HE1M Profile Banner
HE1M Profile
HE1M

@0xHE1M

Followers
1,246
Following
87
Media
7
Statuses
50

Bug Bounty Hunter

Ethereum
Joined March 2022
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@0xHE1M
HE1M
1 year
Did you know that IMMUTABLE variables can be initialized **more than once** or even left **uninitialized** (assigning default value)?
Tweet media one
17
13
132
@0xHE1M
HE1M
1 year
Glad to be part of @optimismFND contest in @sherlockdefi
Tweet media one
@sherlockdefi
SHERLOCK
2 years
✨🔴 Optimism 🔴✨contest post-mortem soon 👀 TL;DR - Top-notch team Sherlock paid to compete found a High Solo ( @zachobront @trust__90 ) - "Not well-known" security expert found a High Solo Sherlock is the only auditor in the world who incentives both types of participants 💪
1
4
33
13
4
123
@0xHE1M
HE1M
1 year
Thanks @code4rena Great project @zksync
@code4rena
Code4rena
1 year
Awards have been announced for the $180,500 USDC @zksync Era audit competition 🐺 Top 5: 🥇 ronnyx2017 - $71,748.21 USDC 🥈 HE1M - $27,100.66 USDC 🥉  @bin2chen - $10,743.03 USDC 🏅  @jeiwan7 - $8,774.78 USDC 🏅  @vinami - $8,354.38 USDC (1/2)
Tweet media one
8
4
58
8
2
65
@0xHE1M
HE1M
1 year
@andyfeili
Andy Li
1 year
I talk to @zachobront about his audit process, how he collaborates with other top auditors to find unique bugs and his recent success on @immunefi and @sherlockdefi .
13
26
127
1
5
65
@0xHE1M
HE1M
1 year
Attack scenario: - The whitehat reports the finding. - The project is unresponsive. - @immunefi removes it from the platform. The project is the winner, and the whitehat is the loser!!!
@usmannk
usmann
1 year
Remember that projects can simply not pay, whitehat. Should I drop the writeup?
Tweet media one
22
16
211
5
1
42
@0xHE1M
HE1M
1 year
You can not initialize IMMUTABLE variables inside a WHILE loop, but surprisingly they can be initialized inside a FOR loop. For instance, in the code below, ImmVar can be initialized more than once.
Tweet media one
8
4
35
@0xHE1M
HE1M
11 months
@0xTendency @HollaWaldfee100 @xiaoming9090 @WatchPug_ Try to explain the codebase for a person who doesn’t know anything about programming, then you will find out something in the middle of discussion that you were not looking at before. It helps to see the codebase from different points of view.
1
3
29
@0xHE1M
HE1M
1 year
In continuation of Immutables story: They can be initialized more than once or left uninitialized if using the modifier in constructor. In other words, by using modifiers we can run the function (to which the modifier is applied) more than once or even skip it. @solidity_lang
3
3
30
@0xHE1M
HE1M
1 year
Glad to be part of @zksync contest in @code4rena
@code4rena
Code4rena
2 years
(1/2) Awards have been announced for the $165,500 USDC @zksync V2 contest! Top 5: 🥇 Soosh - $70,985.01 USDC 🥈 HE1M - $34,676.27 USDC 🥉 codehacker - $24,571.73 USDC 🏅 0x1f8b - $2,320.96 USDC 🏅 chaduke - $2,102.32 USDC
Tweet media one
4
1
40
3
2
27
@0xHE1M
HE1M
10 months
😎
Tweet media one
2
1
22
@0xHE1M
HE1M
1 year
@hacking_this @trust__90 You are discouraging a trusted whitehat from saving our ecosystem. The laws you mention as well as other laws are what took our freedom.
2
0
21
@0xHE1M
HE1M
1 year
Interestingly, if you insert the parameter _counter higher than 10, the code inside FOR loop will not be reached, so the immutable variable ImmVar will be uninitialized and will have the default zero value.
5
0
21
@0xHE1M
HE1M
1 year
Example 2: In the following code, the body of constructor will be run twice. Each time, a new value will be assigned to the immutable x (0 is assigned in the first time, 7 is assigned in the second time). So, the values of firstValue and secondValue will be 0 and 7, respectively.
Tweet media one
2
2
7
@0xHE1M
HE1M
2 years
Greate finding!
@iosiro_security
iosiro
2 years
We recently disclosed a high risk double-spend vulnerability in @AcrossProtocol 's bridge relayer infrastructure. No user funds were at risk! The issue was fixed and awarded with a $90,000 🪲 bounty. Read all the juicy details here:
4
20
71
0
0
6
@0xHE1M
HE1M
1 year
Example 1: In the following code, the body of constructor will be skipped, so the immutable x will be left uninitialized. So, it will have default value of 0 instead of 1.
Tweet media one
2
1
5
@0xHE1M
HE1M
2 years
Again “uninitialized variable”!!!
@0xriptide
riptide
2 years
My bug bounty write-up on a critical vulnerability I discovered on Arbitrum Nitro which allowed an attacker to steal all incoming ETH deposits to the L1->L2 bridge @icodeblockchain @samiamka2 @Mudit__Gupta @0xRecruiter @BowTiedCrocodil @BowTiedDevil
63
224
1K
0
0
4
@0xHE1M
HE1M
1 year
@usmannk Had the same experience unfortunately!!!
1
0
4
@0xHE1M
HE1M
2 years
@akincibor1 @immunefi @wormholecrypto It happened to me on the aspenLabs project. I reported two bugs, but they were unresponsive. Finally it was delisted from @immunefi platform.
0
0
3
@0xHE1M
HE1M
2 years
@joranhonig @immunefi Every day is a bounty hunting day!
0
0
2
@0xHE1M
HE1M
2 years
@Platypusdefi First hack, then negotiate! This is the new approach that white hats are following, because the projects do not behave honestly in bug bounty programs.
0
0
2
@0xHE1M
HE1M
1 year
1
0
2
@0xHE1M
HE1M
2 years
@farazsth98 This happens a lot in @immunefi . The protocols try to downgrade your report, and Immunefi can not do anything. Even worse, if the protocol is not responsive at all and you insist on it, Immunefi only finally removes them from platform silently.
1
0
2
@0xHE1M
HE1M
2 years
0
0
2
@0xHE1M
HE1M
2 years
@realgmhacker @immunefi If a protocol has a bug bounty but no TVL, it is waste of time for white hats if they find critical bug. 😁
1
0
2
@0xHE1M
HE1M
1 year
@DevABDee No, it is just insane without any use case!
0
0
1
@0xHE1M
HE1M
2 years
@trust__90 @samczsun That is correct, you are right. I will do the same!
0
0
1
@0xHE1M
HE1M
2 years
@0xAstronatey Sad to hear that! Projects sometimes do their best to downgrade our findings, that is when a black hat borns😁
1
0
1
@0xHE1M
HE1M
1 year
0
0
1
@0xHE1M
HE1M
2 years
@joranhonig Spending lots of time to review again results in a duplicate report.
1
0
1
@0xHE1M
HE1M
2 years
@pcaversaccio A post mortem regarding this feature or bug is explained in details by @saurik in optimism @optimismFND .
0
0
1
@0xHE1M
HE1M
1 year
@akshaysrivastv It is fixed in 0.8.20
1
0
1