P.H.A.N.T.O.M F.O.R.T

9.8K posts

P.H.A.N.T.O.M F.O.R.T banner
P.H.A.N.T.O.M F.O.R.T

P.H.A.N.T.O.M F.O.R.T

@Phantom_Secure

Web3 Auditor @ AGV Protocol | Bridging smart contract & infrastructure security gaps | On-chain + cloud/API pen-testing

lagos nigeria Beigetreten Aralık 2014
2.5K Folgt1.5K Follower
Angehefteter Tweet
P.H.A.N.T.O.M F.O.R.T
P.H.A.N.T.O.M F.O.R.T@Phantom_Secure·
Weirdly, I want to buy a warehouse, set it up with internet access via starlink, and make people access it for free, as long as you have a verifiable project you are working on.
English
1
0
4
181
P.H.A.N.T.O.M F.O.R.T
P.H.A.N.T.O.M F.O.R.T@Phantom_Secure·
@rems_vynl The github link in the security auditor task, links to a non existent codebase. Also, asking user to run a command that executes a script on their terminal as demo, is a red flag. Kindly review these things if you are a real organisation.
English
0
0
1
9
Mojisola Alegbe
Mojisola Alegbe@yehhmisi·
Funny because when you look at the history of computing…. The very first computer program was written by a woman, Ada Lovelace. Grace Hopper created one of the first compilers, which made programming more human-readable. Margaret Hamilton led the team that built the software that took humans to the moon. Radia Perlman invented the technology that makes modern internet networks stable. Katherine Johnson calculated flight paths that made space travel possible. I could go on. So reducing “girls” to color and aesthetics, and “boys” to specs is inaccurate.
Python Developer@Python_Dv

True 😂😜

English
32
18
119
15.9K
Fav_Truffle
Fav_Truffle@Fav_Truffle·
Your first shock as a security researcher
English
7
0
17
2.7K
P.H.A.N.T.O.M F.O.R.T
P.H.A.N.T.O.M F.O.R.T@Phantom_Secure·
We need to be more focused about the transfer of security from one domain to another. As much as we all agree that security is non-negotiable, in some domain a security breach takes you out of business, and you only become a case study for others and not your organization...
English
0
0
0
3
P.H.A.N.T.O.M F.O.R.T
P.H.A.N.T.O.M F.O.R.T@Phantom_Secure·
Security in web3 cannot be handled like it is done in web2. So what happens when they both intersect.
English
1
0
0
7
P.H.A.N.T.O.M F.O.R.T retweetet
Libertyedge_tech
Libertyedge_tech@libertyedgetech·
Don't Spend 4.44 million to find out what your company is weak at. Waiting till your data is breached before taking security cautions is very risky The average breach of information cost in the world stood at 4.44M in 2025 (IBM Cost of a Data Breach Report). Reactive recovery consumes resources, undermines trust and attracts regulatory fines. Sometimes, the company is lost totally. This can be prevented with Penetration testing, where vulnerabilities are identified and fixed in advance before they can be exploited. It is more cost-effective than fixing, it saves millions in lost business, legal fees, and downtime. Shift to proactive security. Your company is entitled to resilience, rather than recovery. #Cybersecurity #PenetrationTesting #DataBreach #RiskManagement.
Libertyedge_tech tweet media
English
0
2
7
50
P.H.A.N.T.O.M F.O.R.T
P.H.A.N.T.O.M F.O.R.T@Phantom_Secure·
institutional adoption, mitigating risks like bridge exploits—a top attack vectors. As convergence accelerates, robust, secure bridging technologies emerge as a focus area for innovation and investment to enable trusted hybrid applications and broader mainstream integration.
English
0
0
0
4
P.H.A.N.T.O.M F.O.R.T
P.H.A.N.T.O.M F.O.R.T@Phantom_Secure·
Web2 security intersects via hybrid ecosystems, where TradFi/DeFi convergence exposes off-chain vulnerabilities (e.g., IAM roles, API keys) in Web3 projects. Secure bridges between Web2 and Web3 ecosystems are crucial for seamless interoperability, asset transfers, and ...
English
1
0
1
10
P.H.A.N.T.O.M F.O.R.T retweetet
Libertyedge_tech
Libertyedge_tech@libertyedgetech·
A mother’s love is the first protection we ever know. 💙 Before passwords, alarms, and security systems, there was Mom always watching, always protecting, always caring. Today we celebrate the incredible women who protect what matters most every day. Happy Mother’s Day.
Libertyedge_tech tweet media
English
0
4
7
58
Elorm Daniel
Elorm Daniel@elormkdaniel·
Windows is better than Linux
English
60
7
63
9.2K
Mololuwa | Cybersecurity - (The God Complex)
>security engineer >has never opened Wireshark >has never written a detection rule >has never investigated an alert >doesn't know what CVE or CVSS means >doesn't know how vulnerabilities are actually exploited >talks about AI cybersecurity but can't explain how a firewall works You know yourself Go and learn
English
17
35
269
18.2K
Shieldify Security
Shieldify Security@ShieldifySec·
🚨 SOMEONE SWAPPED ~50.43M $aEthUSDT (from Aave) swapped via CoW Protocol for 327.24 $aEthAAVE (~$35.9K value) For $50M+ orders, always verify min received & paths—DEX liquidity can't handle it without massive loss Source: etherscan.io/tx/0x9fa9feab3…
Shieldify Security tweet media
English
5
4
17
1.6K
P.H.A.N.T.O.M F.O.R.T
P.H.A.N.T.O.M F.O.R.T@Phantom_Secure·
Checking out openclaw for a personal project. Seems like a pretty good tool. Let's see what it has for me.
P.H.A.N.T.O.M F.O.R.T tweet media
English
0
0
0
27
P.H.A.N.T.O.M F.O.R.T
P.H.A.N.T.O.M F.O.R.T@Phantom_Secure·
One step at a time. A critical will be found.
English
0
0
0
6
P.H.A.N.T.O.M F.O.R.T
P.H.A.N.T.O.M F.O.R.T@Phantom_Secure·
@Bigkene10 Stefan and Damon continued to live because at every point in time, they were either at the mercy of Elijah or Klaus.
English
1
1
0
29
EKENE ✝
EKENE ✝@Bigkene10·
No rules. No mercy. who’s walking out alive? Klaus & Elijah VS Damon & Stefan
EKENE ✝ tweet mediaEKENE ✝ tweet media
English
117
98
208
6.3K
P.H.A.N.T.O.M F.O.R.T
P.H.A.N.T.O.M F.O.R.T@Phantom_Secure·
Updating and setting up testing environment, can take up all the energy, meant to search for bugs.
English
0
0
0
4
P.H.A.N.T.O.M F.O.R.T
P.H.A.N.T.O.M F.O.R.T@Phantom_Secure·
Built Phantom Agent using Claude Code to handle env setup, scans, and code explanations. Solely assists my bug hunting, freeing me to focus on deep code reviews and vuln spotting
P.H.A.N.T.O.M F.O.R.T tweet media
English
1
0
0
45
Raman | CryptoJobsList
Raman | CryptoJobsList@ksaitor·
if you want to work in web3 - reply below if you want to hire in web3 - reply below let’s do some matchmaking
English
89
4
145
14K