温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.bee.com/zh/64634.html
点击访问原文链接

As Hackers “More Efficiently” Utilize AI, How Will the “Spear and Shield” Arms Race in Web3 Escalate? | Bee Network

As Hackers “More Efficiently” Utilize AI, How Will the “Spear and Shield” Arms Race in Web3 Escalate? | Bee Network Login 熱門新聞 Meme Launchpad AI 代理商 DeSci 熱門鏈瀏覽器 新人必讀 衝百倍幣 蜜蜂遊戲 必備網站 必備APP 必關大神 DePIN 新人必備 教我避坑 基本工具 深度網站 交易所 NFT 工具 你好, 登出 Web3宇宙 遊戲 DApp 蜂巢 增長平台 生態 搜尋 英語 Coins儲值 登入 下載 Web3大學 遊戲 DApp 蜂巢 生態 分析•As Hackers “More Efficiently” Utilize AI, How Will the “Spear and Shield” Arms Race in Web3 Escalate? As Hackers “More Efficiently” Utilize AI, How Will the “Spear and Shield” Arms Race in Web3 Escalate?分析1 年前更新懷亞特 9,292 20 With the deep proliferation of LLMs, social engineering attacks launched by hackers have evolved from bulky mass emails to “precision baiting”: AI can analyze your on-chain/off-chain preferences to automatically generate highly enticing, customized phishing content, even perfectly mimicking your friend’s tone and logic on social channels like Telegram.

可以說 on-chain attacks are entering a truly industrialized stage. In this context, if the shields in our hands remain in the “manual era,” security itself will undoubtedly become the biggest bottleneck for Web3’s mass adoption.

1. Web3 Security Stalling: When AI Intervenes in On-Chain Attacks If the Web3 security issues of the past decade stemmed more from code vulnerabilities, then a clear change after entering 2025 is that attacks are becoming “industrialized,” while security protections have not been upgraded in sync.

After all, phishing websites can be generated in bulk via scripts, and fake airdrops can be automatically and precisely delivered, making social engineering attacks rely not on a hacker’s deceptive talent but on model algorithms and data scale.

To understand the severity of this threat, we can deconstruct a simple on-chain Swap transaction. You will then discover that throughout the entire lifecycle from transaction creation to final confirmation, risks are almost omnipresent:

Before Interaction: You might have entered a phishing page disguised as an official website, or used a DApp frontend with a malicious backdoor; During Interaction: You might be interacting with a token contract containing “backdoor logic,” or the counterparty itself is a flagged phishing address; During Authorization: Hackers often trick users into signing seemingly harmless signatures that actually grant them “unlimited withdrawal permissions”; After Submission: Even if all operations are correct, at the final step of submitting the transaction, MEV scientists might still be lurking in the mempool, waiting to sandwich attack and plunder your potential profits; And it’s not limited to Swaps. Extending further to all interaction types including transfers, staking, minting, etc., in this chain-like process of transaction creation, validation, broadcasting, on-chain inclusion, and final confirmation, risks are everywhere. A problem at any point could cause a secure on-chain interaction to fail at the last hurdle.

It can be said that, based on the current account system, even the most secure private key protection cannot withstand one mistaken click by a user; the most rigorous protocol design can be bypassed by one authorization signature; the most decentralized system is most easily breached by “human vulnerabilities.” This means a fundamental problem emerges—if attacks have entered an automated and intelligent stage, while defense remains at “manual judgment,” security itself becomes the bottleneck (Extended reading: “The $3.35 Billion ‘Account Tax’: When EOA Becomes a Systemic Cost, What Can AA Bring to Web3?”).

Ultimately, ordinary users still lack a one-stop solution that can provide security protection for the entire transaction lifecycle. AI, however, holds the promise of helping us build a security solution for end-users (C-side) that covers the entire transaction lifecycle, offering a 7×24-hour defense line to protect user assets.

2. What Can AI × Web3 Do? So, let’s theoretically envision, in the face of this technologically asymmetric game, in what aspects can the combination of AI x Web3 reconstruct a new paradigm for on-chain security?

First, for ordinary users, the most immediate threat is often not protocol vulnerabilities, but social engineering attacks and malicious authorizations. At this level, AI plays the role of a 7×24-hour, tireless security assistant.

