![Nethermind Security Profile](https://pbs.twimg.com/profile_images/1833390875193577474/8K4L6rxZ_x96.png)
Nethermind Security
@NethermindSec
Followers
383
Following
63
Statuses
145
All of @NethermindEth's expertise, zeroed in on security solutions for Ethereum and Starknet builders. Get an audit now @ https://t.co/Q0rPzmsKUy
Joined September 2024
RT @intoverflow: this ain’t your father’s formal verification @NethermindEth is using the latest methods to deliver precise, useful models…
0
5
0
Who verifies the (zk) verifier? Nethermind! The Formal Verification team at @NethermindSec, led by @JulekSU, just made history by formally verifying the honesty of @ZKSync’s on‑chain zk verifier using EasyCrypt. This is the first time formal verification has been applied to a real-world zk verifier. This breakthrough result confirms the integrity of the verifier, while showcasing ZKSync’s commitment to ZKP security. Huge thanks to @dfirsov, @rub_duck_type, @convoluted_code, @the_matter_labs, and the EasyCrypt team (especially Pierre-Yves Strub) for their invaluable collaboration on this project. Read our blog to see how Nethermind’s pioneering formal verification work is helping secure ZKSync.
2
17
93
In collaboration with @intmaxIO, the Formal Verification team at Nethermind Security has formalized the INTMAX2 protocol in @leanprover. Using hard formal methods, we have proven the key security property claimed in the INTMAX2 whitepaper: no adversary can manipulate the rollup so that the rollup contract has insufficient funds to back the funds on the rollup itself. This work, led by @JulekSU, provides the highest level of certainty that the security properties outlined in the whitepaper hold for any correct implementation. Learn more about formal verification and how it secures INTMAX2 in our latest blog 👇
2
7
25
RT @lagoon_finance: 🌊 Lagoon puts user's security first. That's why, our protocol has been reviewed by @NethermindSec 🛡 — weeks before rel…
0
10
0
Denial of Service (DoS) attacks can disrupt smart contracts, making some features or the entire protocol unusable. DoS attacks take many shapes and they are executed differently from one protocol to another. This attack vector can cause financial and operational issues for the protocol and its users. Learn how DoS attacks work with some hands-on examples, and how to prevent these kinds of vulnerabilities while developing your protocol. 👉 Stay ahead of threats and secure your contracts:
0
0
3
RT @DiegoMarmsoler: We are happy to announce that @JulekSU will give a keynote at #FMBC25 @ETAPSconf Julian leads the formal verification…
0
6
0
It's been a pleasure collaborating with @intmaxIO on formally verifying key security properties of the INTMAX2 protocol using @leanprover. Blog post and source coming out shortly. Formal verification is crucial for ensuring security and correctness of blockchain protocols like INTMAX2, providing rigorous guarantees of their behaviour and helping to prevent any future exploits.
0
14
57
RT @jack__sanford: Top 5 AI Security Agents (January 14th, 2025) Based on some early research, these security agents seem to have the most…
0
8
0