EllipticPoint (@ellipticpoint) 's Twitter Profile
EllipticPoint

@ellipticpoint

security engineer @sigp_io

ID: 1572075379191615488

calendar_today20-09-2022 04:09:23

100 Tweet

197 Followers

273 Following

EllipticPoint (@ellipticpoint) 's Twitter Profile Photo

🔥Day 25 of #30daysweb3security @Web3SecurityDAO - Completed 'Denial' and 'Shop' levels in Ethernaut - Went through Secureum RACE 12 & 14 - Did Secureum RACE 15 - Went through Secureum's Solidity 201 quiz

EllipticPoint (@ellipticpoint) 's Twitter Profile Photo

🔥Day 27 of #30daysweb3security @Web3SecurityDAO I started learning how to use Foundry. I also re-implemented all my finished DamnVulnerableDeFi solutions in the Foundry version.

EllipticPoint (@ellipticpoint) 's Twitter Profile Photo

🔥Day 28 of #30daysweb3security @Web3SecurityDAO - Started watching Secureum Slot 4 videos - Completed 'The Rewarder' level of DamnVulnerableDeFi Approaching the end of the challenge!!

EllipticPoint (@ellipticpoint) 's Twitter Profile Photo

🔥Day 29 of #30daysweb3security @Web3SecurityDAO I completed the 'Selfie' level in DamnVulnerableDeFi. I also kicked off my learning about formal verification. (thanks to Secureum and the Certora workshop) Just 1 more day left!! 🔥

philogy (@real_philogy) 's Twitter Profile Photo

Wanted to make a smol thread bc I saw even some really good auditors get confused by my post the other day. 🤔 The following code is vulnerable, right? Classic reentrancy? Wrong. 😑 The code is safe with a small asterisk. 👇🧵 (1/12)

Wanted to make a smol thread bc I saw even some really good auditors get confused by my post the other day. 🤔
 
The following code is vulnerable, right? Classic reentrancy? Wrong. 😑
 
The code is safe with a small asterisk.
 
👇🧵 (1/12)
Certora 🔜 @ Token2049 (@certorainc) 's Twitter Profile Photo

1/ We’re excited to announce the prizes for the @AaveAave Certora community verification contest of the static aToken! After a month-long review, a total of $40K is awarded to the participants via Aave Grants - congratulations! So what did we find? 🧵

Cantina 🪐 (@cantinaxyz) 's Twitter Profile Photo

🪐 Introducing Cantina Competitions 🪐 With Morpho Labs 🦋! 🦋 • $200,000 • 2500 SLOC • Cantina Code assisted (much bigger than you think) • Invite Code ONLY A new era for web3 security begins today. 👇No invite code? Huge opportunity below👇

EllipticPoint (@ellipticpoint) 's Twitter Profile Photo

TIL that the OpenZeppelin Ownable contract (as of v5.0.0) now requires you to explicitly set the initialOwner in the constructor now, instead of it setting the contract deployer as owner. github.com/OpenZeppelin/o…

Labrys (@labrys_io) 's Twitter Profile Photo

Yes, you really can lose all your ETH if you stake with Geth This article is not an attack on Geth. I have the utmost respect for their team. Unfortunately, through no fault of the Go Ethereum team because of how widely used Geth is we need to have honest conversations about

Yes, you really can lose all your ETH if you stake with Geth

This article is not an attack on Geth. I have the utmost respect for their team. Unfortunately, through no fault of the <a href="/go_ethereum/">Go Ethereum</a> team because of how widely used Geth is we need to have honest conversations about
EllipticPoint (@ellipticpoint) 's Twitter Profile Photo

Recently, I was fortunate enough to be given the opportunity to join Sigma Prime, working alongside some of the smartest engineers the blockchain industry has to offer. One of the first reviews that I took part in there was EigenLayer. You can read our report here.👇

Dimi Tree (@kamensec) 's Twitter Profile Photo

Recently took part in a very mission critical audit for the Renzo as a Lead Reviewer Sigma Prime. I've now wrapped up 3 audits on EigenLayer, and 2 Restakers. I truly believe me and EllipticPoint have put on an absolute clinic here based on all our previous expertise on

Sigma Prime (@sigp_io) 's Twitter Profile Photo

Have you ever heard about Hidden Overflow in Solidity? Let's explore this vulnerability and how to prevent it! Consider this function: It appears to be safe at first glance. However, there is a hidden overflow here. Let's dive in!

Have you ever heard about Hidden Overflow in Solidity? Let's explore this vulnerability and how to prevent it! 

Consider this function: It appears to be safe at first glance. However, there is a hidden overflow here. Let's dive in!
Sigma Prime (@sigp_io) 's Twitter Profile Photo

🌟 Ready for your next big opportunity? Sigma Prime is hiring 🚀 We're looking for talented engineers and security experts to join us in shaping the future of web3. Whether you're into Rust, Go, Solidity, or DevOps, we've got a role for you! 🧵

Sigma Prime (@sigp_io) 's Twitter Profile Photo

We're excited to kick off a security review of Commit-Boost 📻 🕶️ 🦇🔊 📻 🔥 This open source software gives transparency and control to validators as block building evolves at warp speed. We fully support this public good allowing stakers to reclaim control over block construction 🏗️

Justin Ðrake 🦇🔊 (@drakefjustin) 's Twitter Profile Photo

Announcement of an announcement! Tomorrow at 5pm on the Devcon main stage I will unveil my most ambitious initiative to date. For one year I have been thinking about what a from-scratch redesign of the Ethereum consensus layer could look like. The goal is to suggest a credible