Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw๐Ÿฆž
Language
  • ็ฎ€ไฝ“ไธญๆ–‡
  • ็นไฝ“ไธญๆ–‡
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data๏ผˆAPI๏ผ‰
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

ยฉ Copyright 2013-2026. All rights reserved.

็ฎ€ไฝ“็น้ซ”English
|Legacy
BTCBTC
๐Ÿ’ฒ70452.60
+
1.24%
ETHETH
๐Ÿ’ฒ2065.30
+
1.66%
SOLSOL
๐Ÿ’ฒ87.14
+
2.23%
USDCUSDC
๐Ÿ’ฒ1.00
+
0.01%
HYPEHYPE
๐Ÿ’ฒ37.41
+
5.37%
XRPXRP
๐Ÿ’ฒ1.39
+
0.72%

ๆ˜Ÿ็ƒๆ—ฅๆŠฅ
ๆ˜Ÿ็ƒๆ—ฅๆŠฅ|3ๆœˆ 11, 2026 11:43
The Ministry of Industry and Information Technology has issued a "six dos and six don'ts" suggestion on preventing security risks of OpenClaw ("lobster") open-source intelligent agents Odaily Planet Daily News: In response to the security risks in typical application scenarios of "crayfish", the Network Security Threat and Vulnerability Information Sharing Platform (NVDB) of the Ministry of Industry and Information Technology has organized intelligent agent providers, vulnerability collection platform operation units, network security enterprises, etc. to study and propose the "six musts and six don'ts" suggestion. It is suggested that in financial trading scenarios, there is a prominent risk of triggering erroneous transactions or even account takeover. By deploying "Lobster" for enterprises or individuals, calling financial related application interfaces, automated trading and risk control can be carried out, improving the efficiency of quantitative trading, intelligent investment research, and asset portfolio management, and achieving functions such as market data capture, strategy analysis, and trading instruction execution. The coping strategies include: implementing network isolation and minimum permissions, and closing unnecessary Internet ports; Establish a manual review and circuit breaker emergency mechanism, and add secondary confirmation for key operations; Strengthen supply chain audits, use official components, and regularly fix vulnerabilities; Implement full chain auditing and security monitoring to promptly identify and address security risks. (Ministry of Industry and Information Technology)
+6
Mentioned
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Timeline

3ๆœˆ 12, 01:30Paraguay Strengthens Cryptocurrency Tax Regulation
3ๆœˆ 11, 02:02Jeni-kun's OpenClaw team launches the Lista DAO project
3ๆœˆ 10, 06:38Bybit Institutional Product Launch Event Goes Live Tonight
3ๆœˆ 08, 02:01The U.S. Treasury Department proposes establishing a 'freeze safe harbor' mechanism for digital assets.
3ๆœˆ 05, 04:31Max Schwarzer joins Anthropic
3ๆœˆ 04, 03:27CFTC Chairman Calls for the Swift Passage of the CLARITY Act
3ๆœˆ 03, 16:01Brazil's central bank issues new regulations requiring crypto trading platforms
3ๆœˆ 03, 03:23The top five domestic AI applications are Doubao, DeepSeek, etc.
3ๆœˆ 01, 01:23The United States used Anthropic technology in a Middle East attack
2ๆœˆ 28, 07:31OKX Releases 40th PoR Report and New Product

HotFlash

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink

Hot Reads