<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Coinbase — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/coinbase/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 14 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/coinbase/feed.xml" rel="self" type="application/rss+xml"/><item><title>Coinbase AgentKit Prompt Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-coinbase-agentkit-prompt-injection/</link><pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-coinbase-agentkit-prompt-injection/</guid><description>A prompt injection vulnerability in Coinbase AgentKit allows for potential wallet drain, infinite approvals, and agent-level remote code execution.</description><content:encoded><![CDATA[<p>A critical vulnerability has been identified in Coinbase&rsquo;s AgentKit, a framework used for creating AI agents. This vulnerability stems from a prompt injection flaw that could be exploited to achieve several malicious outcomes, including draining user wallets, granting infinite transaction approvals, and even achieving remote code execution at the agent level. The vulnerability, validated by Coinbase with on-chain proof-of-concept, highlights the risks associated with integrating AI agents into sensitive financial platforms. Defenders need to understand the potential attack vectors and implement mitigations to prevent exploitation of this flaw, especially as AI-powered financial tools become more prevalent. The impact of successful exploitation could range from individual user losses to widespread platform compromise, making it a high-priority threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious prompt containing instructions designed to manipulate the AgentKit.</li>
<li>The malicious prompt is injected into the AgentKit via user input or data feed.</li>
<li>The AgentKit processes the injected prompt, misinterpreting the attacker&rsquo;s instructions as legitimate commands.</li>
<li>The manipulated AgentKit interacts with the user&rsquo;s Coinbase wallet.</li>
<li>The attacker leverages the prompt injection to initiate unauthorized transactions, draining the wallet.</li>
<li>Alternatively, the attacker could manipulate the AgentKit to grant infinite approval permissions for specific contracts.</li>
<li>If successful, the attacker achieves agent-level remote code execution, allowing full control over the AgentKit instance.</li>
<li>The attacker can then propagate the attack to other users or systems connected to the compromised AgentKit.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the AgentKit prompt injection vulnerability could lead to significant financial losses for Coinbase users. Attackers could drain wallets, steal cryptocurrency assets, and gain unauthorized access to user accounts. The potential for infinite approval grants further exacerbates the risk, enabling attackers to repeatedly withdraw funds over an extended period. Furthermore, agent-level RCE allows for complete compromise of AgentKit instances, potentially affecting a large number of users and impacting the overall security and trust of the Coinbase platform. The number of potential victims is substantial given Coinbase&rsquo;s user base.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious URLs related to the AgentKit endpoints to identify potential exploitation attempts (webserver, linux).</li>
<li>Implement input validation and sanitization measures to prevent prompt injection attacks within AgentKit, focusing on areas where user-supplied prompts are processed (application code review).</li>
<li>Deploy the Sigma rule to detect exploitation attempts by identifying suspicious keywords in HTTP request URIs (rule: &ldquo;Detect Suspicious AgentKit Prompt Injection&rdquo;).</li>
<li>Monitor network traffic for connections to potentially malicious URLs associated with known prompt injection attacks (IOC: <a href="https://x402warden.com/research/coinbase-agentkit-prompt-injection/)">https://x402warden.com/research/coinbase-agentkit-prompt-injection/)</a>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>prompt-injection</category><category>coinbase</category><category>agentkit</category><category>wallet-drain</category></item></channel></rss>