SlowMist Flags Security Breach in NOFX AI Trading System Built on DeepSeek/Qwen

18-Nov-2025 Crypto Economy

TL;DR:

  • SlowMist found severe NOFX AI vulnerabilities that exposed private keys and API credentials.
  • Over 1,000 public deployments may have been affected.
  • Users should disable admin mode, reset all keys, and apply security fixes immediately.

SlowMist has raised a serious warning after uncovering deep security gaps inside NOFX AI, an automated trading system built on DeepSeek/Qwen. What began as a routine investigation quickly turned into a troubling discovery: in several versions of the platform, attackers could access private wallet keys and API credentials without needing any form of authentication. For users running NOFX for months or years, the possibility of funds being quietly drained is now a very real concern.

System Flaws Expose Keys and Prompt Industry-Wide Response

During its investigation, SlowMist found two core issues at the heart of the breach. The first was a “zero-authentication” admin mode that some deployments enabled by default, allowing anyone to query system endpoints and pull sensitive data. The second came from a weak JWT setup using a hardcoded secret. Even after attempts to patch the problem, the unchanged default secret meant attackers could still forge valid tokens. SlowMist estimates that more than 1,000 public deployments may have been exposed because of these oversights.

SlowMist found severe NOFX AI vulnerabilities that exposed private keys and API credentials.

Once confirmed, SlowMist coordinated with major exchanges, including Binance and OKX, to help revoke compromised API keys and notify affected users. That process went relatively smoothly for centralized exchanges, but decentralized platforms presented a tougher challenge. Users operating through chains such as Aster or Hyperliquid proved harder to contact, and SlowMist emphasized that those relying on NOFX AI in decentralized environments should reset their keys immediately before resuming activity.

To help reduce the risk of further breaches, SlowMist outlined several urgent recommendations. Users should turn off admin mode, replace the default JWT secret with a strong unique one, and limit how endpoints handle sensitive information so they no longer return private keys directly. Until NOFX developers implement deeper structural fixes, SlowMist warns that any public NOFX AI deployment should be considered high-risk and treated with extreme caution.

Also read: Sharps Technology Posts Debut Quarterly Results, Shares Hit Record Lows
About Author Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc fermentum lectus eget interdum varius. Curabitur ut nibh vel velit cursus molestie. Cras sed sagittis erat. Nullam id ante hendrerit, lobortis justo ac, fermentum neque. Mauris egestas maximus tortor. Nunc non neque a quam sollicitudin facilisis. Maecenas posuere turpis arcu, vel tempor ipsum tincidunt ut.
WHAT'S YOUR OPINION?
Related News