<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Smart-Contract on ThreatProphet</title><link>https://threatprophet.com/tags/smart-contract/</link><description>Recent content in Smart-Contract on ThreatProphet</description><generator>Hugo -- 0.161.1</generator><language>en-us</language><lastBuildDate>Wed, 29 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://threatprophet.com/tags/smart-contract/index.xml" rel="self" type="application/rss+xml"/><item><title>MansaTrade-Branded Recruitment Lure: Git Hook Staging Chain Delivers Multi-Module JavaScript Backdoor and Native Python Payloads</title><link>https://threatprophet.com/posts/2026-04-29-mansatrade/</link><pubDate>Wed, 29 Apr 2026 00:00:00 +0000</pubDate><guid>https://threatprophet.com/posts/2026-04-29-mansatrade/</guid><description>Analysis of a MansaTrade-branded smart-contract developer task delivered through a domain-authenticated email with a ZIP attachment containing malicious local Git hooks, which staged a Node.js loader, multi-module JavaScript backdoor, and native Python/Cython auxiliary payloads.</description></item></channel></rss>