Create
Query
event_store.db
—
events
actions
approvals
artifacts
commitments
constraints
conversation_state
conversation_turns
dead_letters
decisions
deliveries
effects
email_messages
email_reply_drafts
email_threads
entities
entity_aliases
entity_tags
episode_context_index
episodes
event_subjects
events
events_archive
fact_sources
facts
inbox_items
inbox_links
jobs
leader_leases
links
memory_candidates
memory_embeddings
memory_items
memory_items_fts
(v)
memory_items_fts_config
memory_items_fts_data
memory_items_fts_idx
opportunity_memory
pending_interactions
proposal_sources
proposals
reminders
schedules
schema_migrations
signal_candidates
signal_fps
signals
sms_conversations
sms_messages
sms_reply_drafts
source_cursors
sources
sqlite_sequence
sqlite_stat1
stream_cursors
threads
watchers
Toggle helper tables
memory_items_fts_content
memory_items_fts_docsize
memory_items_fts_segdir
memory_items_fts_segments
memory_items_fts_stat
Structure
Content
Query
Insert
Drop
Import
Export
Update row 2799 in events
seq
Primary key.
INTEGER
id
evt_b85680b098eb
TEXT NOT NULL
kind
signal_ingest
TEXT NOT NULL
ts
2026-04-08T00:59:02.318996+00:00
TEXT NOT NULL
actor
daemon:signal_enrichment
TEXT
subject_entity_ids
[]
TEXT
payload
{"created_at":"2026-04-07T23:23:54.391414+00:00","dedupe_key":"signal_enriched:discovery_crypto_extremes_delta:fdae8e802742710b","evidence_event_ids":["evt_e35760c47898"],"signal_type":"discovery_crypto_extremes_delta","source":"discovery_ingestor","value":{"aggregator_url":"https://decrypt.co/363364/north-korean-hackers-spent-six-months-infiltrating-drift-before-285m-exploit","as_of":"2026-04-07T23:23:54.391414+00:00","canonical_url":"https://decrypt.co/363364/north-korean-hackers-spent-six-months-infiltrating-drift-before-285m-exploit","enrichment":{"aggregator_url":"https://decrypt.co/363364/north-korean-hackers-spent-six-months-infiltrating-drift-before-285m-exploit","article_chars":4958,"article_truncated":false,"blocked_reason":null,"candidate_id":"sc_ef3fad309757f4a6","canonical_host":"decrypt.co","canonical_is_aggregator":false,"canonical_url":"https://decrypt.co/363364/north-korean-hackers-spent-six-months-infiltrating-drift-before-285m-exploit","content_type":"text/html; charset=utf-8","enriched_at":"2026-04-08T00:59:02.318942+00:00","extraction_method":"heuristic","fetched_description":"Drift Protocol said the attackers posed as traders, met contributors in person, and spent months infiltrating before draining the platform.","fetched_title":"North Korean Hackers Spent Six Months Infiltrating Drift Before $285M Exploit - Decrypt","final_url":"https://decrypt.co/363364/north-korean-hackers-spent-six-months-infiltrating-drift-before-285m-exploit","html_truncated":true,"paywall_likely":false,"publisher_domain":"decrypt.co","publisher_resolution":"canonical_url","requested_url":"https://decrypt.co/363364/north-korean-hackers-spent-six-months-infiltrating-drift-before-285m-exploit","source_event_id":"evt_e35760c47898","source_quality":"high","status_code":200,"version":"signal_enrichment_v2"},"fp":"4af12a2bb41a8919","kind":"crypto_extremes","published_at":"2026-04-06T09:52:05+00:00","publisher_domain":"decrypt.co","signal_understanding":{"analysis_basis":"article","claim_confidence":0.72,"dates_mentioned":[],"entities":[{"asset_class":"crypto_protocol","name":"Drift Protocol","relevance":"high","symbol":"","type":"company_or_protocol"},{"asset_class":"cyber_threat_actor","name":"North Korean hackers","relevance":"high","symbol":"","type":"threat_actor"},{"asset_class":"crypto","name":"BTC","relevance":"low","symbol":"BTC","type":"traded_asset"},{"asset_class":"crypto","name":"ETH","relevance":"low","symbol":"ETH","type":"traded_asset"}],"event_type":"conflict","information_gaps":["The provided text does not include the article body beyond the headline/source summary, so details like dates, method of compromise, and attribution evidence are not shown.","No confirmation is provided in the text about whether the $285M figure is exact, estimated, or net of recoveries.","The specific identities of the \u201ccontributors\u201d and the nature of the \u201cdraining\u201d (assets, contracts, timeline) are not included in the provided excerpt.","The large list of coin prices appears unrelated to the hacking claim and does not provide additional grounded details about the exploit."],"key_facts":["Drift Protocol stated attackers posed as traders.","Drift Protocol stated attackers met contributors in person.","Drift Protocol stated the attackers spent months infiltrating before the exploit.","The exploit amount is stated as $285M.","The attackers allegedly drained the platform."],"numeric_claims":[{"label":"exploit_amount_usd","value":"285M"}],"primary_claim":"Drift Protocol said North Korean hackers spent six months infiltrating the platform before carrying out a $285M exploit and draining it.","relevance_score":0.86,"sentiment":"negative","source_quality":"high","summary":"North Korean hackers allegedly infiltrated Drift Protocol for six months before executing a $285M exploit. The attackers reportedly posed as traders, met contributors in person, and then drained the platform.","topics":["crypto security","North Korea","hacking","Drift Protocol","exploit","infiltration","trader impersonation","in-person meetings","$285M exploit"]},"source":"Decrypt RSS","source_domain":"decrypt.co","summary":"Drift Protocol said the attackers posed as traders, met contributors in person, and spent months infiltrating before draining the platform.","tickers":[],"title":"North Korean Hackers Spent Six Months Infiltrating Drift Before $285M Exploit","url":"https://decrypt.co/363364/north-korean-hackers-spent-six-months-infiltrating-drift-before-285m-exploit"}}
TEXT NOT NULL
source_ref
candidate:sc_ef3fad309757f4a6
TEXT
confidence
REAL (default 0.0
dedupe_key
signal_enriched:discovery_crypto_extremes_delta:fdae8e802742710b
TEXT
episode_id
NULL
TEXT
created_at
2026-04-08T00:59:02.319054+00:00
TEXT NOT NULL (default strftime('%Y-%m-%dT%H:%M:%fZ','now')
Update
Cancel