Neville Grech (@neville_grech) 's Twitter Profile
Neville Grech

@neville_grech

Co-Founder @dedaub & Lecturer @UMMalta
Prev: CS research fellow @uoaofficial @BristolUni @unisouthampton

ID: 721353093

linkhttps://www.nevillegrech.com calendar_today18-10-2013 22:27:42

509 Tweet

526 Followers

326 Following

cephalopod (@macrocephalopod) 's Twitter Profile Photo

“If he’s at a hedge fund, have a friend look him up on Bloomberg. If he doesn’t have an ACTIVE profile he’s back office. Or he’s a quant trader.”

“If he’s at a hedge fund, have a friend look him up on Bloomberg. If he doesn’t have an ACTIVE profile he’s back office. Or he’s a quant trader.”
Dedaub (@dedaub) 's Twitter Profile Photo

The Dedaub team, in a study for the EF in 2021, identified an exhaustive list of contracts that were easier to exploit with **EIP-3074** Included in the list where development contracts in Compound, 1inch & SushiSwap Nowadays, this is much less of a concern Let's see why ⬇️

The Dedaub team, in a study for the EF in 2021, identified an exhaustive list of contracts that were  easier to exploit with **EIP-3074**

Included in the list where development contracts in Compound, 1inch & SushiSwap

Nowadays, this is much less of a concern

Let's see why ⬇️
Neville Grech (@neville_grech) 's Twitter Profile Photo

Great job by the team! Timeline: UTC 16:00 issue confirmed by Dedaub UTC 16:27 issue disclosed to Bedrock & their security auditors UTC 18:28 first hack transaction We told Pendle to remove $30m uniBTC Eventually, Bedrock devs woke up and all contracts (8 chains) upgraded

Open Source Intel (@osint613) 's Twitter Profile Photo

The internet is roasting Europe, drawing sharp comparisons between the EU’s lackluster innovation and the US’s cutting-edge advancements. Quite funny actually.

Corry Wang (@corry_wang) 's Twitter Profile Photo

1/ This internal 2007 Nokia presentation on the first iPhone is a really good example of how incumbents actually get disrupted Oftentimes, the incumbent already knows what needs to be done. It's just that organizational incentives inhibit the incumbent from doing it

1/ This internal 2007 Nokia presentation on the first iPhone is a really good example of how incumbents actually get disrupted

Oftentimes, the incumbent already knows what needs to be done. It's just that organizational incentives inhibit the incumbent from doing it
nick.eth (@nicksdjohnson) 's Twitter Profile Photo

Recently I was targeted by an extremely sophisticated phishing attack, and I want to highlight it here. It exploits a vulnerability in Google's infrastructure, and given their refusal to fix it, we're likely to see it a lot more. Here's the email I got:

Recently I was targeted by an extremely sophisticated phishing attack, and I want to highlight it here. It exploits a vulnerability in Google's infrastructure, and given their refusal to fix it, we're likely to see it a lot more. Here's the email I got:
Dedaub (@dedaub) 's Twitter Profile Photo

Cetus AMM on the Sui has suffered a catastrophic ~$200M hack🚨 Root cause: an arithmetic overflow in the liquidity calculation that allowed an attacker to withdraw astronomical amounts of tokens from a small liquidity position. How did they pull this off? 🧵

Cetus AMM on the <a href="/SuiNetwork/">Sui</a> has suffered a catastrophic ~$200M hack🚨

Root cause: an arithmetic overflow in the liquidity calculation that allowed an attacker to withdraw astronomical amounts of tokens from  a small liquidity position.

How did they pull this off? 🧵
Dedaub (@dedaub) 's Twitter Profile Photo

The Cetus AMM Sui hack of $200M stolen is due to a flawed overflow check The attacker added massive liquidity with just 1 token by exploiting a bit truncation vulnerability in the AMM math. Full details below ↓ dedaub.com/blog/the-cetus…

Immunefi (@immunefi) 's Twitter Profile Photo

Wondering what happened with the Cetus hack? Join Mitchell Amador and Magnus partner Dedaub Monday for a line by line analysis with Neville Grech and how you can build safely in the most hostile environments. 🗓️ Date: June 2 ⏰ Time: 6pm London x.com/i/spaces/1RDGl…

Dedaub (@dedaub) 's Twitter Profile Photo

Just mitigated: The CPIMP Attack – a stealthy front-running exploit infecting 100s of DeFi proxies across many protocols Attacker inserts hidden proxies that self-restore, spoof Etherscan, and lie dormant for high-value strikes Tens of millions at risk dedaub.com/blog/the-cpimp…

Web3 Summit (@web3summit) 's Twitter Profile Photo

“Don’t trust — disassemble.” Neville Grech, Co-Founder of Dedaub, shows how decompiling smart contracts helps whitehats stay ahead of blackhats. Reading bytecode ≠ reverse trust — it’s reverse engineering for defense.

“Don’t trust — disassemble.”
<a href="/neville_grech/">Neville Grech</a>, Co-Founder of <a href="/dedaub/">Dedaub</a>, shows how decompiling smart contracts helps whitehats stay ahead of blackhats.
Reading bytecode ≠ reverse trust — it’s reverse engineering for defense.