Martin Petkov (@martin_petkov) 's Twitter Profile
Martin Petkov

@martin_petkov

Content Marketing @CyfrinAudits: World-class Web3 security audits, tools, and education | "Metaverse AI" trilogy author | Blockchain, Crypto, DeFi, NFTs

ID: 494475661

linkhttps://www.linkedin.com/in/martinstefanovpetkov/ calendar_today16-02-2012 23:10:12

2,2K Tweet

287 Followers

58 Following

Trident (@tridentsolana) 's Twitter Profile Photo

Impressive depth by arthur and Claire. Infrastructure work like this compounds across the entire tooling stack. Trident processes thousands of transactions per second using Anza's SVM API, so every microsecond shaved off instruction execution translates into more

Wake (@wakeframework) 's Twitter Profile Photo

Impressive benchmark, and it highlights where the industry is heading. Raw LLMs can identify known vulnerabilities. But production security demands more: structured, multi-step validation, domain-specific reasoning, and false-positive control. A single prompt to Claude or GPT

Trident (@tridentsolana) 's Twitter Profile Photo

The gap between what the sysvar reports and what executes during nested calls creates blind spots that unit tests cannot reach structurally. Proving whether the exploit path works requires simulating thousands of multi-step transaction sequences that chain instructions across

Wake (@wakeframework) 's Twitter Profile Photo

Security issues don't announce themselves in the file you're currently editing. Wake's Security Overview panel surfaces every detected vulnerability across your whole project — severity-sorted, always current, no terminal required. Thread ↓

Trident (@tridentsolana) 's Twitter Profile Photo

Not every team can wait 8 weeks for an audit slot. Not every team has the budget for a full manual audit today. Trident Arena serves both, and the space between. Thread ↓

Not every team can wait 8 weeks for an audit slot.

Not every team has the budget for a full manual audit today.

Trident Arena serves both, and the space between.

Thread ↓
Wake (@wakeframework) 's Twitter Profile Photo

Audit access is one barrier. Code readiness is the other. Most teams arrive at their first audit with surface-level bugs that burn expensive reviewer hours. Reentrancy, missing checks, storage collisions. Mechanical issues that tools should catch before a human ever reads the

Trident (@tridentsolana) 's Twitter Profile Photo

Execution cost stays the same. Reservation cost does not. That gap is where edge cases hide. Programs optimizing around compute budgets now face different block packing math. 16K additional estimated CUs per vote changes the environment every other transaction competes in.

Wake (@wakeframework) 's Twitter Profile Photo

Congrats! Developers keep voting with their time: better Solidity tooling wins. The IDE space is still underserved. Most extensions handle syntax and compilation. Few integrate security into the writing experience. Fewer still connect analysis to a full fuzzing pipeline.

Wake (@wakeframework) 's Twitter Profile Photo

The jump from Wake Arena 3.0 to 3.1 is a +21 percentage point increase in detection rate. 3.0 at 46% → 3.1 at 67% Frontier LLMs plateau around 44%. That ceiling is real: more compute, better prompts, same result. The staircase: Opus 4.5 (22%) GPT-5 (26%) GPT-5.2 xhigh (44%)

The jump from Wake Arena 3.0 to 3.1 is a +21 percentage point increase in detection rate.

3.0 at 46% → 3.1 at 67%

Frontier LLMs plateau around 44%.

That ceiling is real: more compute, better prompts, same result.

The staircase:

Opus 4.5 (22%)
GPT-5 (26%)
GPT-5.2 xhigh (44%)
Trident (@tridentsolana) 's Twitter Profile Photo

Traditional tests cover paths you expect. Fuzzing inputs completely random data—valid, invalid, unexpected—into your instructions. It finds the bugs you didn't think to test for.

Wake (@wakeframework) 's Twitter Profile Photo

Why use Wake's extension? Real-time vulnerability detection as you type: Same detectors used in Lido, Aave, Axelar, Safe audits. Red squiggles for security issues, not just syntax errors. Only extension with proven audit framework integration.

Trident (@tridentsolana) 's Twitter Profile Photo

Blackbox fuzzing: sends random data. Fails 99.9% of the time on programs with specific constraints. Graybox fuzzing: knows the interface. Gets further, but doesn't understand logical sequences. Neither knows that a withdrawal needs a deposit first.