Scraped data of 101,000 users links their wallet addresses

Quick Take

  • Banteg, a core contributor to Yearn Finance, published scraped details of over 101,000 users — including addresses and Twitter usernames.

Banteg, a pseudonymous core contributor to Yearn Finance, has published a repository of publicly available scraped data, containing critical details of users on the platform on GitHub. This includes wallet addresses on Base and corresponding Twitter usernames for over 101,000 users.

“101,183 people have given access to post as them, leaked db (database) indicates,” Banteg said. This statement came after he released a CSV file containing detailed user data.

Banteg’s move extended beyond the repository. He also highlighted a troubling situation involving’s permissions, asserting that these users had granted the ability to post on their behalf — possibly without complete understanding or consent.

The information was unveiled following Spot On chain analysts’ discovery that’s API had "leaked" information. For example, Twitter usernames and associated crypto wallets belonging to users can be viewed by others through the API. Currently, the project states on its website that its data privacy policy is "coming soon.", operating as a web3 social application on the Coinbase-incubated Layer 2 chain Base, provides a platform for trading shares in Twitter accounts. This feature gives shareholders unique access to private chat rooms.


Keep up with the latest news, trends, charts and views on crypto and DeFi with a new biweekly newsletter from The Block's Frank Chaparro

By signing-up you agree to our Terms of Service and Privacy Policy
By signing-up you agree to our Terms of Service and Privacy Policy

With the platform gaining traction due to recent high-profile signups, it has also generated protocol fees exceeding $1.42 million in the last 24 hours, ranking it among the top three crypto projects in terms of user-paid fees. responded by saying the information was publicly available and hence not leaked.

"This is just someone scraping our public API that shows the association between public wallet addresses and public Twitter usernames," the company said in a comment on social media. 

(Corrects headline and depiction to characterize list as resulting from scraping.)

© 2023 The Block. All Rights Reserved. This article is provided for informational purposes only. It is not offered or intended to be used as legal, tax, investment, financial, or other advice.

About Author

Vishal Chawla is The Block’s crypto ecosystems editor and has spent over six years covering tech protocols, cybersecurity, artificial intelligence and cloud computing. Vishal likes to delve deep into blockchain intricacies to ensure readers are well-informed about the continuously evolving crypto landscape. He is also a staunch advocate for rigorous security practices in the space. Before joining The Block, Vishal held positions at IDG ComputerWorld, CIO, and Crypto Briefing. He can be reached on Twitter at @vishal4c and via email at [email protected]


To contact the editor of this story:
Adam James at
[email protected]