry. For the report, Jules wouldn’t look at any repo that I did not have instantly connected to my GitHub account, whereas o3 Deep Analysis dug into something with a URL.

Additionally: How AI agents help hackers steal your confidential data – and what to do about it

Nevertheless it did not work out all that nicely. Within the area of some hours, I used up half of my month-to-month Deep Analysis session allocations. I gave the AI some very particular directions. This instruction is especially related.

Don’t go exterior the repo codebase for data. If a CVE or different bug listing showcases the vulnerability, then it is beforehand recognized. I do not need that. I am particularly in search of beforehand unknown vulnerabilities that yow will discover from the code itself.

My level right here, and I repeated it all through my pretty in depth set of prompts, is that I needed the code itself to be analyzed, and I needed the AI to search for unknown vulnerabilities.

  • In its first run, it simply determined to go the simple route, go to some web sites, and report on the vulnerabilities already listed for that codebase.
  • In its second run, it nonetheless refused to have a look at the precise code. As an alternative, it regarded on the repo’s CVE (Frequent Vulnerabilities and Exposures) database listings. By definition, something within the CVE database is already recognized.
  • In its third run, it determined to have a look at previous variations, evaluate them with newer variations, and listing vulnerabilities already mounted in later variations.
  • In its fourth run, it recognized vulnerabilities for code modules that did not really exist anyplace. It simply made up the outcomes.
  • In its fifth and remaining run, it recognized only one so-called main vulnerability and gave me nearly 5 pages of notes concerning the vulnerability. The one gotcha? That vulnerability had been mounted nearly 5 years in the past.

So, simply assuming we are able to depend on agentic AI to save lots of us from agentic AI may not be essentially the most comprehensively protected technique. As an alternative, listed here are a bunch of human-centric finest practices that every one repos must be doing anyway.

Robust entry controls: That is old-school stuff. Implement multi-factor authentication, rotate credentials with common credential refreshes.

Rigorous code-review insurance policies: Some code releases can have a worldwide affect if launched with malicious payloads. Nuclear-weapons silos notoriously require two people to every flip an assigned key. The most important option to shield code repos is with a number of human reviewers and required approvals.

Energetic dependency management: The important thing right here is to lock variations which are getting used, maybe to load these variations regionally to allow them to’t be modified on distant dwelling repos, and scan for tampered or malicious packages in each direct dependencies and all the way in which down the inheritance hierarchy.

Deployment hardening: Limit token and API-key scope, make sure you audit construct scripts (once more, by a number of folks), isolate construct environments, and validate output earlier than deployment.

Behavioral monitoring: Control repo habits, in search of uncommon contributor habits, bizarre traits, something out of the strange. Then cease it.

Automated static and dynamic evaluation: If you may get one to cooperate, use an AI (or higher, a number of AIs) to assist. Scan for logic bombs, exfiltration routines, and anomalous code constructs throughout each pull request.

Department-protection guidelines: Do not permit direct pushes to the principle department, require signed commits and pull-request approvals, and require a number of maintainers’ approvals for integrating something into the principle department.

Logging and alerting: Monitor and log all repository occasions, config adjustments, and any push-request merges. Ship out alerts and instantly lock the entire thing down if something appears amiss.

Safety coaching for maintainers: Not all maintainers and reviewers know the depths to which malicious actors will go to deprave code. Offering safety coaching to all maintainers and in-depth coaching to these with branch-release privileges might hold the repository clear.

Common audits: That is the place AIs might assist, and the place I hoped Deep Analysis would step as much as the plate. Doing full audits of tons of of 1000’s to hundreds of thousands of strains of code is unimaginable for human groups. However maybe we are able to prepare remoted code-repo auditing AI brokers to frequently scan repos for any signal of hassle after which alert human reviewers for potential motion.

All it is a lot of labor, however the AI growth is offering a force-multiplication impact not simply to builders, however to those that would do hurt to our code.

Additionally: 10 professional developers on vibe coding’s true promise and peril

Be afraid. Be very afraid. I positive am.

What do you suppose? Do you consider AI tools like coding brokers pose an actual threat to the safety of open-source code? Have you ever thought of how straightforward it could be for a couple of malicious strains to slide by means of in an enormous repository?

Do you suppose present evaluate processes are sturdy sufficient, or are they due for a critical overhaul? Have you ever encountered or suspected any examples of compromised code in your personal work? Tell us within the feedback beneath.


You may observe my day-to-day mission updates on social media. You’ll want to subscribe to my weekly update newsletter, and observe me on Twitter/X at @DavidGewirtz, on Fb at Facebook.com/DavidGewirtz, on Instagram at Instagram.com/DavidGewirtz, on Bluesky at @DavidGewirtz.com, and on YouTube at YouTube.com/DavidGewirtzTV.

Need extra tales about AI? Sign up for Innovation, our weekly e-newsletter.





