Luke Wei🦇🔊 (@lukewei8) 's Twitter Profile
Luke Wei🦇🔊

@lukewei8

程序员、铲屎官、Bitcoiner

ID: 1341480776018227201

calendar_today22-12-2020 20:28:45

101 Tweet

574 Followers

2,2K Following

cygaar (@0xcygaar) 's Twitter Profile Photo

Removed dependency on OpenZeppelin. We were mostly using their ERC721 interfaces so we could conform to 721 standards. However, these interfaces are relatively straightforward to write on our own.

Maxlion🦁 (@real_maxlion) 's Twitter Profile Photo

非原创,我把别人的ZK研究都整合为一份文档,还在进行中,希望全世界非技术的ZK研究文档只看这一份就够了。请指教我吧!h0m83hhc6r.feishu.cn/docs/doccnp6vx…

cygaar (@0xcygaar) 's Twitter Profile Photo

Let's talk about the Bill Murrary NFT project: why the contract is bad, some trading metrics, and why Coinbase NFT continues to be a subpar platform for both users and project creators. 🧵

Ai 姨 (@ai_9684xtpa) 's Twitter Profile Photo

如何写区块链数据研报? 最近花了两天时间把 Galssnode 研报内容大概看了一遍,从其所用的数据类型入手,找到了一些分析项目和查看市场走势的规律,和大家分享一下专业的数据分析团队是怎么做的 👇 🧵(1/n)

如何写区块链数据研报?

最近花了两天时间把 Galssnode 研报内容大概看了一遍,从其所用的数据类型入手,找到了一些分析项目和查看市场走势的规律,和大家分享一下专业的数据分析团队是怎么做的 👇

🧵(1/n)
0xtakprof (@0xdenniswon) 's Twitter Profile Photo

EIP-2535 Diamond Standard Now Finalized! A standard for designing "upgradeable" & "replaceable" contracts, also known as the Diamond Standard by Nick Mudge 💎

Aman Gottumukkala (@amangotchu) 's Twitter Profile Photo

Secure on-chain randomness is a topic that has been touched on a lot over the past few years. In the latest blog, by Paradigm Engineering, sina.eth, Georgios Konstantopoulos, and I explore and implement secure randomness on Ethereum using SNARKs and VDFs. paradigm.xyz/2023/01/eth-rng

Revoke.cash (@revokecash) 's Twitter Profile Photo

Getting scammed is terrible. But it's even worse if you don't understand how it happened. There are four main kinds of methods that phishing scammers use to steal your funds: 1. SEED PHRASE COMPROMISE 2. DIRECT ETH TRANSFERS 3. APPROVALS / PERMITS 4. NFT MARKETPLACE LISTINGS

0x (@0xproject) 's Twitter Profile Photo

👋 Say hi to the new 0x Today we are excited to introduce you to the new 0x, developers’ one-stop shop to build the best financial products on crypto rails. Let’s take a tour of everything new 👇

SunSec (@1nf0s3cpt) 's Twitter Profile Photo

🔥I am ready to start writing "DeFiHackLabs Solidity Security Testing Guide". Currently, it supports 47 types of vulnerabilities. My todo: 1.Add missed vulnerability descriptions to the test cases written before. 2.Create a Notion version. 3.Create a PDF version.

🔥I am ready to start writing "DeFiHackLabs Solidity Security Testing Guide". 

Currently, it supports 47 types of vulnerabilities. 

My todo:
1.Add missed vulnerability descriptions to the test cases written before.
2.Create a Notion version.
3.Create a PDF version.
Yajin (Andy) Zhou (@yajinzhou) 's Twitter Profile Photo

1/ How to use MetaDockMetaSuites (Prev. MetaDock)'s variable log to identify a rug token contract with a backdoor. IGET token on BSC (0x8D07f605926837Ea0F9E1e24DbA0Fb348cb3E97D) has a backdoor to mint a large number of tokens to a backdoor address. Thanks to @MetaDockTeam's excellent tool.

ZachXBT (@zachxbt) 's Twitter Profile Photo

Lazarus Group just connected the Bybit hack to the Phemex hack directly on-chain commingling funds from the intial theft address for both incidents. Overlap address: 0x33d057af74779925c4b2e720a820387cb89f8f65 Bybit hack txns on Feb 22, 2025:

Lazarus Group just connected the Bybit hack to the Phemex hack directly on-chain commingling funds from the intial theft address for both incidents. 

Overlap address:
0x33d057af74779925c4b2e720a820387cb89f8f65

Bybit hack txns on Feb 22, 2025: