
So many types of social engineering hacks, targeting web3 developers š
Picture this. Youāre chilling, shipping features, maybe fixing a random āgas estimation failedā bug for the 4th time this day. Then a DM lands: āHey, weāre doing an NFT project and need someone like you to help us.ā āLoved your GitHub profile. I see a lot of contribution you made. Do you want to contribute in our project?ā āYour repo is vulnerable. Hereās a PR to fix it.ā And because youāre a builder, you do the builder thing: You clone, run, click, and merge. Congratulations, you just got socially engineered. Alright, shall we begin :) Why Web3 devs get targeted so hard Short answer: because you donāt just have the code, you have the access! Something like: deployer keys (or the machine that touches them) CI secrets (that can publish packages, push image) priviledged social media like Discord/Telegram that can āannounceā and so on They can just break your workflow. In Web3, the fastest way to drain funds is not a re-entrancy bug. Itās a developer having a normal day. The menu of attac
Continue reading on Dev.to
Opens in a new tab

