CT (@0xcttttttt) 's Twitter Profile
CT

@0xcttttttt

Security Researcher

ID: 1502917589005004805

linkhttps://kuwatakushi.vercel.app/ calendar_today13-03-2022 08:01:07

2,2K Tweet

389 Takipçi

1,1K Takip Edilen

Weilin (William) Li (@hklst4r) 's Twitter Profile Photo

The root cause of the Impermax attack is the mispricing of Uniswap V3 NFTs. The way it's pricing its NFT is using fair-pricing (which is robust against flashloan attacks!), but the fees' value are directly calculated: price = (amount0_after_fair_pricing + fee0) *

The root cause of the <a href="/ImpermaxFinance/">Impermax</a>  attack is the mispricing of Uniswap V3 NFTs.

The way it's pricing its NFT is using fair-pricing (which is robust against flashloan attacks!), but the fees' value are directly calculated:

price = (amount0_after_fair_pricing + fee0) *
Dacian (@devdacian) 's Twitter Profile Photo

Shout out immeas Jorgect.uni.eth fantastic work on Cyfrin Audits YieldFi CCIP private audit! YieldFi added CCIP to their existing LayerZero; we found 2 Crits & 4 Lows related to their CCIP integration plus a bunch of other findings mostly related to ERC4626🚀 Report👇

Shout out <a href="/0ximmeas/">immeas</a> <a href="/TamayoNft/">Jorgect.uni.eth</a> fantastic work on <a href="/CyfrinAudits/">Cyfrin Audits</a> YieldFi CCIP private audit!

YieldFi added CCIP to their existing LayerZero; we found 2 Crits &amp; 4 Lows related to their CCIP integration plus a bunch of other findings mostly related to ERC4626🚀

Report👇
Sir M. Shades 🌴 (@0xshaedyw) 's Twitter Profile Photo

To make contests and audits easier for SRs, I have created a VS code boilerplate with 500+ test ideas for Yield, Staking, and Bridge vulnerabilities. These ideas are based on 30+ public & private security reviews, aggregated via Solodit 🟪. x.com/0xShaedyW/stat…

To make contests and audits easier for SRs, I have created a VS code boilerplate with 500+ test ideas for Yield, Staking, and Bridge vulnerabilities.

These ideas are based on 30+ public &amp; private security reviews, aggregated via <a href="/SoloditOfficial/">Solodit 🟪</a>.

x.com/0xShaedyW/stat…
MSF (@0xmsf14) 's Twitter Profile Photo

Most full-time auditors quit their lives to go all into security, imagine how bad it gets when the overall compensation crashes because of misaligned incentives and exploitation. Money moves this space, it does its own marketing, decides Leaderboards, let’s keep the rewards fair

Nethermind Security (@nethermindsec) 's Twitter Profile Photo

🚨 Heads up, Web3 developers! 🚨 As you adopt EIP-7702 Delegation patterns, you should pay attention to how access controls are implemented. Check out this vulnerable DummyDelegation example below:

🚨 Heads up, Web3 developers! 🚨

As you adopt EIP-7702 Delegation patterns, you should pay attention to how access controls are implemented. Check out this vulnerable DummyDelegation example below:
0xGorilla.eth (@0xgorilladev) 's Twitter Profile Photo

After 4 years in DeFi, deploying dozens of smart contracts & securing over $1B: We've now open-sourced our handbook, with ALL our best practices, from onboarding guides to security processes Our goal: Help raise the ecosystem's standard handbook.defi.sucks Read below 🧵

Patrick Collins (@patrickalphac) 's Twitter Profile Photo

This is the entire POC for an EIP-7702 type 4 SIGNATURE to destroy all your tokens. You don't even have to send a transaction. In this POC you'd spend 0 gas, and a hacker could steal everything! The good news is that most wallets don't support doing what's shown here 👇

This is the entire POC for an EIP-7702 type 4 SIGNATURE to destroy all your tokens.

You don't even have to send a transaction. In this POC you'd spend 0 gas, and a hacker could steal everything!

The good news is that most wallets don't support doing what's shown here 👇
Pari Tomar (@tomarpari90) 's Twitter Profile Photo

Was looking for a clear cryptography guide. Couldn’t find one — so I made one. No SEO, no links, just pure knowledge in one place. Check it out. medium.com/@tomarpari90/c…

Remedy (@xyz_remedy) 's Twitter Profile Photo

A zero-day on Solana nearly enabled unlimited token minting via forged ZK proofs. Coordinated validator response patched it in under 48 hours. Here's the post-mortem of a bug that could’ve nuked trust in Confidential Transfers:

A zero-day on Solana nearly enabled unlimited token minting via forged ZK proofs.