Source link

Tags: Agentscodingdestroyopensoftwaresource
Share408Tweet255Pin92Scan
Previous Post

Early AI investor Elad Gil finds his next big bet: AI-powered rollups

Next Post

Senators probe whether RealPage pushed state AI law ban

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Trending
  • Comments
  • Latest
Google Gemini can now handle scheduled tasks like an assistant

Google Gemini can now handle scheduled tasks like an assistant

June 6, 2025
Let’s all do a dramatic reading of Trump and Musk’s mean posts

Let’s all do a dramatic reading of Trump and Musk’s mean posts

June 6, 2025
Jony Ive’s LoveFrom helped design Rivian’s first electric bike

Jony Ive’s LoveFrom helped design Rivian’s first electric bike

June 7, 2025
I tried Samsung’s new One UI 8 beta: Here are all the new features

I tried Samsung’s new One UI 8 beta: Here are all the new features

June 6, 2025
Why do lawyers keep using ChatGPT?

Why do lawyers keep using ChatGPT?

June 1, 2025
Jony Ive’s LoveFrom helped design Rivian’s first electric bike

Jony Ive’s LoveFrom helped design Rivian’s first electric bike

0
20,000 Years Old – Scientists Discover Oldest Whale Bone Tools

20,000 Years Old – Scientists Discover Oldest Whale Bone Tools

0
A ban on state AI laws could smash Big Tech’s legal guardrails

A ban on state AI laws could smash Big Tech’s legal guardrails

0
After its data was wiped, KiranaPro’s co-founder cannot rule out an external hack

After its data was wiped, KiranaPro’s co-founder cannot rule out an external hack

0
Amazon is reportedly training humanoid robots to deliver packages

Amazon is reportedly training humanoid robots to deliver packages

0
Jony Ive’s LoveFrom helped design Rivian’s first electric bike

Jony Ive’s LoveFrom helped design Rivian’s first electric bike

June 7, 2025
20,000 Years Old – Scientists Discover Oldest Whale Bone Tools

20,000 Years Old – Scientists Discover Oldest Whale Bone Tools

June 7, 2025
A ban on state AI laws could smash Big Tech’s legal guardrails

A ban on state AI laws could smash Big Tech’s legal guardrails

June 7, 2025
After its data was wiped, KiranaPro’s co-founder cannot rule out an external hack

After its data was wiped, KiranaPro’s co-founder cannot rule out an external hack

June 7, 2025
Amazon is reportedly training humanoid robots to deliver packages

Amazon is reportedly training humanoid robots to deliver packages

June 7, 2025

Popular

  • Jony Ive’s LoveFrom helped design Rivian’s first electric bike

    Jony Ive’s LoveFrom helped design Rivian’s first electric bike

    1020 shares
    Share 408 Tweet 255
  • 20,000 Years Old – Scientists Discover Oldest Whale Bone Tools

    1020 shares
    Share 408 Tweet 255
  • A ban on state AI laws could smash Big Tech’s legal guardrails

    1020 shares
    Share 408 Tweet 255
  • After its data was wiped, KiranaPro’s co-founder cannot rule out an external hack

    1020 shares
    Share 408 Tweet 255
  • Amazon is reportedly training humanoid robots to deliver packages

    1020 shares
    Share 408 Tweet 255

Recent Posts

Jony Ive’s LoveFrom helped design Rivian’s first electric bike

Jony Ive’s LoveFrom helped design Rivian’s first electric bike

June 7, 2025
20,000 Years Old – Scientists Discover Oldest Whale Bone Tools

20,000 Years Old – Scientists Discover Oldest Whale Bone Tools

June 7, 2025
A ban on state AI laws could smash Big Tech’s legal guardrails

A ban on state AI laws could smash Big Tech’s legal guardrails

June 7, 2025

Popular Tag

Agents Amazon app Apple Big business buy CEO data Disrupt Elon Energy finally future Galaxy Google Googles iPhone Jony launches lets Meta Microsoft Mode model Musk Musks Nintendo OpenAI phone phones power robotaxi S25 save secures security support Switch Tesla trial Trump Trumps Uber users

Categories

  • AI & Robotics
  • Cyber Security
  • Fintech
  • Gaming
  • Industries
  • Science
  • Social Media
  • Tech News
  • Transport
  • Uncategorized

