HACKDEFI (@hackthedefi) 's Twitter Profile
HACKDEFI

@hackthedefi

ID: 1755004066001035264

calendar_today06-02-2024 23:02:41

63 Tweet

45 Followers

34 Following

Chaofan Shou (svm/acc) (@shoucccc) 's Twitter Profile Photo

That is exactly what we HACKDEFI are working on: - LLM-based Invariant Synthesis - LLM-guided Fuzzing - LLM-based Test Harness Synthesis 🧵

XOX Labs ⛓ (@xox_labs) 's Twitter Profile Photo

Excited to announce our collaboration with the brilliant minds at HACKDEFI to fortify our Staking SC's security 🤖 Stay tuned for the final results, paving the way for the much-anticipated "XOX Native Staking" event ⚖️

Chainlink (@chainlink) 's Twitter Profile Photo

FuzzLand (HACKDEFI) has established a strategic alliance with Chainlink Labs. This alliance helps #ChainlinkBUILD members access FuzzLand's all-in-one onchain contract security platform, enabling projects to move faster while staying secure. medium.com/fuzzland-blog/…

𝕗𝕦𝕫𝕫𝕝𝕒𝕟𝕕 (@fuzzland_) 's Twitter Profile Photo

📢Announcement Time 📢 We're very excited to be working with Chainlink Labs to bring our on-chain security solutions to #ChainlinkBUILD members to help Web3 #builders safeguard dApps and innovate with a peace of mind. Read more in our blog here: medium.com/fuzzland-blog/…

PeckShieldAlert (@peckshieldalert) 's Twitter Profile Photo

#PeckShieldAlert The #WazirX exploiter-labeled address has already laundered this batch of 5K $ETH (worth ~$11.6M) via #TornadoCash The #WazirX exploiter-labeled addresses have laundered a total of 37.6K $ETH (worth ~$87m) via #Tornadocash so far

#PeckShieldAlert The #WazirX exploiter-labeled address has already laundered this batch of 5K $ETH (worth ~$11.6M) via #TornadoCash
The #WazirX exploiter-labeled addresses have laundered a total of 37.6K $ETH (worth ~$87m) via #Tornadocash so far
PeckShieldAlert (@peckshieldalert) 's Twitter Profile Photo

#PeckShieldAlert The exploiter-labeled #WazirX address has moved the 11th batch of 5K $ETH (worth ~$13.2M) to a new intermediary address, 0x0641...7b4a

#PeckShieldAlert The exploiter-labeled #WazirX address has moved the 11th batch of 5K $ETH (worth ~$13.2M) to a new intermediary address, 0x0641...7b4a
PeckShieldAlert (@peckshieldalert) 's Twitter Profile Photo

#PeckShieldAlert The #WazirX exploiter-labeled has already laundered 4.9K $ETH via #TornadoCash The #WazirX exploiter-labeled addresses have laundered a total of 57.5K $ETH (worth ~$152.4m) via #Tornadocash so far

#PeckShieldAlert The #WazirX exploiter-labeled has already laundered 4.9K $ETH via #TornadoCash
The #WazirX exploiter-labeled addresses have laundered a total of 57.5K $ETH (worth ~$152.4m) via #Tornadocash so far
BlockSec Phalcon (@phalcon_xyz) 's Twitter Profile Photo

ALERT! Our system has detected hundreds of suspicious transactions targeting an unknown, non-open-sourced contract on #BSC (0xff2481) over the past few hours, suggesting a possible reentrancy attack. The total loss has reached ~$140K. Interestingly, after the first attack

Shieldify Security (@shieldifysec) 's Twitter Profile Photo

All About DeFi and Future of Finance - Full Course in 4 playlists (80 YT Videos): LINKS 👇 1. Course I: DeFi Infrastructure: 📎youtube.com/playlist?list=… 2. Course II: DeFi Primitives: 📎youtube.com/playlist?list=… 3. Course III: DeFi Deep Dive: 📎youtube.com/playlist?list=… 4. Course IV:

MistTrack🕵️ (@misttrack_io) 's Twitter Profile Photo

🚨Update on LI.FI Exploiter Activity🚨 According to MistTrack's monitoring, the LIFI Exploiter transferred another 720 $ETH to Tornado Cash a few hours ago. As of now, the LIFI Exploiter has transferred 2006 $ETH to Tornado Cash, with ~847 $ETH still untransferred. (By

🚨Update on <a href="/lifiprotocol/">LI.FI</a> Exploiter Activity🚨

According to MistTrack's monitoring, the LIFI Exploiter transferred another 720 $ETH to Tornado Cash a few hours ago.

As of now, the LIFI Exploiter has transferred 2006 $ETH to Tornado Cash, with ~847 $ETH still untransferred. (By
BlockSec (@blocksecteam) 's Twitter Profile Photo

.Onyx DAO was attacked, resulting in a loss of nearly $4M. The root cause was unverified user input during the liquidation process. Specifically, key parameters of the liquidateWithSingleRepay function in the NFTLiquidation contract were controllable by the attacker, allowing

.<a href="/OnyxDAO/">Onyx DAO</a> was attacked, resulting in a loss of nearly $4M. The root cause was unverified user input during the liquidation process. Specifically, key parameters of the liquidateWithSingleRepay function in the NFTLiquidation contract were controllable by the attacker, allowing
Scam Sniffer | Web3 Anti-Scam (@realscamsniffer) 's Twitter Profile Photo

🚨 Phishing Alert: Polymarket users targeted on Google search! 🔍 Protect your assets—avoid simple mistakes. Get our security extension now! 🛡️✨ Stay safe and alert! ⚠️

🚨 Phishing Alert: <a href="/Polymarket/">Polymarket</a> users targeted on Google search!
🔍 Protect your assets—avoid simple mistakes. Get our security extension now! 🛡️✨
Stay safe and alert! ⚠️
SlowMist (@slowmist_team) 's Twitter Profile Photo

🚨SlowMist Security Alert🚨 We detected potential suspicious activity related to Bedrock | ✈️ #KBW2025 🇰🇷 due to mistakenly supporting the minting of uniBTC at a 1:1 exchange rate with the native token. As always, stay vigilant!

🚨SlowMist Security Alert🚨

We detected potential suspicious activity related to <a href="/Bedrock_DeFi/">Bedrock | ✈️ #KBW2025 🇰🇷</a> due to mistakenly supporting the minting of uniBTC at a 1:1 exchange rate with the native token.

As always, stay vigilant!
BlockSec MetaSleuth (@metasleuth) 's Twitter Profile Photo

「⚠️ Onyx DAO Exploit: $4M Loss」 🔗metasleuth.io/result/eth/0x6… Onyx DAO was hit by a $4M attack due to unverified inputs in the liquidation process. The attacker used the liquidateWithSingleRepay function to manipulate liquidation parameters, liquidating all collateral with just 1

Shieldify Security (@shieldifysec) 's Twitter Profile Photo

How to become a Better Smart Contract Auditor? It's simple, put maximum time into it and do it willingly, every single day, no Excuses First is learning, then the first letter of the word Learn is removed LEARN -> EARN

Jeff Security (@jeffsecurity) 's Twitter Profile Photo

Writing Multi-Fuzzer Invariant Tests Using Chimera: Fuzz smart contracts using the same code with Echidna, Medusa & Foundry! dacian.me/writing-multi-…