Sam (@_0x5am) 's Twitter Profile
Sam

@_0x5am

security research🧑‍💻

ID: 786146168292204544

calendar_today12-10-2016 10:07:07

350 Tweet

144 Takipçi

1,1K Takip Edilen

Cantina 🪐 (@cantinaxyz) 's Twitter Profile Photo

Introducing a milestone in protocol security validation. 🪐 We've teamed up with Euler Labs to launch a $500,000 mainnet CTF, featuring live Ethereum contracts with real liquidity. The challenge begins tomorrow, June 3 at 10:00 AM ET. Here's what you need to know.

bountyhunt3rz podcast (@bountyhunt3rz) 's Twitter Profile Photo

BOUNTYHUNT3RZ Episode 16: w/ Flint riptide discuss his humble beginnings in crypto making $0.01 on his first contest to becoming an LSR at Certora , how to get what you want out of life, breaking into crypto and why merit trumps all, use cases for premium LLM tools

Ethereum Foundation (@ethereumfndn) 's Twitter Profile Photo

The EF is donating $500K to the legal defense of Roman Storm, and we will match up to a further $750K in donations from the community. Privacy is normal, and writing code is not a crime.

bountyhunt3rz podcast (@bountyhunt3rz) 's Twitter Profile Photo

BOUNTYHUNT3RZ Episode 17: w/ LonelySloth riptide discuss how it feels hitting 7 figure bounty payouts, how to find obscure bugs that no one is looking for, why bounty hunters find bugs auditors miss, ZK bugs and things to look for, approach to learning new complex

SΞCURΞUM (@thesecureum) 's Twitter Profile Photo

🎉 Secureum RACE-41 Results 💨 Number of Runners: 50 ⚖️ Median Score: 3.4/8 🥇 Top Score: 6.2/8 🙏 Designer: kamensec ✍️ Reviewer: patrickd ventral.digital/posts/2025/6/1… 🏆🏆 Top 32 Leaderboard 🏆🏆

🎉 Secureum RACE-41 Results

💨 Number of Runners: 50
⚖️ Median Score: 3.4/8
🥇 Top Score: 6.2/8

🙏 Designer: <a href="/kamensec/">kamensec</a>

✍️ Reviewer: <a href="/patrickd_de/">patrickd</a> ventral.digital/posts/2025/6/1…

🏆🏆 Top 32 Leaderboard 🏆🏆
guhu (@guhu95) 's Twitter Profile Photo

You can measure how vulnerable the code is after a contest. This can help: - Projects and users to estimate hack risk - Bug hunters to scope targets - Ecosystem to track what works best - Platforms to manage reputation risk TL;DR: More solo findings -> more hidden bugs. This

You can measure how vulnerable the code is after a contest. This can help:
- Projects and users to estimate hack risk
- Bug hunters to scope targets
- Ecosystem to track what works best
- Platforms to manage reputation risk

TL;DR: More solo findings -&gt; more hidden bugs.

This
RareSkills (@rareskills_io) 's Twitter Profile Photo

Excited to let you know about RareWeek, a high-intensity learning + co-working experience in Bali. 📅 8th - 14th September, 2025 The event is specifically designed for security engineers, researchers, and smart contract devs. It’s a curated week of deep technical learning,

Excited to let you know about RareWeek, a high-intensity learning + co-working experience in Bali.

📅 8th - 14th September, 2025
 
The event is specifically designed for security engineers, researchers, and smart contract devs.

It’s a curated week of deep technical learning,
deebeez (@deeberiroz) 's Twitter Profile Photo

We Venn Network just discovered a critical backdoor on thousands of smart contracts leaving over $10,000,000 at risk for months Along with the help of security researchers Dedaub sudo rm -rf --no-preserve-root /, the seals team SEAL 911 and others, we managed to rescue the majority of funds

neils (@midwestneil) 's Twitter Profile Photo

Turns out you can just hack any train in the USA and take control over the brakes. This is CVE-2025-1727 and it took me 12 years to get this published. This vulnerability is still not patched. Here's the story:

gegul (@gfl2gexwrgjdkjm) 's Twitter Profile Photo

I built a real-time monitoring tool (free-tier: 1GB RAM, 1 core) to track newly deployed smart contracts—based on a recurring pattern I observed in blockchain incidents. This led to the discovery and responsible disclosure of a critical vulnerability. 📸 Dashboard preview below

I built a real-time monitoring tool (free-tier: 1GB RAM, 1 core) to track newly deployed smart contracts—based on a recurring pattern I observed in blockchain incidents.

This led to the discovery and responsible disclosure of a critical vulnerability.
📸 Dashboard preview below
Psyho (@fakepsyho) 's Twitter Profile Photo

Humanity has prevailed (for now!) I'm completely exhausted. I figured, I had 10h of sleep in the last 3 days and I'm barely alive. I'll post more about the contest when I get some rest. (To be clear, those are provisional results, but my lead should be big enough)

Humanity has prevailed (for now!)

I'm completely exhausted. I figured, I had 10h of sleep in the last 3 days and I'm barely alive.

I'll post more about the contest when I get some rest. 

(To be clear, those are provisional results, but my lead should be big enough)
SΞCURΞUM (@thesecureum) 's Twitter Profile Photo

Secureum RACE-42 Results 💨 Number of Runners: 49 ⚖️ Median Score: 3.3/8 🥇 Top Score: 7.7/8 🙏 Designer: kaden.eth ✍️ Reviewer: patrickd ventral.digital/posts/2025/7/1… 🏆🏆 Top 32 Leaderboard 🏆🏆

Secureum RACE-42 Results

💨 Number of Runners: 49
⚖️ Median Score: 3.3/8
🥇 Top Score: 7.7/8

🙏 Designer: <a href="/0xKaden/">kaden.eth</a>

✍️ Reviewer: <a href="/patrickd_de/">patrickd</a> ventral.digital/posts/2025/7/1…

🏆🏆 Top 32 Leaderboard 🏆🏆
Giovanni Di Siena (@giovannidisiena) 's Twitter Profile Photo

As a security-minded Solidity developer, this is your sign to be very careful when using unchecked blocks and inline assembly. As of 0.8.0 and later the compiler will automatically handle under/overflows. But what happens if a variable allowed to overflow is then used in yul?

As a security-minded Solidity developer, this is your sign to be very careful when using unchecked blocks and inline assembly.

As of 0.8.0 and later the compiler will automatically handle under/overflows. But what happens if a variable allowed to overflow is then used in yul?