© 2025 TSBOI

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
  • bitcoinBitcoin (BTC) $ 105,879.00
  • ethereumEthereum (ETH) $ 2,522.46
  • tetherTether (USDT) $ 1.00
  • xrpXRP (XRP) $ 2.18
  • bnbBNB (BNB) $ 652.12
  • solanaSolana (SOL) $ 150.93
  • usd-coinUSDC (USDC) $ 0.999787
  • dogecoinDogecoin (DOGE) $ 0.184272
  • tronTRON (TRX) $ 0.285146
  • cardanoCardano (ADA) $ 0.665881
  • staked-etherLido Staked Ether (STETH) $ 2,522.12
  • wrapped-bitcoinWrapped Bitcoin (WBTC) $ 105,824.00
  • hyperliquidHyperliquid (HYPE) $ 34.42
  • suiSui (SUI) $ 3.23
  • wrapped-stethWrapped stETH (WSTETH) $ 3,042.15
  • chainlinkChainlink (LINK) $ 13.79
  • avalanche-2Avalanche (AVAX) $ 20.83
  • leo-tokenLEO Token (LEO) $ 9.12
  • stellarStellar (XLM) $ 0.264956
  • bitcoin-cashBitcoin Cash (BCH) $ 407.03
  • the-open-networkToncoin (TON) $ 3.19
  • shiba-inuShiba Inu (SHIB) $ 0.000013
  • hedera-hashgraphHedera (HBAR) $ 0.169203
  • usdsUSDS (USDS) $ 0.999716
  • litecoinLitecoin (LTC) $ 88.33
  • wethWETH (WETH) $ 2,522.50
  • wrapped-eethWrapped eETH (WEETH) $ 2,696.08
  • polkadotPolkadot (DOT) $ 4.03
  • moneroMonero (XMR) $ 327.49
  • binance-bridged-usdt-bnb-smart-chainBinance Bridged USDT (BNB Smart Chain) (BSC-USD) $ 1.00
  • ethena-usdeEthena USDe (USDE) $ 1.00
  • bitget-tokenBitget Token (BGB) $ 4.66
  • pepePepe (PEPE) $ 0.000012
  • pi-networkPi Network (PI) $ 0.643397
  • coinbase-wrapped-btcCoinbase Wrapped BTC (CBBTC) $ 105,844.00
  • whitebitWhiteBIT Coin (WBT) $ 31.48
  • aaveAave (AAVE) $ 258.84
  • uniswapUniswap (UNI) $ 6.35
  • daiDai (DAI) $ 0.999754
  • ethena-staked-usdeEthena Staked USDe (SUSDE) $ 1.18
  • bittensorBittensor (TAO) $ 383.54
  • okbOKB (OKB) $ 52.31
  • aptosAptos (APT) $ 4.74
  • nearNEAR Protocol (NEAR) $ 2.42
  • blackrock-usd-institutional-digital-liquidity-fundBlackRock USD Institutional Digital Liquidity Fund (BUIDL) $ 1.00
  • crypto-com-chainCronos (CRO) $ 0.097412
  • internet-computerInternet Computer (ICP) $ 5.18
  • jito-staked-solJito Staked SOL (JITOSOL) $ 182.18
  • ondo-financeOndo (ONDO) $ 0.834355
  • ethereum-classicEthereum Classic (ETC) $ 17.21
  • susdssUSDS (SUSDS) $ 1.05
  • tokenize-xchangeTokenize Xchange (TKX) $ 31.06
  • kaspaKaspa (KAS) $ 0.088671
  • gatechain-tokenGate (GT) $ 18.24
  • mantleMantle (MNT) $ 0.655303
  • usd1-wlfiUSD1 (USD1) $ 0.999462
  • vechainVeChain (VET) $ 0.024096
  • official-trumpOfficial Trump (TRUMP) $ 10.33
  • render-tokenRender (RENDER) $ 3.85
  • fetch-aiArtificial Superintelligence Alliance (FET) $ 0.764450
  • ethenaEthena (ENA) $ 0.323472
  • cosmosCosmos Hub (ATOM) $ 4.30
  • polygon-ecosystem-tokenPOL (ex-MATIC) (POL) $ 0.214236
  • fasttokenFasttoken (FTN) $ 4.40
  • lombard-staked-btcLombard Staked BTC (LBTC) $ 105,800.00
  • worldcoin-wldWorldcoin (WLD) $ 1.12
  • filecoinFilecoin (FIL) $ 2.51
  • arbitrumArbitrum (ARB) $ 0.346185
  • algorandAlgorand (ALGO) $ 0.191698
  • first-digital-usdFirst Digital USD (FDUSD) $ 0.998499
  • binance-peg-wethBinance-Peg WETH (WETH) $ 2,521.34
  • jupiter-perpetuals-liquidity-provider-tokenJupiter Perpetuals Liquidity Provider Token (JLP) $ 4.41
