Connect with us

Crypto World

MetaMask plugs Uniswap API directly into in-wallet swaps

Published

on

MetaMask plugs Uniswap API directly into in-wallet swaps

MetaMask has integrated the Uniswap API as a core swap provider, routing in-wallet trades through Uniswap v2, v3, v4, and UniswapX across 16+ networks for deeper, CEX-like liquidity.

MetaMask has integrated the Uniswap API as one of its core swap providers, allowing users to route trades directly through Uniswap v2, v3, v4, and UniswapX from within the wallet across more than 16 networks. The move tightens the link between the most widely used self-custodial wallet and the largest on-chain DEX liquidity venue, effectively turning MetaMask into a front-end for Uniswap’s full routing stack rather than just a generic swap aggregator.

According to the announcement, MetaMask selected the Uniswap API based on liquidity depth, pricing efficiency, and infrastructure reliability across supported chains. The same API already powers swap flows for Uniswap Labs’ own products, as well as institutional and retail platforms including OKX, Talos, Fireblocks, Anchorage Digital, and Ledger, giving it a track record with both exchanges and custody providers. For end users, this means tighter spreads and deeper routing for volatile or long-tail assets without leaving the wallet.

Advertisement

The scale is non-trivial: cumulative historical trading volume through the Uniswap protocol has now exceeded 40 trillion dollars, underscoring how much order flow and price discovery sits on its pools. By plugging that liquidity into MetaMask’s native swap UX, the integration effectively reduces friction between retail order flow and DeFi’s largest AMM infrastructure. In practical terms, MetaMask users get a more “CEX-like” experience on-chain: one click to quote and execute across fragmented pools and versions.

For developers, the Uniswap API remains free to integrate, with no subscription or per-call fees; teams can generate API keys via the Uniswap developer platform and tap into the same routing engine now wired into MetaMask. That pricing model keeps barriers low for wallets, fintechs, and trading tools that want industrial-grade routing without building their own infrastructure or paying SaaS-style tolls. Over time, this could consolidate more of the retail swap stack around Uniswap’s infra, even as liquidity at the protocol level remains open and permissionless.

Strategically, the MetaMask–Uniswap link pushes the ecosystem a step closer to a de facto standard: MetaMask as the default EVM wallet, Uniswap as the default DEX backend. For centralized venues and competing aggregators, the risk is that a growing share of high-intent order flow never touches their rails, instead going straight from self-custody into Uniswap liquidity via wallet-native swaps. For users, the incentive is simple: fewer hops, deeper liquidity, and reduced reliance on centralized intermediaries for everyday trading.

Advertisement

Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Crypto World

MediaTek Patches Bug Allowing Attackers To Steal Crypto Seeds

Published

on

MediaTek Patches Bug Allowing Attackers To Steal Crypto Seeds

Mobile phone chipmaker MediaTek patched a vulnerability affecting its chipsets in January that could have allowed an attacker to steal crypto seed phrases on affected devices using just a USB cable and the right software. 

The flaw was discovered by Ledger’s white-hat security team, Donjon, who had shared the vulnerability with MediaTek before a patch was rolled out on Jan. 5, though users who have not installed the latest security patches are advised to do so, said Ledger. 

Test device compromised in 45 seconds

According to Ledger, the flaw came from MediaTek’s secure boot chain, a security mechanism built into its chips that ensures a phone starts safely and only with authorized software during startup. 

In a statement shared with Cointelegraph, Ledger explained that the flaw meant an attacker with access to an Android phone could connect it to a computer via USB and bypass security protections, potentially gaining access to sensitive data on the device, including crypto wallet seed phrases. 

Advertisement
Source: Charles Guillemet

Around 25% of Android phones use the Trustonic Trusted Execution Environment (TEE) and MediaTek processors, which the security flaw exploits.

Donjon demonstrated the hack by connecting a Nothing CMF Phone 1 to a laptop and compromising the device’s security in approximately 45 seconds. 

“Without ever even booting into Android, the exploit automatically recovered the phone’s PIN, decrypted its storage, and extracted the seed phrases from the most popular software wallets: Trust Wallet, Base, Kraken Wallet, Rabby, Tangem’s Mobile Wallet and Phantom,” Ledger said.

While Ledger urged users to update their devices, a Ledger spokesperson told Cointelegraph they “don’t anticipate this to be an ongoing issue.” 

Mobile phones are never safe, Ledger says

With almost 36 million people managing digital assets on their phones as of early 2025, even a single vulnerability could put a significant number of wallets at risk.

Advertisement

In December 2025, Ledger revealed that it tested an attack on the MediaTek Dimensity 7300 (MT6878), and bypassed its security measures to gain “full and absolute control over the smartphone, with no security barrier left standing.”

Ledger chief technology officer Charles Guillemet told Cointelegraph in June 2020 that mobile phones, whether Android or iPhone, are “very difficult to have secure applications.”

Related: SlowMist introduces Web3 security stack for autonomous AI agents

He reinforced a similar view on Wednesday, posting on X:  “Smartphones aren’t built for security. Even when powered off, user data – including pins & seeds – can be extracted in under a minute.” 

Advertisement

“This research highlights a fundamental architectural difference: General-purpose chips are built for convenience. Secure Elements are built for key protection. A dedicated Secure Element isolates secrets from the rest of the system, protecting them even under physical attack,” he said.

Magazine: All 21 million Bitcoin is at risk from quantum computers