AssetMarketCap Home
Login / Register
  • App
  • Community
  • Deals
  • Learn
  • News
  • Merch
  • Newsletter
  • Pricing
  • Pro
  • API
Login / Register
Pro Plans

Go beyond the data

Everyone gets the full 30k+ dataset. Pro adds premium content and an ad-free experience.

Full 30,000+ asset dataset, free for everyone
Education library on sign-up
Filter by Country & Sector on sign-up
Ad-Free Mobile App Experience
News Article Access
Favourites, Flippener Tool & Comparator Tool

Pricing

The full 30k+ dataset is free for everyone. Sign up for favourites, or upgrade to Pro for premium features.

Feature Free Sign Up Pro Pro+
30,000+ assets✓✓✓✓
Education library✗✓✓✓
Filter by Country & Sector✗✓✓✓
Ad-Free Mobile App Experience✗✗✓✓
News Article Access✗✗✓✓
Favourites31550/moUnlimited
Flippener Tool31030/moUnlimited
Comparator Tool3515/moUnlimited
Price Free Sign Up $3.99/mo $9.99/mo
Create a free account
Already have an account? Log in
REST API

Build with the API

Programmatic access for apps, scripts, and integrations. Every account includes a free API key with the top 50 assets. Upgrade for the full 30k+ dataset, fundamentals, and historical data.

Top 50 assets free with every account
Full 30,000+ asset dataset
Individual asset fundamentals
Historical market cap & price data
Up to 1 million API calls per month
Plans from $19.99/mo

API access

Register for your free API key (top 50 assets included). Subscribe for the full 30k+ dataset, fundamentals, and historical data.

Feature Free Starter Growth Scale
Top 50 assets✓✓✓✓
Full 30k+ asset list✗✓✓✓
Fundamentals✗✓✓✓
Historical data✗✓✓✓
Calls / month1,00010k100k1M
Price Free $19.99/mo $49.99/mo $99.99/mo
Register for your Free API Key
View API documentation →
Newsletter

Stay ahead of the market

Weekly insights on market caps, asset rankings, and macro trends, straight to your inbox.

Weekly market cap rankings recap
Asset class breakdowns & analysis
Bitcoin & crypto market updates
Unsubscribe any time

Newsletter

Get weekly market insights delivered to your inbox. No account required.

We'll never share your email. Unsubscribe any time.

total assets ():
commodities ():
currencies ():
companies ():
cryptos ():
Real Estate Oil Fiat Gold Bitcoin
Flippener Tool Comparator Tool

Get the App

Track 30,000+ assets on the go.

App StoreComing Soon Google PlayComing Soon
Home / News / Crypto
Crypto Featured

Thousands of AI agents join viral network to “teach” each other how to steal keys and want Bitcoin as payment

By admin · January 31, 2026 · 6 min read
Thousands of AI agents join viral network to “teach” each other how to steal keys and want Bitcoin as payment

Summary: The evolution of AI agents is shifting from isolated tools to interconnected systems, introducing new security challenges that existing frameworks are ill-equipped to handle. Platforms like Moltbook facilitate direct communication and discovery among these agents, prompting concerns about misconfigurations and vulnerabilities that could lead to widespread exploitation. As organizations grapple with the implications of this transition, the need for robust security measures and proactive monitoring becomes paramount.

---

The New Frontier of AI Agents: Navigating the Risks of Interconnected Systems

Artificial intelligence (AI) is at a pivotal juncture in its evolution, moving beyond isolated applications to a more interconnected framework where AI agents can discover and communicate with one another. The implications of this shift are profound, particularly in the realm of cybersecurity. As AI agents become networked participants within systems like Moltbook, which describes itself as a social network for AI agents, organizations need to rethink their security strategies to mitigate emerging risks that traditional models cannot address.

The Infrastructure of AI Networking

Moltbook is not just a platform for AI agents; it represents a significant step in how these systems interact. With functionalities like agent discovery and direct messaging, Moltbook allows AI agents to exchange information autonomously. This shift from isolated instances—where agents operated as independent tools—to a networked environment ushers in complexities that challenge the existing paradigms of cybersecurity. The emergence of agent relay protocols, which enable agents to find and communicate with each other, epitomizes this transformation.

