A circulating report claims a trader used Morse code-encoded prompts to trick Grok, the AI system linked to the X platform, into initiating transfers of billions of tokens from a verified wallet. The claim remains unverified, with no confirmed transaction data, token identity, or blockchain explorer evidence available at the time of writing.
What the Report Claims
TLDR KEYPOINTS
- A report alleges a trader used Morse code input to bypass Grok’s safeguards and trigger token transfers from a verified wallet.
- No blockchain, token ticker, transaction hash, or wallet address has been publicly confirmed in connection with the alleged exploit.
- The incident, if verified, would highlight serious risks in giving AI agents direct control over crypto wallets.
The report frames the incident around a verified wallet, a designation that typically signals the wallet owner has passed some form of identity or project validation. If accurate, the involvement of a verified wallet raises the stakes considerably, since users and counterparties tend to place greater trust in verified accounts.
However, critical details are missing. No specific blockchain has been named, no token ticker identified, and no on-chain transaction hash or explorer link has surfaced to corroborate the claim. Without that evidence, the report remains a single-source allegation.
How Morse Code Allegedly Bypassed Grok’s Guardrails
The core allegation is that a trader encoded prompts in Morse code to circumvent Grok’s input filters. This technique falls under the broader category of prompt obfuscation, where adversarial users disguise instructions in formats that an AI model interprets but that safety layers fail to flag.
If Grok was connected to a wallet execution layer, an obfuscated prompt that passed safety checks could theoretically trigger an unintended transaction. The reported outcome, billions of tokens moved, suggests the AI had direct or indirect signing authority over wallet operations.
No technical breakdown of the exploit chain has been published. It remains unclear whether Grok interpreted the Morse code natively, whether a middleware layer decoded it, or whether the AI’s guardrails were simply not designed to handle non-standard character encodings. Projects building on-chain AI agents, including those exploring zero-knowledge proof infrastructure on networks like Base, face similar questions about how to secure automated execution layers.
Why This Matters for AI Wallet Security
The scale implied by “billions of tokens” makes this report significant regardless of which token was involved. If an AI agent can be tricked into moving assets of that magnitude, the security model for every AI-linked wallet needs re-examination.
The broader trend of connecting AI systems to crypto wallets, whether for trading, portfolio management, or autonomous agent operations, introduces a new attack surface that combines prompt injection risk with irreversible financial transactions. Unlike a chatbot hallucination, a compromised wallet transaction cannot be undone.
The incident underscores the need for human approval layers, hard transaction limits, and policy-based execution checks before any AI-initiated transfer is signed. Projects that allow AI agents to control or influence wallets without these safeguards carry reputational and financial risk, particularly as stablecoin infrastructure expands across chains and the broader crypto market draws renewed attention.
Until on-chain evidence, a transaction hash, or an official statement from the Grok team surfaces, this report should be treated as an unconfirmed claim. Readers and project teams should monitor for follow-up disclosures before drawing conclusions about the specific vulnerability or its scope.
Additional source references: source document 1, source document 2.
Disclaimer: This article is for informational purposes only and does not constitute financial or investment advice. Cryptocurrency and digital asset markets carry significant risk. Always do your own research before making decisions.