If someone else attempts to counterfeit that currency and pass those COINS, there are sufficient counterfeiting laws on the books to prosecute those counterfeiters.
The crime of holding or using counterfeit currency is an act of knowingly holding or using forged currencies in a large number with intention of circulation.
Jacob gave examples of some of the vulnerabilities like Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), HTTP Response Splitting, Session Fixation, and SQL Injection.
The man who steals your checkbook and signs your name to one of the checks has committed the offense of forgery, for which he may be penalized by fine and imprisonment.