Shanon (@shanon40439853) 's Twitter Profile
Shanon

@shanon40439853

Friendly script kiddie

ID: 1683312640385511424

calendar_today24-07-2023 03:06:29

46 Tweet

1,1K Followers

582 Following

Aave (@aave) 's Twitter Profile Photo

Today we received a report of an issue on a certain feature of the Aave Protocol. After validation by community developers, the guardian has taken the following temporary prevention measure (no funds are at risk):

Emilio^ (@the3d_) 's Twitter Profile Photo

last proposal needed to restore normal operation of the V2 and some V3 markets has been submitted by bgdlabs, six days from now everything will be back to normal app.aave.com/governance/pro…

samczsun (@samczsun) 's Twitter Profile Photo

If you've ever watched an episode of Mayday / Air Crash Investigation, you know that pilots have checklists for almost any emergency situation. These checklists are concise and immediately actionable with no filler, which is exactly what you want during a crisis.

If you've ever watched an episode of Mayday / Air Crash Investigation, you know that pilots have checklists for almost any emergency situation. These checklists are concise and immediately actionable with no filler, which is exactly what you want during a crisis.
Dami.base.eth (@sir_damilare) 's Twitter Profile Photo

I'm sorry, but I vehemently disagree with this. You don't work in a bank, and go-ahead to rob the bank simply because the money they store in their vault is magnitudes of order larger than your annual pay. This is a criminal behaviour, and it continues bcos projects choose to

Shanon (@shanon40439853) 's Twitter Profile Photo

When doing bug bounties on Immunefi, I find it easier to find issues on a codebase that was built > 1 year. I believe the devs now are better than they were 1 year ago.

Shanon (@shanon40439853) 's Twitter Profile Photo

All my reports were paid in 2023. It's 99% luck to get a big win. These smaller payouts keep us in the game. Big shout out to Immunefi and every project on the platform that keeps the community healthy #ImmunefiWrapped

All my reports were paid in 2023.
It's 99% luck to get a big win. These smaller payouts keep us in the game.
Big shout out to <a href="/immunefi/">Immunefi</a> and every project on the platform that keeps the community healthy
#ImmunefiWrapped
Kankodu (@kankodu) 's Twitter Profile Photo

A 🧵 on how yesterday's 🧙🏼‍♂️ attack worked. The protocol did everything right. They rounded in the protocol's favour whenever they should but one additional function, meant to only reduce the user's funds, ended up enabling the attack. How?

A 🧵 on how yesterday's <a href="/MIM_Spell/">🧙🏼‍♂️</a> attack worked. The protocol did everything right. They rounded in the protocol's favour whenever they should but one additional function, meant to only reduce the user's funds, ended up enabling the attack. How?
OpenZeppelin (@openzeppelin) 's Twitter Profile Photo

The Top 10 Blockchain Hacking Techniques 2nd Edition is out. The industry’s compilation of the 10 most novel, interesting, and unexpected smart contract hacks and bugs. From the governance hack of Tornado Cash using metamorphic contracts, to the billion-dollar exploit

The Top 10 Blockchain Hacking Techniques 2nd Edition is out.

The industry’s compilation of the 10 most novel, interesting, and unexpected smart contract hacks and bugs. 

From the governance hack of Tornado Cash using metamorphic contracts, to the billion-dollar exploit
tpiliposian (@tpiliposian) 's Twitter Profile Photo

Today we are finding all contracts in a given chain that have `_burn` function "mistakenly" set as public without any modifiers or requirements, allowing unrestricted access:

Today we are finding all contracts in a given chain that have `_burn` function "mistakenly" set as public without any modifiers or requirements, allowing unrestricted access:
Ciara Nightingale (@ciaranightingal) 's Twitter Profile Photo

Over the last week, I have been digging into WHY the WOOFi attack was able to happen and writing a full Proof of Concept On March 5, 2024, WOOFi's sPMM algorithm was exploited on Arbitrum, resulting in an $8.6M loss! Keep reading to find out how👇

qckhp (@qckhp) 's Twitter Profile Photo

if anyone wonders the Predy finance exploit main root cause was: anyone could register trading pairs by adding a valid uniswap pair to the pool, but HERE IS THE CATCH: `priceFeed` param was also a user input param 🫠 rip