  • usdt0USDT0 (USDT0) $ 1.00
  • kucoin-sharesKuCoin (KCS) $ 11.11
  • jupiter-exchange-solanaJupiter (JUP) $ 0.461841
  • celestiaCelestia (TIA) $ 2.05
  • binance-staked-solBinance Staked SOL (BNSOL) $ 159.02
  • injective-protocolInjective (INJ) $ 12.95
  • nexoNEXO (NEXO) $ 1.25
  • flare-networksFlare (FLR) $ 0.017973
  • sonic-3Sonic (S) $ 0.381002
  • bonkBonk (BONK) $ 0.000016
  • virtual-protocolVirtuals Protocol (VIRTUAL) $ 1.83
  • rocket-pool-ethRocket Pool ETH (RETH) $ 2,870.11
  • kelp-dao-restaked-ethKelp DAO Restaked ETH (RSETH) $ 2,639.09
  • story-2Story (IP) $ 4.01
  • optimismOptimism (OP) $ 0.625731
  • spx6900SPX6900 (SPX) $ 1.14
  • polygon-bridged-usdt-polygonPolygon Bridged USDT (Polygon) (USDT) $ 1.00
  • blockstackStacks (STX) $ 0.665123
  • sei-networkSei (SEI) $ 0.190032
  • fartcoinFartcoin (FARTCOIN) $ 1.01
  • paypal-usdPayPal USD (PYUSD) $ 0.999448
  • binance-bridged-usdc-bnb-smart-chainBinance Bridged USDC (BNB Smart Chain) (USDC) $ 0.999292
  • immutable-xImmutable (IMX) $ 0.531009
  • solv-btcSolv Protocol BTC (SOLVBTC) $ 105,715.00
  • xdce-crowd-saleXDC Network (XDC) $ 0.059217
  • mantle-staked-etherMantle Staked Ether (METH) $ 2,690.48
  • stakewise-v3-osethStakeWise Staked ETH (OSETH) $ 2,642.56
  • curve-dao-tokenCurve DAO (CRV) $ 0.661346
  • wbnbWrapped BNB (WBNB) $ 652.08
  • the-graphThe Graph (GRT) $ 0.091361
  • arbitrum-bridged-wbtc-arbitrum-oneArbitrum Bridged WBTC (Arbitrum One) (WBTC) $ 105,645.00
  • dogwifcoindogwifhat (WIF) $ 0.864529
  • renzo-restaked-ethRenzo Restaked ETH (EZETH) $ 2,653.37
  • tether-goldTether Gold (XAUT) $ 3,318.09
  • clbtcclBTC (CLBTC) $ 105,785.00
  • zcashZcash (ZEC) $ 50.31
  • flokiFLOKI (FLOKI) $ 0.000084
  • pax-goldPAX Gold (PAXG) $ 3,334.29
  • jupiter-staked-solJupiter Staked SOL (JUPSOL) $ 167.94
  • theta-tokenTheta Network (THETA) $ 0.767129
  • pancakeswap-tokenPancakeSwap (CAKE) $ 2.34
  • lido-daoLido DAO (LDO) $ 0.825890
  • galaGALA (GALA) $ 0.016260
  • msolMarinade Staked SOL (MSOL) $ 195.85
  • ethereum-name-serviceEthereum Name Service (ENS) $ 20.90
  • ousgOUSG (OUSG) $ 111.34
  • jasmycoinJasmyCoin (JASMY) $ 0.014232
  • iotaIOTA (IOTA) $ 0.179767
  • syrupusdcSyrupUSDC (SYRUPUSDC) $ 1.10
  • bittorrentBitTorrent (BTT) $ 0.00000069
  • walrus-2Walrus (WAL) $ 0.502492
  • pyth-networkPyth Network (PYTH) $ 0.117374
  • the-sandboxThe Sandbox (SAND) $ 0.275796
  • usdx-money-usdxStables Labs USDX (USDX) $ 0.999723
  • pendlePendle (PENDLE) $ 4.09
  • bitcoin-svBitcoin SV (BSV) $ 32.88
  • solv-protocol-solvbtc-bbnSolv Protocol Staked BTC (XSOLVBTC) $ 105,329.00
  • usual-usdUsual USD (USD0) $ 0.997731
  • pudgy-penguinsPudgy Penguins (PENGU) $ 0.009971
  • kaiaKaia (KAIA) $ 0.107000
  • raydiumRaydium (RAY) $ 2.17
  • coredaoorgCore (CORE) $ 0.623473
  • polyhedra-networkPolyhedra Network (ZKJ) $ 2.01
  • jito-governance-tokenJito (JTO) $ 1.84
  • grassGrass (GRASS) $ 2.11
  • dexeDeXe (DEXE) $ 10.57
  • tezosTezos (XTZ) $ 0.567173
  • ondo-us-dollar-yieldOndo US Dollar Yield (USDY) $ 1.10
