pessimist
651 posts

pessimist
@0xpessimist
21. Assumptions break under a pessimistic lens. Security Researcher @Hashlock_, My sensei @0xSorryNotSorry, prev Game Designer https://t.co/0ZHCkSxkRc

On Solana, events are often reconstructed from transaction traces, and failed transactions still emit data. @Dooflin5 details a bug in Across that could have allowed attackers to spoof deposit events and trick relayers into filling orders with no real deposit behind them.

🚀 This month I got 3 bug bounties paid out and built an open-source Claude Code skill along the way. Finding the bug is the hard part, but what really determines the outcome is how well you demonstrate its impact. That's where the PoC matters most: if it's not a mainnet-fork end-to-end test on real deployed contracts at the current mainnet state, it doesn't really prove impact. I iterated a lot before figuring out what actually works. Now it's a skill anyone can install. Free & fully open source 👇 github.com/cholakovvv/fou…


It's exactly what we've been saying, and now JPMorgan agrees. Security is the key blocker to institutions coming onchain. And whoever solves this problem is going to unlock tremendous growth. theblock.co/post/398611/jp…

LATEST: A senior blockchain security researcher at CertiK told CoinDesk on Wednesday that North Korea’s Lazarus Group is running a new macOS-focused campaign dubbed “Mach-O Man” that targets executives at fintech, crypto and other high-value firms through routine business communications.

The Jawas have officially moved from scavenging droids to scavenging bugs. Congrats to security researcher @okkothejawa for finding a High severity smart contract vulnerability and earning $50,000! Pledge $IMU behind him and earn $IMU every time he senses a disturbance in the code: immunefi.com/pledge/okkothe…



The white hat has returned the funds in full, and has been awarded a bug bounty. User funds are completely unaffected. Our appreciation to the white hat for identifying the bug, securing the vulnerable funds before further damage could happen, and assisting us in strengthening our system. Team is now working on deploying additional guardrails to prevent similar situations from happening again. We expect dango.exchange to resume operation within the day.


Marcus Hutchins, the guy famous for stopping the WannaCry Ransomware, probably has the best take on Mythos doing vulnerability research



The most fundamental limitation about LLMs which you can easily see in practice again and again: It doesn’t scale from demo to large scale. It can do X perfectly once in scenario Y, so impressively your sure it’s AGI. Then it never does it again in any other scenario — or worse it does X in scenario Y’ instead of doing X’ which is what you wanted. It’s not that it’s “intelligence” is brittle. It’s like trying to cover a surface completely with a sparse collections of points. If you have lots of points and you squint hard it might look right. But in the real world the area covered is still infinitesimal


🚨~$130k exploited today from SubQuery Network. Vulnerable code was written >2yrs ago. Access control missing. Basically, anyone can call the method below and set their own contract as the withdraw target for Staking rewards. Would your auditors catch this one?