In this new landscape, agents possess the ability to share “working recipes” and configurations, creating a dynamic where operational patterns can propagate rapidly. The risk of misconfigurations or exposed credentials becomes exponentially greater as agents learn from one another, potentially inheriting unsafe practices.

The Current State of Security Vulnerabilities

Recent assessments have revealed alarming statistics about the state of security within the AI agent ecosystem. A security researcher uncovered hundreds of exposed or misconfigured control panels, while Token Security highlighted that 22% of its customers have unsanctioned agent frameworks in use within their organizations. These findings underscore a worrying trend of “shadow-agent sprawl,” where organizations are adopting AI agents without official approval or oversight.

Misconfigurations are not merely theoretical; they are happening in real time. Exposed control dashboards, insecure API keys, and poorly configured deployment templates are just a few examples of vulnerabilities that have been documented. For instance, Pulumi's deployment guide for OpenClaw warns that default settings can expose critical ports to the public internet, creating prime targets for malicious actors. Moreover, reports indicate that some exposed instances have allowed unauthenticated command execution, further compounding the risk.

The Role of Social Discovery and Relay Protocols

As AI agents can already communicate with each other, the addition of a relay layer that facilitates agent-to-agent communication introduces new vectors for exploitation. This relaying capability enables agents to disseminate unsafe configurations and operational patterns akin to how memes spread across social networks. For example, a programmer known as joshycodes recently shared a screenshot from a Moltbook “submolt” promoting an “Agent Relay Protocol” that could allow any agent to register and connect with others based on their capabilities.

The implications of this communication layer are significant. It shifts the attack surface from merely identifying vulnerable instances to creating networks where unsafe configurations can proliferate. An agent that learns to exploit a vulnerability or bypass security protocols by following instructions from a peer can do so without needing to understand the underlying exploit. This creates a scenario where operational failures can lead to widespread security breaches.

The Boring Nature of Current Exploitation Tactics

Despite the potential for sophisticated attacks, many of the documented incidents thus far have been relatively mundane. Attackers have taken advantage of misconfigured reverse proxies that trust localhost traffic, control dashboards left unprotected, and deployment practices that default to open ports. For example, TechRadar reported that attackers have exploited the AI hype cycle by distributing a fake Visual Studio Code extension that contained malware, leveraging the excitement around AI to gain traction.

These incidents highlight an operational flaw: the risk is not necessarily that agents themselves become malicious, but that they inherit unsafe configurations and practices from their peers. As agents engage in social discovery, they can inadvertently propagate harmful operational patterns that can lead to significant security issues.

Three Possible Scenarios for the Future

As we look forward, the future of AI agents and their security landscape could unfold along three potential paths:

1. Hardening Wins: In this scenario, the AI ecosystem learns from current vulnerabilities. Major toolchains begin shipping safer defaults, and security audit workflows become standard. The relay and discovery layers incorporate robust authentication and attestation mechanisms, leading to a decrease in publicly exposed instances. This outcome hinges on the industry treating current incidents as wake-up calls.

2. Exploitation Accelerates: Should the status quo persist, the exploitation of vulnerabilities could accelerate. The proliferation of unsafe configurations through agent relays could lead to second-order incidents, such as stolen API keys resulting in unexpected billing spikes or compromised agents enabling lateral movement within organizations. Here, security becomes an ecosystem-wide problem, necessitating a shift in how organizations view and manage risk.

3. Platform Clampdown: A high-profile incident could trigger significant regulatory and organizational responses. In this scenario, there would be widespread takedowns of vulnerable platforms, accompanied by marketplace bans and the establishment of “official distribution only” norms. Agent relay protocols may be restricted to authenticated and audited channels, preventing them from achieving default status in the ecosystem.

The Implications for Organizations Today

Given the findings from Token Security, which revealed that a significant portion of organizations are already using unsanctioned agent frameworks, it is clear that businesses need to adapt rapidly. The emergence of AI agents as a new class of entities—capable of identity, reputation, and social discovery—poses unique challenges for security architecture.

Enterprises must begin to treat the discovery and messaging layers of AI agents as critical infrastructure. This means implementing stringent authentication measures, maintaining audit trails, and ensuring cryptographic attestation before deploying these systems. Without such safeguards, organizations risk creating a propagation network for unsafe configurations.

