Sometimes it feels like I'm still dreaming. As a small kid, I always wanted to buy a car with my own money and have my parents sit in it. But at 21 years old, this nerd made the dream come true. I am always thankful for
#bug_bounty
🥹
#Web3
and to everyone in the cybersec
Behind each € / $ there is
- sleepless nights
- Early Mornings
- failures
- Time investment
- self doubt
- Endless efforts
- lot's of duplicates / N/a
- Lot's of demotivation
But everyone notice only € numbers
And call it is a luck
#infosec
@e11i0t_4lders0n
Hey Web3 folks! 🎉 I’m giving away 5 individual passes for
@bsidesahmedabad
2024—exclusively for Web3 enthusiasts! 📷
Retweet this post.
Comment below and tell us why you want to attend this event! 👇🏻
Good luck!
Let's meet in person at
Now I'm stopping hunting Fuel Attackathon!
I really enjoy hunting Fuel. I have learned a lot from it and gained a good understanding of fuel. It is a really interesting concept because of the UTXO (Unspent Transaction Output) model, which is a form of transaction data model.
No matter how much experience you have in bug bounty hunting and how many bugs you've found, there are times when trying harder to discover bugs results in frustration and disappointment. Even for someone who has found numerous critical bugs and is recognized as one of the best
I remember when I was a full-time web 2 bug hunter! In the initial days, I tried a lot to crack
@YogoshaOfficial
and join their elite hacker club, but unfortunately, I didn't complete their CTF at that time. So I started consistent work in
@HackenProof
and became the all-time top
Recently, I had an amazing talk with the
@msftsecresponse
security response team. I had a wonderful discussion on various topics with Dhavval Shrivastava and Neha Sharma. It's rare to see any tech company reaching out personally to improve its security measures. Really kudos to
Are you still wondering what automation in Web3 audits looks like? You might have missed out on
@solidityscan
! Built by the team at
@CredShields
,
@SolidityScan
automates your smart contract security audits with top-notch quality. It's not just effective; it’s a time-saver.
@PrismaFi
faced an $11.6M exploit, but white hat hackers returned the funds after negotiating a bounty through a rescue operation. Understanding the hack's root causes is crucial to prevent future incidents. Read more about the $11M hack breakdown
A few hours ago, a
@minerercx
exploited a vulnerability resulting in a loss of $456k.
The vulnerability lies in the `_update` function. If a user transfers tokens to themselves within the same transaction, there is indeed a potential for their balance to double. This scenario
Did you check out this awesome list of the top 10 bugs of 2023 on Immunefi? It's really insightful, and you'll notice that these bugs aren't exactly rocket science to find ?
Even with my years of experience finding critical bugs in many CEX exchanges, I have never collected this much PoC. One or two PoCs are enough. This incident doesn't look white hat at all
CertiK recently identified a series of critical vulnerabilities in
@krakenfx
exchange which could potentially lead to hundreds of millions of dollars in losses.
Starting from a finding in
@krakenfx
's deposit system where it may fail to differentiate between different internal
Once, a legend said, 'If you want to achieve success, stick with one thing,' and I really follow this advice. I'm stuck with
@0xOwenThurm
YouTube content; I'm truly obsessed with it. In my eyes, there is no one better than him in terms of creating videos on web 3 security
Thank you so much
@bsidesahmedabad
for organising such an amazing event and giving opportunities to all the hackers to network with each other . It goes without saying that the talks were really amazing and illuminating !
Avidly waiting for the next year ! ✨
#bsidesahmedabad
Recently, I tried the pay-per-vulnerability model for smart contracts audit, and I was really impressed with its results. It helped me put in more effort to find high and medium severity issues in the code, and it also compensated me more compared to regular audits.
In 2023, Web3 suffered $2.02B in losses:
$1.397B from 191 major attacks
$388M from 267 rug pulls
$238M from phishing scams.
68% of the attacks targeted
#DeFi
projects, resulting in the highest losses of $408M, constituting 29.2% of the total.
#CTFs
are not worth it these days. You cannot attract followers or clients by only showcasing your CTF results. You should definitely show your real-life findings, such as achieving a high rank in security contests or on big
#bounty
platforms, to attract clients or followers. So,
Recently, I completed another solo audit. The smart contract had already been audited multiple times, including by a Tier 1 auditing firm. Despite this, I was able to identify 1 medium, 2 low, and 3 gas optimization issues. The time spent on the audit was 10 hours.
#soloaudit
Hey everyone, I will be attending the
@MSFTBlueHat
Microsoft conference in Hyderabad on May 16th and 17th, where I'll be sharing some valuable insights about blockchain security. If anyone else is attending, feel free to connect with me there!
@IM_Mad_hub
The answer is simple: Build curiosity in your mind. Think about how everything works and how an attacker can find a bug even when top researchers have audited the code. Use your search skills to find hidden, important resources on Google. If you stay curious and keep learning all
Recently,
@PrismaFi
was exploited (or compromised) by a white hat hacker 🧐. While the terminology isn't crucial, what matters most is learning from the incident. That's why I'm preparing a full analysis of the root causes. Stay tuned for a complete hack analysis of
Recently, the $NORMIE Token suffered losses of $881,686. Read more about the hack and the black hat hacker's approach to exploiting the contract. You'll definitely learn a lot from this analysis.