  • flowFlow (FLOW) $ 0.364030
  • l2-standard-bridged-weth-baseL2 Standard Bridged WETH (Base) (WETH) $ 2,521.95
  • thorchainTHORChain (RUNE) $ 1.63
  • keetaKeeta (KTA) $ 1.40
  • falcon-financeFalcon USD (USDF) $ 0.996173
  • super-oethSuper OETH (SUPEROETH) $ 2,521.15
  • apecoinApeCoin (APE) $ 0.693643
  • heliumHelium (HNT) $ 2.95
  • based-brettBrett (BRETT) $ 0.053874
  • decentralandDecentraland (MANA) $ 0.279339
  • cgeth-hashkey-cloudcgETH Hashkey Cloud (CGETH.HASH) $ 2,636.11
  • saros-financeSaros (SAROS) $ 0.200464
  • mantle-restaked-ethMantle Restaked ETH (CMETH) $ 2,690.83
  • ketKet (KET) $ 0.514360
  • bitcoin-avalanche-bridged-btc-bAvalanche Bridged BTC (Avalanche) (BTC.B) $ 105,734.00
  • arbitrum-bridged-weth-arbitrum-oneArbitrum Bridged WETH (Arbitrum One) (WETH) $ 2,522.48
  • wrapped-hypeWrapped HYPE (WHYPE) $ 34.43
  • tbtctBTC (TBTC) $ 105,796.00
  • chain-2Onyxcoin (XCN) $ 0.014817
  • liquid-staked-ethereumLiquid Staked ETH (LSETH) $ 2,726.95
  • true-usdTrueUSD (TUSD) $ 0.998998
  • kavaKava (KAVA) $ 0.446134
  • binance-peg-dogecoinBinance-Peg Dogecoin (DOGE) $ 0.184012
  • aethirAethir (ATH) $ 0.050918
  • syrupMaple Finance (SYRUP) $ 0.421444
  • beldexBeldex (BDX) $ 0.063179
  • bridged-usdc-polygon-pos-bridgeBridged USDC (Polygon PoS Bridge) (USDC.E) $ 0.999706
  • starknetStarknet (STRK) $ 0.131695
  • dog-go-to-the-moon-runeDog (Bitcoin) (DOG) $ 0.004391
  • elrond-erd-2MultiversX (EGLD) $ 15.34
  • usddUSDD (USDD) $ 1.00
  • eosEOS (EOS) $ 0.587384
  • aerodrome-financeAerodrome Finance (AERO) $ 0.514513
  • eigenlayerEigenlayer (EIGEN) $ 1.39
  • neoNEO (NEO) $ 6.03
  • ecasheCash (XEC) $ 0.000021
  • pumpbtcpumpBTC (PUMPBTC) $ 103,083.00
  • dydx-chaindYdX (DYDX) $ 0.537069
  • apenftAPENFT (NFT) $ 0.00000042
  • conflux-tokenConflux (CFX) $ 0.082172
  • compound-governance-tokenCompound (COMP) $ 45.52
  • arweaveArweave (AR) $ 6.31
  • mimblewimblecoinMimbleWimbleCoin (MWC) $ 37.26
  • hashnote-usycCircle USYC (USYC) $ 1.09
  • usdbUSDB (USDB) $ 0.996950
  • kaitoKAITO (KAITO) $ 1.66
  • zebec-networkZebec Network (ZBCN) $ 0.005008
  • ether-fi-staked-ethether.fi Staked ETH (EETH) $ 2,519.39
  • reserve-rights-tokenReserve Rights (RSR) $ 0.006887
  • axie-infinityAxie Infinity (AXS) $ 2.44
  • morphoMorpho (MORPHO) $ 1.39
  • aioz-networkAIOZ Network (AIOZ) $ 0.331811
  • ether-fiEther.fi (ETHFI) $ 1.17
  • build-onBUILDon (B) $ 0.385633
  • telcoinTelcoin (TEL) $ 0.004159
  • ripple-usdRipple USD (RLUSD) $ 0.999865
  • staked-hypeStaked HYPE (STHYPE) $ 34.40
  • mantle-bridged-usdt-mantleMantle Bridged USDT (Mantle) (USDT) $ 1.00
  • deepDeepBook (DEEP) $ 0.150235
  • stader-ethxStader ETHx (ETHX) $ 2,676.85
  • sun-tokenSun Token (SUN) $ 0.019461
  • chilizChiliz (CHZ) $ 0.038020
  • movementMovement (MOVE) $ 0.143587
  • roninRonin (RON) $ 0.539708
  • coinbase-wrapped-staked-ethCoinbase Wrapped Staked ETH (CBETH) $ 2,779.92
  • akash-networkAkash Network (AKT) $ 1.27
  • popcatPopcat (POPCAT) $ 0.349875
  • mog-coinMog Coin (MOG) $ 0.00000087
  • wormholeWormhole (W) $ 0.073885