Coordinated validator response patched it in under 48 hours.

Here's the post-mortem of a bug that could’ve nuked trust in Confidential Transfers:
Accretion | Solana Audits (@accretion_xyz) 's Twitter Profile Photo

We're finally announcing the winners for our track at the [redacted] hackathon! Our track was about Reverse Engineering Closed Source Solana Programs. We were seeking improvements to Solana's reverse engineering tooling and knowledge ecosystem -- anything that would help a

We're finally announcing the winners for our track at the [redacted] hackathon!

Our track was about Reverse Engineering Closed Source Solana Programs.

We were seeking improvements to Solana's reverse engineering tooling and knowledge ecosystem -- anything that would help a
kaden.eth (@0xkaden) 's Twitter Profile Photo

🧵How memory works under the hood in the EVM and how this knowledge led me to recently discover a ✨critical vulnerability✨ Oh and if you're new to assembly, don't worry, it's simpler than you think Memory Layout Starting with the basics, Solidity reserves the following 4

🧵How memory works under the hood in the EVM and how this knowledge led me to recently discover a ✨critical vulnerability✨

Oh and if you're new to assembly, don't worry, it's simpler than you think

Memory Layout

Starting with the basics, Solidity reserves the following 4
polarzero (@0xpolarzero) 's Twitter Profile Photo

Just released evmstate, a TypeScript library to trace & visualize state changes on EVM chains, with human-readable labels (variable names, mapping keys, decoded values, etc).

Just released evmstate, a TypeScript library to trace &amp; visualize state changes on EVM chains, with human-readable labels (variable names, mapping keys, decoded values, etc).
sudo rm -rf --no-preserve-root / (@pcaversaccio) 's Twitter Profile Photo

Seeing the first malicious EIP-7702 delegators being added to private key leaked victim addresses that revert on ETH transfers to prevent an "easy" rescue of locked funds. They first drain all the ETH and then authorise such a malicious delegator contract with a permissioned

Seeing the first malicious EIP-7702 delegators being added to private key leaked victim addresses that revert on ETH transfers to prevent an "easy" rescue of locked funds. They first drain all the ETH and then authorise such a malicious delegator contract with a permissioned
n33k (@neeksec) 's Twitter Profile Photo

After investigating the Cetus exploit transaction, I believe I have identified the root cause of the bug. The issue stems from a type casting from u256 to u64 within the get_amount_by_liquidity function.

Al-Qa'qa' (@al_qa_qa) 's Twitter Profile Photo

A great blog explaining how to fetch Prices from Oracles. Explaining all possible scenarios, best practices, etc... I recommend checking it. 0xmacro.com/blog/how-to-co…

Yi (@suplabsyi) 's Twitter Profile Photo

.Usual encountered arbitrage exploitation, NOT a vulnerability exploit, with a total loss of about $40,000. This time, the impact of public opinion seems more severe than the issue itself. Specifically, this is because the exchange ratios for $USD0++ and $USD0 differ

.<a href="/usualmoney/">Usual</a> encountered arbitrage exploitation, NOT a vulnerability exploit, with a total loss of about $40,000. This time, the impact of public opinion seems more severe than the issue itself. Specifically, this is because the exchange ratios for $USD0++ and $USD0 differ
@bertcmiller ⚡️🤖 (@bertcmiller) 's Twitter Profile Photo

Today, we introduce a new thesis: MEV has become the dominant limit to scaling blockchains. Spectacularly wasteful onchain searching is starting to consume most of the capacity of most high-throughput blockchains. This is a market failure we can no longer ignore.

Today, we introduce a new thesis: MEV has become the dominant limit to scaling blockchains.

Spectacularly wasteful onchain searching is starting to consume most of the capacity of most high-throughput blockchains.

This is a market failure we can no longer ignore.
Kalp (@kalp_eth) 's Twitter Profile Photo

[1/5] I FOUND CRITICAL BUG IN BUY FUNCTION🚨 INNOCENT CODE: rate = ((sqrtPriceX96 * 1e18)>>96) * ((sqrtPriceX96 * 1e18)>>96); rate = rate * 10**12 / 10**36; Looks Good, right? Just some math operations... WRONG. This code misunderstands Uniswap V3's sqrtPriceX96. Poc Below 👇

[1/5]
I FOUND CRITICAL BUG IN BUY FUNCTION🚨
INNOCENT CODE:

rate = ((sqrtPriceX96 * 1e18)&gt;&gt;96) * ((sqrtPriceX96 * 1e18)&gt;&gt;96);
rate = rate * 10**12 / 10**36;

Looks Good, right? 
Just some math operations...
WRONG. This code misunderstands Uniswap V3's sqrtPriceX96.

Poc Below 👇