🚨New IOP alert!🚨
@ThunderbyFuel
has launched an IOP on Immunefi — the first of the 4 Fuel dApps.
There's $65,000 in rewards available for all whitehats who found at least one valid vulnerability in the Fuel Attackathon.
Find out more:
Just a quick suggestion to new auditors who are going to start their first audit:
1) Read
@pashovkrum
reports. His reports are clear and simple, it easy to understand many tricky issues.
2) Start with small codebases! It helps boost your confidence. While there may be fewer
Hey everyone,
We're currently seeking a Security Researcher with extensive knowledge in security and a strong understanding of the web3 domain to join us at
@techfund_inc
and contribute to enhancing the security of
#web3
.
At
#TechFund
, we offer industry-level compensation, and
Hey everyone, we are launching the official Telegram community channel for
@techfund_inc
and soon will be available on Discord as well. Anyone willing to learn new tech and blockchain security from scratch can join this channel. Our experts also conduct sessions to teach you more
Hey everyone,
Today, I am thrilled to share a moment of immense pride: I have been honored as a
"Top Blockchain Voice"
by this incredible platform,
@LinkedIn
This recognition is not just about me; it's a testament to the power of collaboration, knowledge sharing, and
How can you sharpen your auditing skills? By continuously reading contest and public audit reports, especially those focusing on recent hack analyses (you can read recent exploits in
@techfund_inc
), and understanding the exploit code. Then, initiate your own hack analyses. This
Hey fam, I've created TopMate, where you can book direct calls with me for anything related to Web 3 / security. You can consult with me directly through LiveMe
If you think it's not too late to enter the Web3 security space, then maybe you're wrong. I can clearly see that researchers who find and receive rewards for vulnerabilities are now discovering that they no longer exist or are easily detected by bot races.
I'm super excited to share that this year I'm attending the
@BcryptGlobal
Conference 2023 in Delhi to represent
@qoodo_io
. We're eager to connect, interact, and share insights about
#Qoodo
check out
#QDO
Presale -
Glad to see Sway gaining popularity among auditors! In the past few weeks, I've received a lot of DMs about learning Sway audit stuff. It’s wild how fast it’s taking off!
#Sway
@fuel_network
After conducting many audits, I realized one thing: if you're unable to find a single issue, you probably don't fully understand the code.
#Bugs_are_everywhere
.
Three mistakes by
@WazirXIndia
, which, if avoided, might have led to a different outcome:
1. They responded too late to the hack. Even an hour after the hack, their team had not responded, which is not expected from a big crypto exchange.
2. They did not have a proper incident
Finally, here is Episode 3. To be honest, I have been eagerly waiting for this. It's one of the best audio series I have ever watched. Respect ++
@0xOwenThurm
. If you are still missing masterpieces . watch here =
Happy New Year, everyone 💫! May Lord Ram assist each one of you in achieving your
#2024
goals, making it the most successful year of your lives.
#happynewyear
#2024goals
@IAmNickDodson
Honestly, I have years of auditing experience in different chains and lang, but Fuel Sway are something different. I participated in a Fuel Attackathon on Immunefi for the first time, and now there's no going back. It's really fun to work with Fuel Sway
Building a comprehensive mind map during an
#audit
is crucial. It really helps in understanding the complex code flow in a much easier way. I’ve manually created tons of flowcharts and mind maps, and it truly makes my job easier
@SwayLang
@fuel_network
I noticed that everyone is talking about
#web3
security and
#web2
security, but there is no one discussing web2.5 security! I believe there are many skilled researchers working in both areas of security, but there is a huge gap in
#web2
.5 security. Researchers should definitely
GM, I'm writing a very comprehensive blog to explain deeply about predicates. Predicate is a core concept of
@fuel_network
, which is built in the Sway language. Until I finish my writing, check out this small thread about predicates 👇
Hey, thanks for participating! I'm really amazed to see the amount of interest in the security conference.
@bsidesahmedabad
definitely has a different craze, but unfortunately, I can't invite everyone.
Here are the final winners of the Web3 Researcher giveaways:
@0xAraj
Hey Web3 folks! 🎉 I’m giving away 5 individual passes for
@bsidesahmedabad
2024—exclusively for Web3 enthusiasts! 📷
Retweet this post.
Comment below and tell us why you want to attend this event! 👇🏻
Good luck!
Let's meet in person at
Recently, a Pike Finance fell victim to a hack, resulting in a loss of $$1.6 million . We'll cover the full breakdown of the hack , please do read
@techfund_inc
Just a quick suggestion for new auditors:Instead of randomly starting to read
@SoloditOfficial
reports,try reading 10 reports for one vulnerability. By doing this,you'll cover multiple attack scenarios of the same bug across different contracts,which can provide valuable insights
Over $550k was drained from multiple Fantom Foundation-labelled wallets; however, it appears that, upon the initial security investigation, the developer's private key was
#compromised
through
#phishing
.
Understanding the Risks of EIP712: Keeping Your Crypto Safe
EIP712 has become a popular tool in the Ethereum ecosystem, allowing users to sign messages off-chain and verify them on-chain. However, like any powerful tool, it's crucial to understand the potential risks involved.
Hey
@latokens
,A year ago, I was very impressed with your proactive nature regarding security. You made security a priority back then.
@latokens
and
@0xLachain
were my favorite programs on
@HackenProof
, which is why I held top positions in both programs.
However, this is no