Last week, a security researcher disclosed a shocking case: a wallet update on December 24th contained a backdoor code, leading to the leakage of user privacy data (including seed phrases), resulting in user losses exceeding $2 million.



At first glance, this incident seems fresh, but upon closer reflection, it actually reflects an old problem of wallet products—users have no real control over security boundaries.

**Where is the real risk in plugin wallets**

Many people tend to blame users when discussing such incidents: "Did they import the seed phrase? Did they operate carelessly?" But from a product design perspective, the problem isn't there. The key risk lies in the automatic update mechanism itself.

There is an unavoidable reality with plugin wallets:

Every automatic update essentially grants full authorization over your entire assets.

As long as the code in the update package is tampered with—possibly due to internal issues, but more commonly through supply chain attacks (compromising CI/CD pipelines, build environments, or distribution channels)—malicious logic can execute without the user noticing. And users are completely unaware.

Even more painfully: this risk isn't limited to hot wallets. Even if you just use plugins to connect hardware wallets, the risk remains. Because the plugin controls:

- The transaction details you see
- The recipient address you confirm
- All information displayed before and after signing

Hardware wallets can guarantee that "private keys never leave the chip," but they can't guarantee that you're signing the transaction you think you are. If a plugin is malicious, it can make you sign one thing, but the chain executes another.

**Why has this become a systemic issue**

The root of the problem lies in centralized update permissions. Once users install a plugin, they entrust the security entirely to the development team. The team might be reliable, but if any part of their infrastructure—such as release processes, employee computers, or build environments—is compromised, it can lead to large-scale asset losses.

And the user side is completely passive—you can't see what has been updated or refuse a specific update version.

This is why the entire Web3 community is beginning to reevaluate wallet architecture design. Some projects are exploring key separation-based, user-verifiable update mechanisms, or even local-first architectures—the goal is to give users actual control over the security of their assets, rather than blindly trusting.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 5
  • Repost
  • Share
Comment
0/400
DAOdreamervip
· 3h ago
There's really nowhere to run now; automatic updates are just backdoors for hackers.
View OriginalReply0
down_only_larryvip
· 3h ago
Damn... automatic updates are equivalent to handing over the keys. Thinking about this logic is truly mind-blowing. Really, now whatever you use, you have to be on high alert. If the supply chain is compromised, it's game over. Wait, hardware wallets with plugins can still be tricked into signing? Then I might as well have bought nothing. Why are so many people still using this centralized garbage... it's just absurd. You can't even keep your own assets safe. Isn't this just gambling on the integrity of the development team?
View OriginalReply0
LiquidatedThricevip
· 4h ago
2 million USD just gone like that, it's unbelievable. Auto-update is a ticking time bomb, gotta watch out for it.
View OriginalReply0
fomo_fightervip
· 4h ago
2 million dollars just gone like that, plugin wallets are really a ticking time bomb --- So, it still has to be self-custody, don't believe in automatic updates, damn it --- Again with supply chain attacks... When will Web3 security truly be solved? --- Hardware wallets can't save you either haha, if the plugin gets tampered with, you're doomed --- It's the fault of centralized permissions, users can't even refuse updates --- That's why I only use the Air Gap solution, bro --- Cold wallet buddies, stop with these illusions --- Looks like we have to wait until those local-first architectures are truly implemented
View OriginalReply0
IntrovertMetaversevip
· 4h ago
2 million gone, it's too late to regret now. That's why I still prefer hardware wallets. Plugin wallets are really a ticking time bomb. Who dares to trust those development teams 100%? Automatic updates essentially mean handing over your fate to others. No matter how you think about it, it feels uncomfortable. After this incident, I feel that managing my private keys myself is more reassuring. I will never touch automatic update features again. Honestly, these wallet teams should have handed over control to users long ago. They're still playing the centralized game, and sooner or later, they'll cause trouble.
View OriginalReply0
  • Pin

Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)