Bybit Expands AI Trading Skills Hub, Adding Algorithmic Strategies and New Security Layer

20-Mar-2026 Crypto Economy

TL;DR:

  • Bybit expanded its AI Trading Skills Hub with copy trading, advanced bot management and new institutional-grade algorithmic strategies.
  • A dual verification mechanism was introduced, requiring consistency across two independent channels before executing any operation.
  • Users can now replicate strategies from other traders and manage full-cycle bots through natural language instructions.

Bybit announced an update to its artificial intelligence platform focused on trading. The exchange expanded its AI Trading Skills Hub with the integration of copy trading tools, advanced algorithmic bot management and a new dual verification security system, aiming to strengthen what the company calls “agentic trading”.

The upgrade transforms Bybit’s Hub from an execution tool into a full orchestration layer. Users and AI agents can now replicate strategies from other traders, automate portfolio management and execute institutional orders, all through natural language instructions.

Bybit

Bybit Connects Retail Traders with Institutional Strategies

One of the most significant changes is the incorporation of copy trading through AI. Bybit enables users to identify and follow successful recommended traders directly within the artificial intelligence environment, establishing leader-follower relationships with minimal friction. The goal is to reduce the gap between novice operators and more sophisticated strategies.

Additionally, the Hub extends its reach to the full lifecycle of trading bots. Users can create, close and adjust risk parameters —including take-profit, stop-loss and trailing stop— across strategies such as Spot Grid, Dollar-Cost Averaging, Futures Grid, Futures Martingale and Futures Combo Bots. AI agents dynamically adjust these configurations based on market conditions.

crypto trading

The update also incorporates institutional-grade algorithmic execution tools: Chase Limit Orders, Iceberg Orders and TWAP (Time-Weighted Average Price) orders. These mechanisms allow users to minimize market impact when operating large-size positions.

Dual Verification Before the Code Executes

The most notable security component is a dual verification mechanism designed to mitigate software supply chain attacks. The system requires consistency between two independent trusted sources before executing any instruction. According to the company, a compromised repository —such as GitHub— or a tampered distribution channel would not be sufficient on their own to inject malicious code. An attacker would need to compromise both systems simultaneously.

This sweeping upgrade reflects the priority Bybit places on security infrastructure in a context where advanced automation also expands the attack surface available to cybercriminals.

Also read: Mastercard’s $1.8B Bet Puts XRP Infra Back in Focus
About Author Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc fermentum lectus eget interdum varius. Curabitur ut nibh vel velit cursus molestie. Cras sed sagittis erat. Nullam id ante hendrerit, lobortis justo ac, fermentum neque. Mauris egestas maximus tortor. Nunc non neque a quam sollicitudin facilisis. Maecenas posuere turpis arcu, vel tempor ipsum tincidunt ut.
WHAT'S YOUR OPINION?
Related News