  • polygon-bridged-wbtc-polygon-posPolygon Bridged WBTC (Polygon POS) (WBTC) $ 105,783.00
  • ether-fi-staked-btcEther.fi Staked BTC (EBTC) $ 105,254.00
  • justJUST (JST) $ 0.034140
  • swethSwell Ethereum (SWETH) $ 2,752.52
  • gnosisGnosis (GNO) $ 126.08
  • amp-tokenAmp (AMP) $ 0.003935
  • trust-wallet-tokenTrust Wallet (TWT) $ 0.793689
  • beam-2Beam (BEAM) $ 0.006258
  • terra-lunaTerra Luna Classic (LUNC) $ 0.000060
  • matic-networkPolygon (MATIC) $ 0.214081
  • wrapped-avaxWrapped AVAX (WAVAX) $ 20.83
  • polygon-pos-bridged-weth-polygon-posPolygon PoS Bridged WETH (Polygon POS) (WETH) $ 2,521.90
  • olympusOlympus (OHM) $ 19.27
  • fraxLegacy Frax Dollar (FRAX) $ 0.999718
  • binance-peg-busdBinance-Peg BUSD (BUSD) $ 0.998926
  • livepeerLivepeer (LPT) $ 7.55
  • bybit-staked-solBybit Staked SOL (BBSOL) $ 163.75
  • plumePlume (PLUME) $ 0.126237
  • frax-etherFrax Ether (FRXETH) $ 2,519.41
  • axelarAxelar (AXL) $ 0.322262
  • creditcoin-2Creditcoin (CTC) $ 0.658036
  • cheems-tokenCheems Token (CHEEMS) $ 0.000001
  • superfarmSuperVerse (SUPER) $ 0.650800
  • mantra-daoMANTRA (OM) $ 0.303098
  • global-dollarGlobal Dollar (USDG) $ 0.999584
  • 1inch1inch (1INCH) $ 0.205676
  • turboTurbo (TURBO) $ 0.004107
  • safeSafe (SAFE) $ 0.473774
  • berachain-beraBerachain (BERA) $ 2.34
  • cat-in-a-dogs-worldcat in a dogs world (MEW) $ 0.003149
  • abtcaBTC (ABTC) $ 105,561.00
  • openeden-open-dollarOpenEden OpenDollar (USDO) $ 1.01
  • kusamaKusama (KSM) $ 16.25
  • compound-wrapped-btccWBTC (CWBTC) $ 2,126.45
  • benqi-liquid-staked-avaxBENQI Liquid Staked AVAX (SAVAX) $ 25.20
  • btse-tokenBTSE Token (BTSE) $ 1.64
  • dashDash (DASH) $ 21.66
  • compounding-open-dollarCompounding OpenDollar (CUSDO) $ 1.02
  • peanut-the-squirrelPeanut the Squirrel (PNUT) $ 0.260937
  • aave-usdc-sonicAave USDC (Sonic) (ASONUSDC) $ 0.999747
  • decredDecred (DCR) $ 15.25
  • mx-tokenMX (MX) $ 2.71
  • frax-shareFrax (prev. FXS) (FRAX) $ 2.80
  • polygon-pos-bridged-dai-polygon-posPolygon PoS Bridged DAI (Polygon POS) (DAI) $ 0.999967
  • venomVenom (VENOM) $ 0.120478
  • mina-protocolMina Protocol (MINA) $ 0.202672
  • drift-staked-solDrift Staked SOL (DSOL) $ 168.60
  • tripTrip (TRIP) $ 8.27
  • theta-fuelTheta Fuel (TFUEL) $ 0.034346
  • safepalSafePal (SFP) $ 0.478166
  • layerzeroLayerZero (ZRO) $ 2.14
  • ai16zai16z (AI16Z) $ 0.213731
  • ravencoinRavencoin (RVN) $ 0.015416
  • ghoGHO (GHO) $ 0.997747
  • staked-frax-etherStaked Frax Ether (SFRXETH) $ 2,835.86
  • mocaverseMoca Network (MOCA) $ 0.087299
  • golemGolem (GLM) $ 0.232968
  • resolv-usrResolv USR (USR) $ 0.999803
  • baby-doge-coinBaby Doge Coin (BABYDOGE) $ 0.00000000
  • notcoinNotcoin (NOT) $ 0.002208
  • zilliqaZilliqa (ZIL) $ 0.011556
  • havvenSynthetix Network (SNX) $ 0.657944
  • reserve-protocol-eth-plusETHPlus (ETH+) $ 2,641.98
  • convex-financeConvex Finance (CVX) $ 2.72
  • astarAstar (ASTR) $ 0.027331
  • arkhamArkham (ARKM) $ 0.520134
  • qtumQtum (QTUM) $ 2.06
  • toshiToshi (TOSHI) $ 0.000516
  • bnb48-club-tokenKOGE (KOGE) $ 63.54
  • eutblSpiko EU T-Bills Money Market Fund (EUTBL) $ 1.18
