Paulius (@soliditydev) 's Twitter Profile
Paulius

@soliditydev

This is the dip!
#Dev #Blockchain #Ethereum #Solidity #SmartContracts #DApp #DeFi #NFT #Security 💻

ID: 2644105141

calendar_today14-07-2014 07:20:00

1,1K Tweet

976 Followers

1,1K Following

Raz0r (@theraz0r) 's Twitter Profile Photo

Findings bugs in smart contract proxy upgrades with reasoning models: 1) monitor Upgraded(address implementation) events 2) call eth_getStorageAt(proxy, eip1967.proxy.implementation) at the block before the upgrade to get old implementation 3) forge clone old impl address 4)

Cointelegraph (@cointelegraph) 's Twitter Profile Photo

🚨 ALERT: A rise in scam emails impersonating Coinbase and Gemini has been reported by crypto users, with scammers attempting to trick recipients into setting up wallets using pre-generated recovery phrases that the scammers control. Stay vigilant!

🚨 ALERT: A rise in scam emails impersonating Coinbase and Gemini has been reported by crypto users, with scammers attempting to trick recipients into setting up wallets using pre-generated recovery phrases that the scammers control.

Stay vigilant!
asymmetric research (@asymmetric_re) 's Twitter Profile Photo

Announcing AR’s Intern Program We’re launching an intern program that’s hands-on, high-impact, and fully remote. Looking for security research types who are curious, skilled, and ready to work on security challenges that matter ↓

Announcing AR’s Intern Program

We’re launching an intern program that’s hands-on, high-impact, and fully remote.

Looking for security research types who are curious, skilled, and ready to work on security challenges that matter ↓
Daniel Von Fange (@danielvf) 's Twitter Profile Photo

So, it turns out that the Nick L Franklin account was run by DPRK, tied to the Radiant attack, and attempting to hack security researchers. If anyone has conversation screenshots, I'd encourage sharing them. If you haven't screenshotted yet, they have probably been deleted. 🧵

So, it turns out that the Nick L Franklin account was run by DPRK, tied to the Radiant attack, and attempting to hack security researchers.

If anyone has conversation screenshots, I'd encourage sharing them. If you haven't screenshotted yet, they have probably been deleted. 🧵
0xbow.io (@0xbowio) 's Twitter Profile Photo

gm Ethereum ☀️ It is our great honor to announce the mainnet launch of Privacy Pools! ETH users can now achieve on-chain privacy, while still dissociating from illicit funds It is now up to all of us to Make Privacy Normal Again 🫡 More info in this thread 👇

Julien Bouteloup (@bneiluj) 's Twitter Profile Photo

excited to share that Rekt News is now fully on-chain via Lens chain Lens Chain — you can now collect, comment, and like articles directly on-chain. dashboard and profile features are on the way, letting you track points for future rewards and perks. don’t forget to engage (it’s capped)

excited to share that <a href="/RektHQ/">Rekt News</a> is now fully on-chain via Lens chain <a href="/LC/">Lens Chain</a> — you can now collect, comment, and like articles directly on-chain. dashboard and profile features are on the way, letting you track points for future rewards and perks. don’t forget to engage (it’s capped)
Pavel Sinelnikov (@pavel_sinel) 's Twitter Profile Photo

I encountered a malicious npm package and decided to look into what it does. Here is what it does and what you can do to protect yourself 🧵

I encountered a malicious npm package and decided to look into what it does. Here is what it does and what you can do to protect yourself 🧵
0xngmi (@0xngmi) 's Twitter Profile Photo

I've noticed that scammers have started buying old abandoned defi domains to replace the frontend with drainers so if you're going to some dead defi project to withdraw some money you put there and forgot about, be careful about that

Vladimir S. | Officer's Notes (@officer_cia) 's Twitter Profile Photo

Save this post if you've been scammed or hacked!!! First things first, you should contact: t.me/seal_911_bot, or Rasit Tavus • Next, for recovering the rest (untouched assets) please use: hackedwalletrecovery.com made by BuidlGuidl.eth ; • Or this tool: app.buidlguidl.com/build/yIj6q9TZ…

Fredrik Svantes (@fredriksvantes) 's Twitter Profile Photo

Check out the new Ethereum Trillion Dollar Security initiative which aims to improve security in all areas for the Ethereum Ecosystem! :) If you're interested in chatting about this, have some suggestions or ideas then don't hesitate to reach out.

Electisec (@electisec) 's Twitter Profile Photo

⚡Electisec has shaped many security gigabrains… but we're not done! We're soon kicking off our Smart Contract fellowship to find the next set of security superstars, and we invite you to be a part of this trial-by-fire program. Think you’ve got what it takes? Details below!

Zellic (@zellic_io) 's Twitter Profile Photo

We retrieved every contract on Ethereum. Along the way, we found the exact date when 16,000 unique contracts were deployed (the most in one day), the EOA with the most deployed contracts (2.9M), and much more. This is how we did it.🧵 (Spoiler: It’s 69,788,231 contracts!)

We retrieved every contract on Ethereum.

Along the way, we found the exact date when 16,000 unique contracts were deployed (the most in one day), the EOA with the most deployed contracts (2.9M), and much more.

This is how we did it.🧵

(Spoiler: It’s 69,788,231 contracts!)
sudo rm -rf --no-preserve-root / (@pcaversaccio) 's Twitter Profile Photo

One of the beauty of using EIP-7702 is that you can rescue all funds from a compromised wallet using a paymaster and a friendly delegator. There is _no need_ to send ETH to the compromised wallet at all! I decided this morning to write and open-source a fully-fledged Bash script

One of the beauty of using EIP-7702 is that you can rescue all funds from a compromised wallet using a paymaster and a friendly delegator. There is _no need_ to send ETH to the compromised wallet at all! I decided this morning to write and open-source a fully-fledged Bash script
Haseeb >|< (@hosseeb) 's Twitter Profile Photo

This is one of the coolest crypto stories I've seen in a while. khalo was trying to bridge his funds from an Ethereum to Base. But he was using an old version of Safe that wasn't multi-chain. To his surprise, he couldn't access the funds after he bridged them onto Base.

Guardian (@guardianaudits) 's Twitter Profile Photo

So, how can you protect your contracts? ✅ Deploy + initialize in a single tx ✅ Use _disableInitializers() in logic constructors ✅ Never write to legacy proxy slots ✅ Use ERC-7201 namespaced storage ✅ Simulate upgrades + diff storage (forge inspect)

Guardian (@guardianaudits) 's Twitter Profile Photo

Today, auditors put their money where their mouth is. Announcing, Guardian Defender. → Post-audit bounty coverage, funded by Guardian. → 30-day contest to find critical bugs in the Guardian-secured codebase. The first $100,000 Defender contest with Ethena Labs is live!