Juliano Rizzo (@julianor) 's Twitter Profile
Juliano Rizzo

@julianor

Crypto. Security. BEAST/CRIME SSL/TLS, Padding Oracle Attacks.
CEO & Founder @coinspect

ID: 16845633

linkhttps://www.coinspect.com calendar_today19-10-2008 00:37:57

15,15K Tweet

9,9K Takipçi

1,1K Takip Edilen

Juliano Rizzo (@julianor) 's Twitter Profile Photo

⚠️ Paid side quest with me - remote, async. Architect a trust‑less ZK software supply‑chain shield. Need smart contract & ZK‑SNARK pros. We're cracking a complex problem with a creative fix - DM repo #Web3 #ZK

⚠️ Paid side quest with me - remote, async. Architect a trust‑less ZK software supply‑chain shield. Need smart contract & ZK‑SNARK pros. We're cracking a complex problem with a creative fix  - DM repo #Web3 #ZK
Juliano Rizzo (@julianor) 's Twitter Profile Photo

Software security's weakest link is the supply chain - and attackers are more motivated and better funded than ever. We're missing incentives. Let’s start rewarding builders and researchers for doing the right thing. (DMs are now open)

Juliano Rizzo (@julianor) 's Twitter Profile Photo

I'm assembling a small, deeply technical team to design and deliver an experimental proof of concept: linkedin.com/posts/julianor…

Coinspect Security (@coinspect) 's Twitter Profile Photo

1/ 🆕 Coinspect Wallet Security Ranking 2nd edition released!! 74 wallets tested Curious where your go-to wallet stands? Fresh data and some surprising moves on the leaderboard. Dive in below 👇🧵

Juliano Rizzo (@julianor) 's Twitter Profile Photo

🤖🤥"In some instances, the LLM resorted to “cheating” by producing patches that superficially resolved the issue without addressing the underlying problem" engineering.fb.com/2025/04/29/ai-…

Coinspect Security (@coinspect) 's Twitter Profile Photo

👏 Big kudos to Rabby Wallet for staying in the Top 5 of our updated Wallet Security Ranking! Your team’s work really shines. 🔐 Integrating next-level threat detection could be the edge you need to rise even further.

👏 Big kudos to <a href="/Rabby_io/">Rabby Wallet</a> for staying in the Top 5 of our updated Wallet Security Ranking! Your team’s work really shines. 
🔐 Integrating next-level threat detection could be the edge you need to rise even further.
Coinspect Security (@coinspect) 's Twitter Profile Photo

MetaMask holds strong at #1 across Chrome, iOS & Android in our April 2025 Wallet Security Ranking! They reviewed our findings, took action, and raised the bar. Real leadership in wallet security. 👏 MetaMask.eth 🦊

MetaMask holds strong at #1 across Chrome, iOS &amp; Android in our April 2025 Wallet Security Ranking!
They reviewed our findings, took action, and raised the bar. Real leadership in wallet security. 👏 <a href="/MetaMask/">MetaMask.eth 🦊</a>
Juliano Rizzo (@julianor) 's Twitter Profile Photo

AI is fun. LLMs can spit out code because they've read billions of lines but they've never lived the run, break, debug, refactor process. That’s why they stumble on bigger projects? Next frontier is training models to write-test-fix like humans?

AI is fun. LLMs can spit out code because they've read billions of lines but they've never lived the run, break, debug, refactor process. That’s why they stumble on bigger projects? Next frontier is training models to write-test-fix like humans?
Coinspect Security (@coinspect) 's Twitter Profile Photo

🚨 Curve Finance Frontend Hijack Still Active DNS hijack began ~2025-05-12 21:30 UTC. Users visiting the Curve frontend are being served malicious JavaScript wallet drainer code. Malicious dApp is hosted via Cloudflare infrastructure. We’ll keep this thread updated. 🧵

Coinspect Security (@coinspect) 's Twitter Profile Photo

👀 Security researchers - can you spot the malicious code? This snippet comes from the currently compromised `curve dot fi` frontend. Can you tell which one is the drainer? You’ll be surprised which one bites 🐍

👀 Security researchers - can you spot the malicious code?
This snippet comes from the currently compromised `curve dot fi` frontend.
Can you tell which one is the drainer?
You’ll be surprised which one bites 🐍
Juliano Rizzo (@julianor) 's Twitter Profile Photo

Years later, the problem is worse. H1 reports alert fatigue is real. Bounty platforms must evolve integrating PoC exploits into the workflow. Even if not feasible for 100% of bugs or projects Smart contracts are an obvious niche, where even ZK-based PoC validation is viable.

Juliano Rizzo (@julianor) 's Twitter Profile Photo

👇this recruitment initiative is already paying off! 🎉 😂We're actively committing code to the project. More explorers welcome!

Juliano Rizzo (@julianor) 's Twitter Profile Photo

🤦‍♂️ When faced with too many SaaS options, I simplify with this mature selection framework: 1. Least absurd password policy 2. OAuth2 not paywalled 3. Passkey/FIDO2/U2F support like it’s 2025 4. No SMS required for any "security" process

🤦‍♂️ When faced with too many SaaS options, I simplify with this mature selection framework:
1. Least absurd password policy
2. OAuth2 not paywalled
3. Passkey/FIDO2/U2F support like it’s 2025
4. No SMS required for any "security" process