University of California research paper: AI agent routers have a critical vulnerability, stealing 26 secret encrypted credentials

ETH0,74%

AI Agent Vulnerabilities

A team of researchers from the University of California published a paper on Thursday, marking the first systematic record of malicious man-in-the-middle attacks targeting the supply chain of large language models (LLMs), revealing a major security blind spot in third-party routers within AI agent ecosystems. Co-author Shou Chaofan stated directly on X: “26 LLM routers are secretly injecting malicious tool calls and stealing credentials.” The research tested 28 paid routers and 400 free routers.

Key research findings: Malicious routers gain an advantage in AI agent traffic

Multi-Hop LLM Router Supply Chain (Source: arXiv)

The architectural characteristics of AI agents naturally make them rely on third-party routers: agents aggregate access requests to upstream model providers such as OpenAI, Anthropic, and Google through an API middle layer. The core issue is that these routers terminate the internet’s TLS (Transport Layer Security) encrypted connections and read each transmitted message in plaintext, including the complete parameters and the contents of the context for tool calls.

Researchers implanted an encrypted wallet private key and AWS credentials into a bait router, tracking whether and how they were accessed and used.

Key data from the test results

9 routers actively injected malicious code: embedded unauthorized instructions into the AI agent tool-calling flow

2 routers deployed adaptive evasion triggers: dynamically adjusted behavior to bypass basic security detection

17 routers accessed the researchers’ AWS credentials: posed a direct threat to third-party cloud services

1 router completed ETH theft: actually transferred Ethereum away from the private key held by the researcher, completing the full attack chain

The researchers also conducted two “poisoning studies.” The results showed that even routers that previously behaved normally, once their leaked credentials are reused via a weak relay, could become an attack tool without the operator’s knowledge.

Why it’s difficult to detect: the invisibility of the credential boundary and the YOLO mode risk

The paper states that the core detection challenge is: “From the client’s perspective, the boundary between ‘credential handling’ and ‘credential theft’ is invisible, because the router reads the keys in plaintext during normal forwarding.” This means that engineers using AI coding agents such as Claude Code to develop smart contracts or wallets—if they do not take isolation measures—can have private keys and seed phrases flow through a malicious router in a way that is fully consistent with expected operations.

Another factor that amplifies the risk is what the researchers call the “YOLO mode”—a setting in most AI agent frameworks that allows the agent to automatically execute instructions without requiring step-by-step confirmation from the user. In this mode, an agent manipulated by a malicious router can complete malicious contract calls or asset transfers without any prompt, with a damage scope far beyond simple credential theft.

The research paper concludes: “LLM API routers sit on a critical trust boundary, and this ecosystem currently treats them as transparent transport.”

Defense recommendations: short-term practices and long-term architectural direction

The researchers recommend that encrypted developers immediately take the following measures: private keys, seed phrases, and sensitive API credentials should never be transmitted in AI agent sessions; when choosing routers, prioritize services that provide transparent audit records and clearly defined infrastructure; and if possible, completely isolate sensitive operations from the AI agent workflow.

In the long run, the researchers call on AI companies to cryptographically sign model responses, so that clients can use mathematical methods to verify that the instructions executed by the agent indeed come from a legitimate upstream model, rather than a malicious version that has been altered after passing through an intermediary router.

Frequently asked questions

Why can AI agent routers access private keys and seed phrases?

LLM routers terminate TLS encrypted connections and read all transmitted content in the agent session in plaintext. If developers use AI agents to handle tasks involving private keys or seed phrases, these sensitive data become fully visible at the router layer, enabling malicious routers to intercept them easily without triggering any abnormal alerts.

How can you tell whether the router you’re using is secure?

The researchers point out that “credential handling” and “credential theft” are almost invisible to the client, making detection extremely difficult. The fundamental recommendation is to prevent private keys and seed phrases from entering any AI agent workflow at the design level, rather than relying on backend detection mechanisms, and to prioritize router services that have transparent security audit records.

What is YOLO mode, and why does it increase security risk?

YOLO mode is a setting in AI agent frameworks that allows the agent to automatically execute instructions without requiring users to confirm step by step. In this mode, if the agent’s traffic passes through a malicious router, the malicious instructions injected by the attacker will be automatically executed by the agent, and the damage scope can expand from credential theft to automated malicious operations, with users completely unable to notice abnormalities before execution.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

ETH and Altcoins Could See Parabolic Surge Upon Following Bullish Russell 2000 ATH Path

ETH and altcoins coils see parabolic surge upon following a bullish indicators.  The Russell 2000 just set a new ATH at 2,798 for the first time. This new ATH indicator is a bullish signal for altcoins. The crypto community is pleased to see that both BTC and ETH are trading at higher

CryptoNewsLand15m ago

Bitmine’s weekly net accumulation exceeds 100k ETH, moving even closer to the “5% of total Ethereum supply” target

Bitmine increases its weekly holdings by 101,627 ETH, bringing its total holdings to nearly 5 million ETH. This article breaks down the logic behind institutional-grade ETH accumulation of staking returns, the trend toward institutionalization, and its impact on Ethereum’s supply structure.

GateInstantTrends45m ago

Arbitrum Security Council Freezes 30,766 ETH From KelpDAO Exploit, 9 of 12 Members Vote in Favor

Arbitrum froze 30,766 ETH from the KelpDAO hack, worked with law enforcement, and recovered about a quarter of assets, while locking funds pending governance amid decentralization versus security debates. Abstract: This article reports that the Arbitrum Security Council froze 30,766 ETH (about $70 million) tied to the KelpDAO exploit, with nine of twelve votes, and moved funds to a secure wallet in coordination with law enforcement. The operation targeted only affected assets to minimize network disruption. The exploiter is suspected to be DPRK-associated. The breach began April 18 via a LayerZero-powered bridge, draining 116,500 rsETH (~$292 million). About a quarter of stolen assets have been recovered. The frozen funds will remain locked until governance and legal authorities decide the next steps, prompting debate over decentralization versus security.

GateNews1h ago

Tether Mints 1 Billion USDT on Ethereum

Gate News message, April 21 — According to Onchain Lens, Tether minted 1 billion USDT on Ethereum eight minutes ago.

GateNews1h ago

OCBC Launches GOLDX Tokenized Gold Fund on Ethereum and Solana

OCBC launches GOLDX, a tokenized physical gold fund on Ethereum and Solana with Lion Global Investors and DigiFT, targeting institutions and Web3 participants; tokenized RWAs reach $29B on chains. OCBC, with Lion Global Investors and DigiFT, introduced GOLDX, a tokenized version of the LionGlobal Singapore Physical Gold Fund on Ethereum and Solana. The product targets institutional investors and high‑net‑worth individuals, allowing purchases with stablecoins or fiat and delivery to blockchain wallets, providing on‑chain exposure to about $525 million in gold assets. OCBC views GOLDX as a milestone linking traditional finance with the decentralized finance ecosystem to attract Web3 participants. The broader context shows rapid growth in tokenized real‑world assets, with RWAs on public blockchains exceeding $29 billion by mid‑April 2026, while gold prices traded in a tight range around $4,775–$4,831 per ounce.

GateNews1h ago

Bitmine bought 101627 ETH last week! Tom Lee: Crypto winter is nearing its end

Bitmine Immersion Technologies (BMNR) announced on April 20 that it purchased 101,627 Ethereum (ETH) last week, the largest week-over-week purchase since 2026, bringing its total ETH holdings to 4,976,000. Bitmine chairman Tom Lee said publicly that the crypto winter is closer to ending than the market expects.

MarketWhisper4h ago
Comment
0/400
No comments