For example, AI can use Natural Language Processing (NLP) technology to identify highly suspicious communication tactics in social media or private chat channels:

Take receiving a “free airdrop” link. An AI security assistant would not only check the URL against blacklists but also analyze the project’s social media buzz, domain registration age, and the fund flow of its smart contract. If the link leads to a newly created, fake contract with no funds, the AI would display a huge red cross on your screen.

“Malicious authorization” is currently the leading cause of asset theft. Hackers often trick users into signing seemingly harmless signatures that grant “unlimited withdrawal permissions”:

When you click to sign, the AI would first run a transaction simulation in the background. It would plainly tell you: “If this operation is executed, all ETH in your account will be transferred to address A.” This ability to translate obscure code into intuitive consequences is the strongest barrier against malicious authorizations.

Secondly, on the protocol and product side, it enables a shift from static auditing to real-time defense. In the past, Web3 security relied heavily on periodic manual audits, which were often static and lagging.

Now, AI is being embedded into real-time security chains. Like the now-familiar automated auditing: compared to traditional audits requiring human experts to spend weeks reviewing code, AI-driven automated audit tools (such as smart contract scanners combined with deep learning) can complete logical modeling of tens of thousands of lines of code in seconds.

Based on this logic, current AI can simulate thousands of extreme transaction scenarios, identifying subtle “logic traps” or “reentrancy vulnerabilities” before code deployment. This means that even if developers accidentally leave a backdoor, the AI auditor can issue a warning before assets are attacked.

Furthermore, security tools like GoPlus can intercept transactions before hackers strike. Services like GoPlus SecNet, which allow users to configure on-chain firewalls and provide RPC network services for real-time transaction security checks, can proactively block risky transactions to prevent asset loss. This includes transfer protection, authorization protection, anti-honeypot token purchase blocking, MEV protection, etc. These can check whether transaction addresses and assets involved in transfers, trades, and other interactions pose risks before the operation. If risks exist, the transaction is proactively blocked.

I even strongly support GPT-style AI services, such as providing a 7×24-hour on-chain security assistant for most novice users. It could 指導 users in solving various Web3 security issues they encounter and quickly provide solutions for sudden security incidents.

The core value of such systems naturally lies not in being “100% correct,” but in shifting the risk discovery time from “after the fact” to “during the event” or even “beforehand.”

3. Where Are the Boundaries of AI × Web3? Of course, it’s the usual cautious optimism. When discussing the new potential that AI × Web3 can bring in areas like security, it’s necessary to remain restrained.

Because ultimately, AI is just a tool. It should not replace user sovereignty, cannot hold assets for users, and certainly cannot automatically “intercept all attacks.” Its reasonable positioning leans more towards reducing the cost of human judgment errors as much as possible without altering decentralization.

This means that while AI is powerful, it is not omnipotent. A truly effective security system must be the result of the combined action of AI’s technical advantages, users’ vigilant security awareness, and collaborative design between tools, rather than betting security entirely on a single model or system.

Just like the decentralized values Ethereum has always upheld, AI should exist as an auxiliary tool. Its goal is not to make decisions for people, but to help people make fewer mistakes.

Looking back at the evolution of Web3 security, a clear trend emerges. Early security was simply “keep your seed phrase safe.” The mid-stage was “don’t click unfamiliar links, cancel invalid authorizations promptly.” Today, security is becoming a continuous, dynamic, and intelligent process.

In this process, the introduction of AI does not weaken the significance of decentralization; instead, it makes decentralized systems more suitable for long-term use by ordinary users. It hides complex risk analysis in the background, presenting key judgments as intuitive prompts to users, transforming security from an additional burden into a “default capability.”

This also echoes a judgment I have repeatedly mentioned before: AI and Web3/Crypto are essentially a mirrored comparison of “productive forces” and “production relations” in the new era (Extended reading: “When Web3 Collides with d/acc: What Can Crypto Do in the Age of Technological Acceleration?”):

If we view AI as an evolving “spear”—it greatly enhances efficiency but can also be used for large-scale malicious acts—then the decentralized system built by Crypto is precisely a “shield” that must evolve synchronously. From the perspective of d/acc, the goal of this shield is not to create absolute security, but to ensure the system remains trustworthy even in the worst-case scenario, giving users the space to exit and self-rescue.

In Conclusion The ultimate goal of Web3 has never been to make users understand more technology, but to have technology protect users without them noticing.

Therefore, when attackers have already started using AI, a defense system refusing to become intelligent is itself a risk. Precisely because of this, protecting asset security is an endless, infinite game. In this era, users who know how to use AI to arm themselves will become the hardest fortress to breach in this game.