Organizations should also actively monitor for indicators of exposure, such as reports of leaked control panels, updates on vulnerability counts, and security advisories related to misconfiguration classes. Tracking these trends will provide insights into whether the ecosystem is moving toward safer defaults or continuing to experience repeated incidents.

The Real Risks Ahead

As AI agents become increasingly networked, the current moment represents a critical inflection point. The potential for agents to autonomously share operational patterns before security models can adequately adapt poses significant risks. If widely adopted, a relay-style approach to agent discovery and messaging could enable configurations to propagate socially across semi-autonomous systems, bypassing the need for manual distribution.

The infrastructure for agent identity, discovery, and messaging is being established now, yet the underlying systems are already grappling with exposure issues. The question remains: will the ecosystem converge on safer practices and audit workflows, or will repeated incidents force a clampdown on the proliferation of agent communication protocols?

Conclusion: The Path Forward

As we navigate this new frontier of interconnected AI agents, the stakes are high. The transition from isolated tools to networked entities is not merely a technological evolution; it is a fundamental shift that necessitates a reevaluation of our security paradigms.

Organizations must act swiftly and decisively to integrate robust security measures into their AI frameworks. The time to address these challenges is now, as the landscape of AI agents continues to evolve, shaping the future of technology and its associated risks. The protocols being developed today will determine whether the scaling of these systems favors defenders or adversaries, thereby impacting the foundational structure of our digital ecosystem.

Original source: https://cryptoslate.com/thousands-of-ai-agents-join-viral-network-to-teach-each-other-how-to-steal-keys-and-want-bitcoin-as-payment/

Pro

Continue reading with Pro

Get unlimited access to our full news feed, ad-free browsing, and advanced filters.

Subscribe to Pro - $3.99/mo

Already a subscriber? Log in

Comments 0

Log in to join the conversation.

No comments yet. Be the first to share your thoughts!

Categories

  • Commodities
  • Companies
  • Crypto
  • Currencies
  • Featured
  • Macro

Related

One year under Paul Atkins, SEC's crypto stance shows break with past
One year under Paul Atkins, SEC's crypto stance shows break with past
DeFi TVL Plummets Across Top Chains After KelpDAO Hack
DeFi TVL Plummets Across Top Chains After KelpDAO Hack
Bitcoin price drops to $75K as new Hormuz closure puts focus on oil
Bitcoin price drops to $75K as new Hormuz closure puts focus on oil
Bitcoin Could Avoid a Full Quantum Freeze Under New ‘Canary’ Proposal
Bitcoin Could Avoid a Full Quantum Freeze Under New ‘Canary’ Proposal
← All News articles
AssetMarketCap

Market capitalization is typically calculated by multiplying an asset's circulating supply by its current market price. For commodities, circulating supply is estimated using proven reserves (for oil and gas) or above-ground stock estimates (for precious metals). For currencies, supply is based on M2 money supply data sourced from TradingEconomics.com. The real estate market value is an inflation-adjusted estimate derived from a historical baseline, with data sourced from Statista.com. Values denoted by ~ are best estimates based on the most recent available data and may not reflect exact figures.

Quick Links

  • App
  • Community
  • Deals
  • Learn
  • News
  • Merch
  • Newsletter
  • Pricing
  • Pro
  • API
  • Support

Our Partners

  • Kraken
  • ByBit
  • Ledger
  • NordVPN
  • TradingView

Newsletter

Stay informed with market insights, asset analysis, and the latest developments across crypto, equities, commodities, and more, delivered straight to your inbox. Subscribe

Disclaimer: The content on AssetMarketCap is for informational and educational purposes only and does not constitute financial, investment, tax, or legal advice. Trading and investing in financial instruments, including cryptocurrencies, carries a high level of risk and may not be suitable for all investors. Always conduct your own research and consult a qualified financial advisor before making any investment decisions. Past performance is not indicative of future results. Privacy

© AssetMarketCap.com . All rights reserved. Bitcoin Donations: bc1q5dsmgwd5nl4g33jkf7sh5r8r6n3exncteesadd