📢 Gate Square Exclusive: #PUBLIC Creative Contest# Is Now Live!
Join Gate Launchpool Round 297 — PublicAI (PUBLIC) and share your post on Gate Square for a chance to win from a 4,000 $PUBLIC prize pool
🎨 Event Period
Aug 18, 2025, 10:00 – Aug 22, 2025, 16:00 (UTC)
📌 How to Participate
Post original content on Gate Square related to PublicAI (PUBLIC) or the ongoing Launchpool event
Content must be at least 100 words (analysis, tutorials, creative graphics, reviews, etc.)
Add hashtag: #PUBLIC Creative Contest#
Include screenshots of your Launchpool participation (e.g., staking record, reward
The Ethereum core developer's cryptocurrency Wallet was drained by a malicious AI extension.
A core Ethereum developer stated that he was attacked by a cryptocurrency wallet drainer related to a fake encryption assistant, demonstrating that even veteran programmers can fall victim to increasingly sophisticated scams.
Zak Cole, an Ethereum developer, lost money due to installing a malicious AI extension from Cursor AI, which allowed the attacker to access his hot wallet for 3 days before draining the funds on August 10. The extension "contractshark.solidity-lang" looked legitimate with a professional icon, clear description, and over 54,000 downloads, but quietly extracted the private key from the .env file and sent it to the attacker's server.
Cole said he only lost a few hundred USD in ETH due to using a small hot wallet, separating it for testing and storing his main assets on a hardware wallet. Experts warn that fake extensions and VS Code are becoming major attack channels, advising to carefully check plugins, avoid storing keys in text form, and prioritize hardware wallets.