Add daemon-guarded-4535.vercel.app to blocklist#1765
Add daemon-guarded-4535.vercel.app to blocklist#1765NoirReports wants to merge 1 commit intophantom:masterfrom
Conversation
📝 WalkthroughWalkthroughA single URL entry, Changes
🚥 Pre-merge checks | ✅ 3✅ Passed checks (3 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Tip Issue Planner is now in beta. Read the docs and try it out! Share your feedback on Discord. Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
There was a problem hiding this comment.
Actionable comments posted: 1
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.
Inline comments:
In `@blocklist.yaml`:
- Line 2322: The blocklist entry "url: daemon-guarded-4535.vercel.app" lacks
independent verification; before merging, confirm the urlscan.io finding
documents active malicious behavior (not just a static news clone) and
cross-check the domain against at least one independent threat feed such as
ScamSniffer, abuse.ch/URLhaus, or Google Safe Browsing; if verification fails,
remove or flag the "daemon-guarded-4535.vercel.app" entry in blocklist.yaml and
instead add a temporary note/metadata indicating unconfirmed status and
recommendation to monitor for Vercel ephemeral redeployments.
| - url: pumpp-fun.pages.dev | ||
| - url: phantom-restorewalletteamdesk.webflow.io | ||
| - url: dextoolwallets.on.fleek.co | ||
| - url: daemon-guarded-4535.vercel.app |
There was a problem hiding this comment.
🧩 Analysis chain
🏁 Script executed:
#!/bin/bash
# Query URLhaus (abuse.ch) for threat information on the domain
echo "=== URLhaus Lookup ==="
curl -s --max-time 15 \
"https://urlhaus-api.abuse.ch/v1/host/" \
-d "host=daemon-guarded-4535.vercel.app" 2>/dev/null | python3 -m json.tool 2>/dev/null || echo "URLhaus lookup unavailable"Repository: phantom/blocklist
Length of output: 115
🌐 Web query:
daemon-guarded-4535.vercel.app phishing scam threat
💡 Result:
The specific URL daemon-guarded-4535.vercel.app does not show obvious phishing behavior in a basic check: it currently serves what looks like a static “Lobsters” news-front-page clone, and the “Login / Recent / Comments / Search” links on that page don’t actually work (they return 404), which is consistent with a copied or incomplete static page rather than a functional credential-harvesting site. [1]
That said, .vercel.app subdomains are frequently abused in phishing/malware campaigns because they inherit trust from a legitimate hosting provider, and multiple threat reports document attackers hosting fake login/document pages and malware delivery on Vercel. [2][3]
What to do (safe handling)
- If you encountered this link via an email/DM/ad, treat it as suspicious and don’t enter credentials or download anything.
- If you already interacted with it (typed passwords, OAuth, downloaded files), tell me what you did and what it asked for, and I’ll walk you through incident steps.
- You can report the URL to Vercel (abuse report) and to your email/security tooling; campaigns often rotate to new subdomains quickly. [2][3]
Bottom line: I don’t see direct evidence (from this quick content check) that this exact subdomain is actively phishing right now, but because Vercel subdomains are commonly used for phishing, you should treat it as untrusted unless you can verify who sent it and why. [1][2][3]
Sources: [1] [2] [3]
🌐 Web query:
asdhhasdjjoizxoicjzxc GitHub user
💡 Result:
The GitHub username asdhhasdjjoizxoicjzxc belongs to a user whose display name is “Noir.”. The profile shows 3 public repositories, all forks: blocklist (from phantom/blocklist), scam-database (from scamsniffer/scam-database), and eth-phishing-detect (from MetaMask/eth-phishing-detect). [1]
Source(s):
[1] (github.com)
Citations:
Independently verify the domain threat before merging — submitter identity is legitimate, but threat evidence remains unconfirmed.
One significant concern and one operational note warrant review:
-
Unverified threat: The only threat evidence is a self-supplied urlscan.io scan. No independent threat-intelligence confirmation found in URLhaus, ScamSniffer, or public security feeds. Current web inspection shows the domain serving static content (non-functional news clone), not an active credential-harvester—though
.vercel.appsubdomains are frequently abused for phishing and should be treated cautiously. -
Vercel ephemeral deployments: Even if confirmed malicious, Vercel auto-generated subdomains (
adjective-noun-numberpattern) are ephemeral. The attacker can redeploy at a new URL immediately. A single-entry block may offer only short-term protection.
Note: The submitter (asdhhasdjjoizxoicjzxc, GitHub: "Noir") has an established GitHub presence with forks of legitimate security projects (phantom/blocklist, scamsniffer/scam-database, MetaMask/eth-phishing-detect), indicating active security research involvement rather than a throwaway account.
Recommended verification before merge:
- Confirm the urlscan.io result actually documents active malicious behavior (not just a static copy).
- Cross-reference against at least one independent public feed: ScamSniffer, abuse.ch URLhaus, or Google Safe Browsing.
- Consider whether Vercel-wide abuse patterns warrant a broader policy discussion, since single-entry blocks on ephemeral Vercel subdomains have limited durability.
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.
In `@blocklist.yaml` at line 2322, The blocklist entry "url:
daemon-guarded-4535.vercel.app" lacks independent verification; before merging,
confirm the urlscan.io finding documents active malicious behavior (not just a
static news clone) and cross-check the domain against at least one independent
threat feed such as ScamSniffer, abuse.ch/URLhaus, or Google Safe Browsing; if
verification fails, remove or flag the "daemon-guarded-4535.vercel.app" entry in
blocklist.yaml and instead add a temporary note/metadata indicating unconfirmed
status and recommendation to monitor for Vercel ephemeral redeployments.
Blocklist Addition:
daemon-guarded-4535.vercel.appSummary
Adding
daemon-guarded-4535.vercel.appto the Phantom blocklist. This domain is an active Solana wallet drainer — it prompts users to connect their Phantom wallet and then submits malicious transactions to steal all SOL and SPL tokens.Evidence
Domain Intelligence
(no WHOIS/intel data available)
Attack Details
Verification
Summary by CodeRabbit