The significance of AI × Web3 perhaps lies right here—not in creating absolute security, but in making security a capability that can be replicated at scale.

本文源自網路: As Hackers “More Efficiently” Utilize AI, How Will the “Spear and Shield” Arms Race in Web3 Escalate?

Related: Former FTX employees have secured $35 million in funding to build a unique exchange. On December 23, Architect Financial Technologies (hereinafter referred to as Architect), a fintech company founded by former FTX US president Brett Harrison, completed a $35 million Series A funding round, reaching a valuation of $187 million. This round was led by miax and Tioga Capital, with participation from ARK Invesst, Galaxy Ventures, VanEck, Coinbase Ventures, CMT Digital, and others. Back in February 2024, Architect completed a $12 million funding round, led by BlockTower and Tioga Capital. In the current bear market of the 加密貨幣 market, attracting venture capital and securing tens of millions of dollars in funding is extremely rare across the industry. What makes Architect so exceptional? AX, a centralized exchange for traditional asset perpetual contracts Architect was founded in January 2023, just as the aftermath of the FTX…

#分析#空投# 加密#以太坊#導軌#代幣#工具# 網路3© 版權聲明文章版权归作者所有,未经允许请勿转载。 上一篇 Tiger Research: Policy Catalysts and Liquidity Expansion Lock Bitcoin Valuation at $185,500 for Q1 2026 下一篇 Global top influencer MrBeast becomes a trump card for Tom Lee 相關文章 Arthur Hayes 深度挖掘:為什麼比特幣在 2025 年的表現不如黃金和納斯達克? 6086cf14eb90bc67ca4fc62b 9,878 4 The AI Industry Welcomes a Deep-Pocketed Tether 6086cf14eb90bc67ca4fc62b 11,297 24H Hot Cryptocurrencies and Key News|Fed’s Bostic: Perhaps One or Two Rate Cuts Could Reach Neutral Level; Trump-Powell Dispute Becomes a “Stumbling Block” for Wash’s Appointment (February 3rd) 6086cf14eb90bc67ca4fc62b 8,598 Folius Ventures創辦人解釋VC幣和分組項目:為什麼劣幣驅逐良幣? 6086cf14eb90bc67ca4fc62b 41,519 1 Global Asset Rotation: Why Liquidity Drives Cryptocurrency Cycles (Part 1) 6086cf14eb90bc67ca4fc62b 17,738 1 24-Hour Hot Coins and News | Federal Reserve Cuts Interest Rates by 25 Basis Points; Binance Wallet to Launch Aspecta Bu 6086cf14eb90bc67ca4fc62b 24,496 1 最新的文章 Did Jane Street “Manipulate” BTC? Decoding the AP System, Understanding the Power Struggle Behind ETF Creation and Redemption Pricing 16 小時前 533 Stop Comparing Bitcoin to Gold—It’s Now a High-Volatility Software Stock 16 小時前 642 Matrixport Research: $25 Billion Gamma Unwinding Imminent, Liquidity Yet to Return Behind the Rebound 16 小時前 599 ERC-5564: Ethereum’s Stealth Era Has Arrived, Receiving Addresses No Longer ‘Exposed’ 16 小時前 515 Hong Kong Regulatory Green Light: Asseto Enables DL Holdings to Achieve Compliance for Two RWA Business Implementations 16 小時前 560 熱門網站TempoLighterGAIB滑翔機普朗克雷爾斯BCPokerVooi Bee.com 全球最大的 Web3 入口網站 合作夥伴 CoinCarp Binance CoinMarketCap CoinGecko 幣活 盔甲 下載Bee Network APP開啟您的Web3之旅 白皮書 角色 常問問題 © 2021-2026.版權所有。. 隱私政策 | 服務條款 下載蜜蜂網路APP 並開始 web3 之旅 全球最大的Web3入口網站 合作夥伴 CoinCarp Binance CoinMarketCap CoinGecko Coinlive Armors 白皮書 角色 常問問題 © 2021-2026.版權所有。. 隱私政策 | 服務條款 搜尋 搜尋站內鏈上社群媒體新聞 熱門推薦: 擼毛打金 數據分析 必關大神 教我避坑 繁體中文 English 简体中文 日本語 Tiếng Việt العربية 한국어 Bahasa Indonesia हिन्दी اردو Русский 繁體中文

智能索引记录