G2 (@maymax777) 's Twitter Profile
G2

@maymax777

#Crypto Investor | #NFT Builder | #FullStack Engineer |#P2E Maker | #Idea Creator | #Security Researcher

ID: 1256237623913467905

calendar_today01-05-2020 15:03:08

443 Tweet

87 Followers

1,1K Following

Cantina 🪐 (@cantinaxyz) 's Twitter Profile Photo

Announcing: $250,000 OP Labs Competition 🪐 We're working with Optimism and OP Labs to secure their next scalability improvement: Superchain interop. 💰 $225,000 USDC + $25,000 private pot for Fellowship Stewards 📅 Live now - April 7 🔗 Below

Weilin (William) Li (@hklst4r) 's Twitter Profile Photo

An initial analysis of the 🧙🏼‍♂️ attack 👇 The CauldronV4 contract allows user to perform multiple actions while the solvency check is at the end of all actions. (P1) The user made 7 actions (P2), where: - 5 = borrow MIM - 30 = call attack contract - 31 = liquidation

An initial analysis of the <a href="/MIM_Spell/">🧙🏼‍♂️</a> attack 👇

The CauldronV4 contract allows user to perform multiple actions while the solvency check is at the end of all actions. (P1)

The user made 7 actions (P2), where:
- 5 = borrow MIM
- 30 = call attack contract
- 31 =  liquidation
Cyfrin CodeHawks (@codehawks) 's Twitter Profile Photo

🚨 Eagles and Hawks! The original message was published with an incorrect start date. Actual start date: 3 April, 12pm UTC. Thank you for your understanding. Total prize pool: $80k USDC Eagles pool: $6k to lead Eagle, $6k for all Eagles Code: CairoLang ➡️ Requires KYC 👇

🚨 Eagles and Hawks!

The original message was published with an incorrect start date.

Actual start date: 3 April, 12pm UTC.

Thank you for your understanding.

Total prize pool: $80k USDC
Eagles pool: $6k to lead Eagle, $6k for all Eagles
Code: <a href="/CairoLang/">CairoLang</a>
➡️ Requires KYC

👇
BlockSec Phalcon (@phalcon_xyz) 's Twitter Profile Photo

🚨 ALERT! Our system has detected a suspicious transaction on Sonic Labs, resulting in a loss of ~$45K. While the relevant unknown contracts are not open source, the issue appears to be an accounting flaw that allows repaying 0 to withdraw collateral and profit. The 'hacker' is

🚨 ALERT! Our system has detected a suspicious transaction on <a href="/SonicLabs/">Sonic Labs</a>, resulting in a loss of ~$45K. While the relevant unknown contracts are not open source, the issue appears to be an accounting flaw that allows repaying 0 to withdraw collateral and profit.

The 'hacker' is
JohnnyTime 🤓🔥 (@realjohnnytime) 's Twitter Profile Photo

What a great night at the Web 3 Developers Underground Meetup Web3 Devs Underground 🚀 Had the honour to be a speaker at the event, talk about Web3 security and connect with some great professionals in the industry in person🤝Definitely excited to speak at more meetups to come🎙️

What a great night at the Web 3 Developers Underground Meetup <a href="/Web3_Devs/">Web3 Devs Underground</a> 🚀 Had the honour to be a speaker at the event, talk about Web3 security and connect with some great professionals in the industry in person🤝Definitely excited to speak at more meetups to come🎙️
PeckShieldAlert (@peckshieldalert) 's Twitter Profile Photo

#PeckShieldAlert The $TRUMP dev withdrew 4.6M $USDC from the liquidity pool, bridged the funds to #Ethereum, and deposited them into #Coinbase within the last 14 hours

#PeckShieldAlert The $TRUMP dev withdrew 4.6M $USDC from the liquidity pool, bridged the funds to #Ethereum, and deposited them into #Coinbase within the last 14 hours
Remedy (@xyz_remedy) 's Twitter Profile Photo

uWu Protocol was exploited for $19 million. They used Curve's spot price `get_p` function to calculate token prices. Here’s how one Glider query could’ve caught the entire thing:

Kose (@0xkose) 's Twitter Profile Photo

After 9 wonderful months with Guardian Audits, I decided to pivot into Solana security 3 months ago and spent 2 months preparing without competing. Here comes the result of my first Solana competition: Third win, with 100% coverage in each, at SHERLOCK Can't wait for the

