Jeff Security (@jeffsecurity) 's Twitter Profile
Jeff Security

@jeffsecurity

Independent Smart Contract Researcher & Researcher at @ShieldifySec

My mission is to find vulnerabilities in smart contracts for a safer Web3 Space!

ID: 1391816407810183171

linkhttps://github.com/shieldify-security/audits-portfolio calendar_today10-05-2021 18:04:39

1,1K Tweet

7,7K Takipçi

1,1K Takip Edilen

Martin (@shieldifymartin) 's Twitter Profile Photo

Ultimate Vulnerability Checklist 🚀 All patterns are separated for different protocol types github.com/devdacian/ai-a…

Jeff Security (@jeffsecurity) 's Twitter Profile Photo

Sol-azy is a static analysis tool for the sol eco, allowing you to: - reverse ⏪ - analyze 🧐 - poke at Solana programs 👈 github.com/FuzzingLabs/so…

Jeff Security (@jeffsecurity) 's Twitter Profile Photo

Schrödinger’s Transaction: 🐈‍⬛🧪 Until the block confirms, the exploit simultaneously exists in a superposition of “rekt” and “all good.”

Martin (@shieldifymartin) 's Twitter Profile Photo

Huff Puzzle Challenges 🚀 A progressive puzzle series that takes you from beginner to pro in Huff and EVM bytecode through hands-on challenges. github.com/RareSkills/huf…

Jeff Security (@jeffsecurity) 's Twitter Profile Photo

Some classic ETH attacks carry over to SOL!!! That and more discussed in this Solend Auditing Workshop ☀️🦀 docs.google.com/presentation/d…

Jeff Security (@jeffsecurity) 's Twitter Profile Photo

Another tool for your arsenal! 🛠️ DevSecOps toolkit from theredguild is a curated set of DevSecOps tools that all work together seamlessly in a minimal containerized environment. Check it out: github.com/theredguild/de…

Haseeb >|< (@hosseeb) 's Twitter Profile Photo

On social media, anger looks powerful. It will get you views and follows. But in real life, anger burns out fast. It won't get you very far. The most successful people aren't animated by outrage. They don't care if someone else is getting rich the wrong way. Of course they

Jeff Security (@jeffsecurity) 's Twitter Profile Photo

TIL: Github actually has a tools that can scan repositories for potential secret leaks 👀👀👀 docs.github.com/en/code-securi…

Jeff Security (@jeffsecurity) 's Twitter Profile Photo

The BRC20 Pinning Attack is a devastating exploit that can lock up BRC20 tokens and disrupt marketplaces on the Bitcoin network. A must-read paper for anyone defending Web3: arxiv.org/abs/2410.11295

Shieldify Security (@shieldifysec) 's Twitter Profile Photo

DeFi Protocols Resources - repost & bookmark sir🫡 ♦️AMM Audit Checklist 🔗github.com/Decurity/audit… ♦️AMM Security & Audit Insights 🔗mirror.xyz/millietez.eth/… ♦️CDP Audit Checklist 🔗github.com/Decurity/audit… ♦️LSD Audit Checklist 🔗github.com/Decurity/audit… ♦️Guidelines for

Jeff Security (@jeffsecurity) 's Twitter Profile Photo

Don't get rekt by address poisoning. Scammers dust your wallet history with a fake address, hoping you get sloppy. 😵 Always check the full address before you send it!!! Read more: zeroshadow.io/post/address-p…

Shieldify Security (@shieldifysec) 's Twitter Profile Photo

ERC Standards & Edge Cases ( Resources) - repost & bookmark sir🫡 ♦️Weird ERC20 Implementations 🔗github.com/d-xo/weird-erc… ♦️Weird ERC721 Implementations 🔗github.com/abarbatei/weir… ♦️ERC4626 Security Checklist 🔗github.com/Solthodox/erc4… ♦️ERC4626 Rounding Issues

Jeff Security (@jeffsecurity) 's Twitter Profile Photo

Despite advancements in smart contract security, reentrancy attacks are still a significant threat in Web3. Great resource on reentrancy by sudo rm -rf --no-preserve-root /!!! github.com/pcaversaccio/r…