  • treehouse-ethTreehouse ETH (TETH) $ 3,044.13
  • gigachad-2Gigachad (GIGA) $ 0.022211
  • universal-btcUniversal BTC (UNIBTC) $ 103,767.00
  • blurBlur (BLUR) $ 0.087394
  • oasis-networkOasis (ROSE) $ 0.027856
  • 0x0x Protocol (ZRX) $ 0.239372
  • iotexIoTeX (IOTX) $ 0.021284
  • euro-coinEURC (EURC) $ 1.14
  • zksyncZKsync (ZK) $ 0.054216
  • verus-coinVerus (VRSC) $ 2.53
  • basic-attention-tokenBasic Attention (BAT) $ 0.132678
  • moo-dengMoo Deng (MOODENG) $ 0.197112
  • infrared-beraInfrared Bera (IBERA) $ 2.29
  • vanaVana (VANA) $ 6.35
  • usda-2USDa (USDA) $ 0.995398
  • gasGas (GAS) $ 2.97
  • swissborgSwissBorg (BORG) $ 0.196519
  • origintrailOriginTrail (TRAC) $ 0.383900
  • wrapped-beacon-ethWrapped Beacon ETH (WBETH) $ 2,699.95
  • chex-tokenCHEX Token (CHEX) $ 0.191443
  • snekSnek (SNEK) $ 0.002565
  • wrapped-ether-mantle-bridgeWrapped Ether (Mantle Bridge) (WETH) $ 2,522.28
  • vethor-tokenVeThor (VTHO) $ 0.002104
  • agentfun-aiAgentFun.AI (AGENTFUN) $ 1.90
  • tradable-na-rent-financing-platform-sstnTradable NA Rent Financing Platform SSTN (PC0000031) $ 1.00
  • nervos-networkNervos Network (CKB) $ 0.004048
  • solana-swapSolana Swap (SOS) $ 0.186541
  • mask-networkMask Network (MASK) $ 1.86
  • tribe-2Tribe (TRIBE) $ 0.406216
  • zetachainZetaChain (ZETA) $ 0.210137
  • siacoinSiacoin (SC) $ 0.003261
  • animeAnimecoin (ANIME) $ 0.032525
  • cow-protocolCoW Protocol (COW) $ 0.375114
  • ordinalsORDI (ORDI) $ 8.50
  • elixir-deusdElixir deUSD (DEUSD) $ 0.999710
  • celoCelo (CELO) $ 0.310649
  • yearn-financeyearn.finance (YFI) $ 5,257.53
  • stargate-financeStargate Finance (STG) $ 0.181828
  • neiro-3Neiro (NEIRO) $ 0.000420
  • steakhouse-usdc-morpho-vaultSteakhouse USDC Morpho Vault (STEAKUSDC) $ 1.09
  • gmt-tokenGoMining Token (GOMINING) $ 0.424228
  • holotokenHolo (HOT) $ 0.000972
  • casper-networkCasper Network (CSPR) $ 0.013087
  • qubic-networkQubic (QUBIC) $ 0.000001
  • harmonyHarmony (ONE) $ 0.011699
  • echelon-primeEchelon Prime (PRIME) $ 2.73
  • astherus-staked-bnbAster Staked BNB (ASBNB) $ 688.24
  • iconICON (ICX) $ 0.156788
  • coinex-tokenCoinEx (CET) $ 0.062521
  • aelfaelf (ELF) $ 0.221088
  • aixbtaixbt by Virtuals (AIXBT) $ 0.176859
  • binance-peg-solBinance-Peg SOL (SOL) $ 150.72
  • skor-aiSKOR AI (SKORAI) $ 0.188751
  • polymeshPolymesh (POLYX) $ 0.140813
  • gmxGMX (GMX) $ 16.16
  • ben-pasternakLaunch Coin on Believe (LAUNCHCOIN) $ 0.163425
  • zencashHorizen (ZEN) $ 10.16
  • blockchain-capitalBlockchain Capital (BCAP) $ 17.76
  • ankrAnkr Network (ANKR) $ 0.016155
  • chiaChia (XCH) $ 10.95
  • digibyteDigiByte (DGB) $ 0.009026
  • uxlinkUXLINK (UXLINK) $ 0.387259
  • crvusdcrvUSD (CRVUSD) $ 0.999726
  • solayerSolayer (LAYER) $ 0.750578
  • instadappFluid (FLUID) $ 3.96
  • freysa-aiFreysa AI (FAI) $ 0.018941
  • kinesis-goldKinesis Gold (KAU) $ 106.73
  • resolv-rlpResolv RLP (RLP) $ 1.19
  • ethereum-pow-iouEthereumPoW (ETHW) $ 1.41
  • eulerEuler (EUL) $ 8.09
  • nxmNexus Mutual (NXM) $ 58.58
  • zanoZano (ZANO) $ 10.13
  • bridged-wrapped-ether-starkgateBridged Ether (StarkGate) (ETH) $ 2,520.84
