Sebastian Fernandez (@snfernandez) 's Twitter Profile
Sebastian Fernandez

@snfernandez

Ex-hacker. Mostly EVM these days. Security and optimization for fun and profit at @BitFinding. Previously at @Microsoft.

ID: 54825491

linkhttp://snf.github.io calendar_today08-07-2009 07:01:38

528 Tweet

1,1K Takipçi

504 Takip Edilen

Sebastian Fernandez (@snfernandez) 's Twitter Profile Photo

Such an evil idea: When rescuers want to recover locked funds they need to fund the gas for txs. Well, this is now impossible because the account will revert if you send ETH. The owners/rescuers will need to delegate (7702) to another contract before they can recover funds.

Sean Heelan (@seanhn) 's Twitter Profile Photo

I wrote-up how I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation. Link to the blog post below 👇

BitFinding (@bitfinding) 's Twitter Profile Photo

This was our interception bot rescuing $41K. The original attack landed 1.5 secs later: bscscan.com/tx/0x298fdcb6a… If you want to protect your funds from similar attacks, reach out to us.

This was our interception bot rescuing $41K. The original attack landed 1.5 secs later: bscscan.com/tx/0x298fdcb6a…

If you want to protect your funds from similar attacks, reach out to us.
BitFinding (@bitfinding) 's Twitter Profile Photo

On-chain transactions are complex and everyone keep depending more and more on simulation to understand what will happen. But what happens when that preview doesn't match reality? Simulation isn't a silver bullet. bitfinding.com/blog/enforcing…

Sebastian Fernandez (@snfernandez) 's Twitter Profile Photo

If you're building an AI bug hunter that "matches a top auditor's performance", I expect it to crush every bug bounty contest out there

Daniel (@ergot86) 's Twitter Profile Photo

This happened: agent was stuck making the same mistake over and over and I couldn’t convince it of implementing the correct approach from the prompt. So I wrote a test and I was able to convince it that way!

Kobi Gurkan (@kobigurk) 's Twitter Profile Photo

Specifically some interesting resources: 1. Reproducible builds are crucial for TEE applications - quorum.tkhq.xyz/posts/remote-a… 2. TLS in TEEs - quorum.tkhq.xyz/posts/tls-sess… 3. Verifiable foundations, an architecture overview - whitepaper.turnkey.com/foundations/

matta ⚡🪷 (@mattaereal) 's Twitter Profile Photo

so, I'm writing an initial draft for the operational security travel guide within SEAL's Security Frameworks. I would KILL for feedback on this. I know many WILL disagree, and that's OK. I just need anyone besides myself to roast it frameworks.securityalliance.dev/opsec/travel/g…

Sebastian Fernandez (@snfernandez) 's Twitter Profile Photo

We should start deprecating biometric logins before it's too late. There's enough data out there to replicate almost anyone's fingerprints and faces. It's only time til we see an open model specialized in tricking faceid or a gadget that can quickly reconstruct fingerprints.