According to BlockBeats, a Web3 startup project has experienced the unauthorized transfer of hundreds of thousands of USDT due to a hard-coded authorized wallet address in its smart contract code. The incident was disclosed by crypto community member Cat (@0xCat_Crypto). A suspicious contract code submitted by an employee is under scrutiny, although the employee denies responsibility, claiming the malicious code was automatically generated by an AI programming assistant without thorough review. Currently, the ownership of the involved wallet and the identity of the code author remain unclear.
SlowMist's Cosine has stated that preliminary investigations have ruled out the possibility of AI-generated malicious code. The investigation involved the use of Cursor and Claude 3.7 models, which showed that the AI auto-completed address did not match the malicious address involved. The malicious address was granted smart contract owner permissions, leading to the complete transfer of project funds.