BlockBeats News, July 13th. According to a message from SlowMist's Chief Information Security Officer 23pds, who retweeted a post exposed by X platform user @Miles082510, developer @web3_cryptoguy disguised himself as a Web3 "tool author" and provided a script tool that appears to scan local sensitive files in the background, with the intention of stealing private keys, wallet files, configuration files, code, mnemonic phrases, and other critical data. This data would be secretly uploaded to an anonymous server, and the entire process is almost imperceptible to users. Users are reminded to avoid using script tools from unknown sources.