After 9 wonderful months with Guardian Audits, I decided to pivot into Solana security 3 months ago and spent 2 months preparing without competing. Here comes the result of my first Solana competition:
Third win, with 100% coverage in each, at <a href="/sherlockdefi/">SHERLOCK</a> 
Can't wait for the
Cyfrin CodeHawks (@codehawks) 's Twitter Profile Photo

A vulnerability is hidden in this code. Rock. Paper. Scissors. Exploit? Spot the vulnerability and secure the protocol! Special thanks to M3D for contributing this repo. 👇

A vulnerability is hidden in this code.

Rock. Paper. Scissors. Exploit? Spot the vulnerability and secure the protocol!

Special thanks to <a href="/m3dython/">M3D</a> for contributing this repo.

👇
Weilin (William) Li (@hklst4r) 's Twitter Profile Photo

The root cause of the Impermax attack is the mispricing of Uniswap V3 NFTs. The way it's pricing its NFT is using fair-pricing (which is robust against flashloan attacks!), but the fees' value are directly calculated: price = (amount0_after_fair_pricing + fee0) *

The root cause of the <a href="/ImpermaxFinance/">Impermax</a>  attack is the mispricing of Uniswap V3 NFTs.

The way it's pricing its NFT is using fair-pricing (which is robust against flashloan attacks!), but the fees' value are directly calculated:

price = (amount0_after_fair_pricing + fee0) *
Cyfrin CodeHawks (@codehawks) 's Twitter Profile Photo

🚨 There’s a vulnerability hidden in this code 🚨 Can you find it and secure the protocol? CodeHawks First Flight #39 starts now. With special thanks to yeahChibyke for contributing to this repo. 👇

🚨 There’s a vulnerability hidden in this code 🚨

Can you find it and secure the protocol?

CodeHawks First Flight #39 starts now. 

With special thanks to yeahChibyke for contributing to this repo.

👇
Solidity (@solidity_lang) 's Twitter Profile Photo

Solidity v0.8.30 just landed! This latest version is a maintenance release in light of the Pectra Ethereum network upgrade and changes the default EVM version from cancun to prague. 📝 Blog: soliditylang.org/blog/2025/05/0… 💾 GitHub: github.com/ethereum/solid… Some important things to

Solidity v0.8.30 just landed!

This latest version is a maintenance release in light of the Pectra Ethereum network upgrade and changes the default EVM version from cancun to prague.

📝 Blog: soliditylang.org/blog/2025/05/0…
💾 GitHub: github.com/ethereum/solid…

Some important things to
Daniel Von Fange (@danielvf) 's Twitter Profile Photo

1/ I found an AMM bug in screenshot in my X feed. ZAMM is a hyper gas-optimized AMM. A malicious user can create a new AMM/Coin pair multiple times, allowing them to stash away hidden LP tokens to later rug the pool. Here’s how the bug works:

1/ I found an AMM bug in screenshot in my X feed.

ZAMM is a hyper gas-optimized AMM. A malicious user can create a new AMM/Coin pair multiple times, allowing them to stash away hidden LP tokens to later rug the pool.

Here’s how the bug works:
Solidity (@solidity_lang) 's Twitter Profile Photo

We're thrilled to be celebrating 10 years of Solidity! Let's look at some highlights from the past decade and get a glimpse into the future. 🧵↓

We're thrilled to be celebrating 10 years of Solidity!

Let's look at some highlights from the past decade and get a glimpse into the future. 🧵↓
Weilin (William) Li (@hklst4r) 's Twitter Profile Photo

A detailed analysis of the GMX 🫐 attack. (1) The "refund" logic makes a malicious -> The attacker jail-break the restrictions to perform multiple actions in 1 transaction. As my previous tweet analyzed, the attacker fooled the frontend (the keeper bot) to hijack the control

A detailed analysis of the <a href="/GMX_IO/">GMX 🫐</a> attack.

(1) The "refund" logic makes a malicious -&gt; The attacker jail-break the restrictions to perform multiple actions in 1 transaction.

As my previous tweet analyzed, the attacker fooled the frontend (the keeper bot) to hijack the control