Mr Anon (@shieldifyanon) 's Twitter Profile
Mr Anon

@shieldifyanon

Founder of @ShieldifySec🛡️Blockchain security audits. Your security partner, for the long term. We have audited Lido, IPOR, Colb, Ion, Kroma, Pear and more.

ID: 1639613128701779969

linkhttps://shieldify.org/ calendar_today25-03-2023 13:00:13

1,1K Tweet

5,5K Takipçi

478 Takip Edilen

Multipli.fi (@multiplifi) 's Twitter Profile Photo

To uphold the highest security standards as we scale, we've onboarded Shieldify Security as one of our Security Partners. Together, we're ensuring Multipli stays secure, transparent, and resilient for every Multiplier out there.

To uphold the highest security standards as we scale, we've onboarded <a href="/ShieldifySec/">Shieldify Security</a> as one of our Security Partners.

Together, we're ensuring Multipli stays secure, transparent, and resilient for every Multiplier out there.
Shieldify Security (@shieldifysec) 's Twitter Profile Photo

New security partnership, this time for Multipli.fi 🤝 With close to $80M in TVL, they're growing fast. We're now their security partners, protecting their journey toward success. Thank you for your trust! 🫡

New security partnership, this time for <a href="/multiplifi/">Multipli.fi</a> 🤝

With close to $80M in TVL, they're growing fast. We're now their security partners, protecting their journey toward success.

Thank you for your trust! 🫡
Shieldify Security (@shieldifysec) 's Twitter Profile Photo

Zero Knowledge Security in one YT video🤠 - ZK essentials - Completeness - Soundless - Zero Knowledginess - zkEVM - False proofs, Zcash - The importance of the challenging the prover - zkSNARK process - Hacked by soundless - Circom examples from 0xPARC - Arithmetic

Martin (@shieldifymartin) 's Twitter Profile Photo

What is Bridging, different types of bridges, how does it work? Message-based Bridging vs Intent-based Bridging across.to/blog/complete-…

Shieldify Security (@shieldifysec) 's Twitter Profile Photo

Can you find the vulnerability in this contract? 🫡 Note: Although the Code Snippet does not show all implementations of the functions, even if the functions behave as their names describe, there is still a bug!

Can you find the vulnerability in this contract? 🫡

Note: Although the Code Snippet does not show all implementations of the functions, even if the functions behave as their names describe, there is still a bug!
Harmonix Finance (@harmonixfi) 's Twitter Profile Photo

Shieldify Security — Our Auditor #2 of 5 on our 2024-26 Security Roadmap - 2 senior experts, 80 hrs over 5 days reviewed every line of our Hyperliquid vaults, - 16 issues found, all patched pre-launch Here is how your funds get one more layer of safety 👇

<a href="/ShieldifySec/">Shieldify Security</a>  — Our Auditor #2 of 5 on our 2024-26 Security Roadmap
- 2 senior experts, 80 hrs over 5 days reviewed every line of our Hyperliquid vaults,
- 16 issues found, all patched pre-launch
Here is how your funds get one more layer of safety 👇
Shieldify Security (@shieldifysec) 's Twitter Profile Photo

Can you find The Critical/High Severity Vulnerability in this codebase? Link to a code snippet for convenience👇 gist.github.com/anontheauditor…

Can you find The Critical/High Severity Vulnerability in this codebase?

Link to a code snippet for convenience👇
gist.github.com/anontheauditor…
Hyperliquid Hub 🐱 (@hyperliquid_hub) 's Twitter Profile Photo

13/16 Harmonix Finance partners with Shieldify Security, becoming the second auditor in the 2024-26 security roadmap. Two senior experts spent 80 hours across 5 days reviewing the entire Hyperliquid vault codebase. 16 issues were discovered and all were patched before launch. One more

Shieldify Security (@shieldifysec) 's Twitter Profile Photo

Computing the Current Tick Given "sqrtPriceX96" 🤔 - Compute tick index, Given "sqrtPriceX96" - The tick index is a discrete value - From ticks to price and vice-versa in the codebase - Using the Decimal library - Changing the base of the logarithm rareskills.io/post/uniswap-v…

Martin (@shieldifymartin) 's Twitter Profile Photo

If you want to learn how to start a venture capital fund, the different options, and the trade-offs, read this. 💡 saastr.com/how-would-a-pe…

Shieldify Security (@shieldifysec) 's Twitter Profile Photo

You can check our audit report for Harmonix Finance with a 16 findings, of which 8 are Critical/High, 6 are Medium and 2 are Low 🫡 Report link: github.com/shieldify-secu…

You can check our audit report for <a href="/harmonixfi/">Harmonix Finance</a> with a 16 findings, of which 8 are Critical/High, 6 are Medium and 2 are Low 🫡

Report link: github.com/shieldify-secu…
Shieldify Security (@shieldifysec) 's Twitter Profile Photo

The Diamond Proxy Pattern (ERC-2535) Explained 🫡 - Learning the Diamond Pattern - Immutable diamond - Conditional Branching On the Function Selector - Four Mandatory Public View Functions - DiamondCut — logging the facets selectors For more👇 rareskills.io/post/diamond-p…

Shieldify Security (@shieldifysec) 's Twitter Profile Photo

New audited protocol, this time is for PenguinGotchi from the Abstract ecosystem 🤝 ✳️ Can't wait to try out the game! And you? 🎮 Read the report below👇 github.com/shieldify-secu…

New audited protocol, this time is for <a href="/PenguinGotchi/">PenguinGotchi</a> from the <a href="/AbstractChain/">Abstract</a> ecosystem 🤝 ✳️

Can't wait to try out the game! And you? 🎮

Read the report below👇
github.com/shieldify-secu…