Excited about a Web3 dev job offer? Be cautious—scammers are targeting developers!
Table of Contents
TL;DR To stay safe:
- use multi-signature wallets to store your digital assets
- never keep private-keys/mnemonics on your computer/cloud backup; only use pen/paper.
- have different browser profiles
- use a remote development environment like github code-spaces to run un-trusted code
How Do These Scams Work?
1. Fake Job Offers
Scammers post job listings claiming to need a developer for a React + Web3 integration.
They provide code and ask developers to run it locally!
VsCode recently introduced Workspace Trust that allows you to view code without allowing code execution to make it safe for you.
Never trust someone you see on the Internet and definitely never run their code locally.
2. Malicious Frontend Code
The provided code looks normal but may contain hidden scripts that interact with window.ethereum
(the MetaMask API).
Some scripts inject malicious JavaScript that hijacks wallet interactions.
3. MetaMask Wallet Draining
Users unknowingly sign a malicious transaction that grants attackers access to their wallet.
In some cases, the app may use XSS (Cross-Site Scripting) to inject unauthorized scripts.
If users mistakenly enter their private key or seed phrase into a fake prompt, their entire wallet gets drained.
Now that we’ve seen how fake job scams work, let’s break down how a compromised React app can actually steal your crypto.
How Can a React App Steal Crypto?
Here are some common attack vectors:
1. Fake MetaMask Popups (Phishing UI)
Scammers create fake MetaMask login popups that trick users into entering their seed phrase. Once entered, the attacker gains full access to the wallet.
2. Malicious Event Listeners
If the frontend has access to window.ethereum
, it can:
- Request account access (
eth_requestAccounts
). - Trick users into signing malicious messages (
personal_sign
). - Auto-submit transactions granting token approvals to attackers.
3. XSS (Cross-Site Scripting) Attacks
If the app has an XSS vulnerability, injected JavaScript can:
- Modify UI elements to mislead users.
- Intercept transactions before they are signed.
- Redirect funds to attacker-controlled wallets.
4. Clipboard Hijacking
Some malicious apps monitor clipboard activity and replace copied wallet addresses with the attacker's address when users try to send funds.
How to Protect Yourself
Just stay away from job postings that require you to: Just stay away from job postings that require urgency or running untrusted code.
✅ Never run untrusted code—even frontend-only applications can be dangerous.
✅ Inspect code carefully before executing anything, especially if it interacts with MetaMask.
✅ Use a separate browser profile for Web3 development.
✅ Disable clipboard access for unverified applications.
✅ Keep MetaMask updated to avoid known exploits.
✅ Check for injected scripts (open DevTools → Console → Look for unexpected network requests).
Final Thoughts
If you're a Web3 developer, be extra cautious when applying for jobs online. If someone asks you to execute their code, thoroughly review it first. A single malicious transaction or phishing attempt could result in losing your entire crypto portfolio.
Always use multi-signature wallets to protect assets you cannot afford to lose.