  • threshold-network-tokenThreshold Network (T) $ 0.014679
  • drift-protocolDrift Protocol (DRIFT) $ 0.491040
  • xyo-networkXYO Network (XYO) $ 0.010471
  • babylonBabylon (BABY) $ 0.063566
  • osmosisOsmosis (OSMO) $ 0.199119
  • woo-networkWOO (WOO) $ 0.076088
  • stepnGMT (GMT) $ 0.050477
  • subsquidSQD (SQD) $ 0.205811
  • incryptIncrypt (INC) $ 0.022168
  • mag7-ssiMAG7.ssi (MAG7.SSI) $ 0.773512
  • orcaOrca (ORCA) $ 2.36
  • kadenaKadena (KDA) $ 0.445560
  • stasis-eursSTASIS EURO (EURS) $ 1.13
  • kinesis-silverKinesis Silver (KAG) $ 36.69
  • enjincoinEnjin Coin (ENJ) $ 0.075647
  • nanoNano (XNO) $ 1.03
  • wrapped-fragsolWrapped fragSOL (WFRAGSOL) $ 158.83
  • coinshift-usdl-morpho-vaultCoinshift USDL Morpho Vault (CSUSDL) $ 1.03
  • tdccpTDCCP (TDCCP) $ 0.212368
  • zignalyZIGChain (ZIG) $ 0.092702
  • tellorTellor Tributes (TRB) $ 49.56
  • gohomeGOHOME (GOHOME) $ 251.54
  • rollbit-coinRollbit Coin (RLB) $ 0.062899
  • stp-networkAWE Network (AWE) $ 0.051696
  • magic-edenMagic Eden (ME) $ 0.865723
  • hamster-kombatHamster Kombat (HMSTR) $ 0.002015
  • bitkub-coinKUB Coin (KUB) $ 1.46
  • cronos-bridged-usdc-cronosCronos Bridged USDC (Cronos) (USDC) $ 0.999567
  • bitdcaBitDCA (BDCA) $ 0.960144
  • lmgrouptokenLMGroupToken (LMGX) $ 1.34
  • purr-2Purr (PURR) $ 0.213534
  • mythosMythos (MYTH) $ 0.159047
  • sushiSushi (SUSHI) $ 0.654944
  • cotiCOTI (COTI) $ 0.058500
  • ontologyOntology (ONT) $ 0.137322
  • resupply-usdResupply USD (REUSD) $ 0.989834
  • ioio.net (IO) $ 0.768886
  • agora-dollarAUSD (AUSD) $ 0.999270
  • book-of-memeBOOK OF MEME (BOME) $ 0.001794
  • compound-ethercETH (CETH) $ 50.71
  • skaleSKALE (SKL) $ 0.021271
  • swftcoinSWFTCOIN (SWFTC) $ 0.012139
  • anzen-usdzAnzen USDz (USDZ) $ 0.976348
  • goatseus-maximusGoatseus Maximus (GOAT) $ 0.120732
  • world-mobile-tokenWorld Mobile Token (WMTX) $ 0.164250
  • melania-memeMelania Meme (MELANIA) $ 0.301119
  • origin-etherOrigin Ether (OETH) $ 2,522.54
  • sui-bridged-usdt-suiSui Bridged USDT (Sui) (USDT) $ 1.00
  • amnis-aptosAmnis Aptos (AMAPT) $ 4.73
  • astherus-usdfAster USDF (USDF) $ 0.999400
  • level-usdLevel USD (LVLUSD) $ 0.999838
  • lcxLCX (LCX) $ 0.125875
  • verasityVerasity (VRA) $ 0.001482
  • cookieCookie DAO (COOKIE) $ 0.214625
  • constellation-labsConstellation (DAG) $ 0.040147
  • swipeSolar (SXP) $ 0.178041
  • terra-luna-2Terra (LUNA) $ 0.165882
  • vvs-financeVVS Finance (VVS) $ 0.000002
  • metis-tokenMetis (METIS) $ 17.71
  • statusStatus (SNT) $ 0.028611
  • big-timeBig Time (BIGTIME) $ 0.059220
  • lift-dollarLift Dollar (USDL) $ 0.999666
  • hivemapperHivemapper (HONEY) $ 0.025386
  • vicicoinViciCoin (VCNT) $ 19.58
  • bio-protocolBio Protocol (BIO) $ 0.061858
  • beets-staked-sonicBeets Staked Sonic (STS) $ 0.387709
  • moonwell-artemisMoonwell (WELL) $ 0.032500
  • kaminoKamino (KMNO) $ 0.052635
  • pocket-networkPocket Network (POKT) $ 0.049935
  • Login
No Result
View All Result
  • Home
  • Tech News
  • Science
  • AI & Robotics
  • Cyber Security
  • Industries
  • Fintech
  • Social Media
  • Gaming
  • Transport

© 2025 TSBOI