pseca

217 posts

pseca banner
pseca

pseca

@pseudoSeneca

Beigetreten Mayıs 2020
590 Folgt42 Follower
pseca
pseca@pseudoSeneca·
@pashov You should not be charging much higher than the direct token price. If you do, you’ll get out priced by other people pricing more fairly. E.g 2X the token price of opus is reasonable, giving you a 100% margin
English
0
0
1
29
pashov
pashov@pashov·
How much do you think an AI audit scan should cost? Only honest answers, comment below.
English
54
2
86
13.7K
pseca
pseca@pseudoSeneca·
@wminshew What happened? We are choosing vendors atm
English
2
0
0
1.2K
will minshew
will minshew@wminshew·
hands down bridge has the worst customer support I've ever experienced and it's not even close. I strongly recommend others to not work with them, if it can be avoided, and I look forward to the day when we can remove them from our stack
English
33
0
174
35.1K
sof 𓋹
sof 𓋹@schisofrenia·
aesthetics are pure information compression and thus they run the world on all levels platonic solids/fractals/etc. are compressions and embodiments of complex mathematical relationships and constraints career choices & cultural movements too are aesthetic-first as "tech bro" or "trad wife" are high information density symbols that neatly package the qualia of the life you want to live
sof 𓋹 tweet media
English
73
213
1.8K
61.5K
pseca
pseca@pseudoSeneca·
@parsec_finance @0xShual Is this not more a function of the fact that there is so much more stable coins supplied? If you look at total USD borrows, major ATH
English
0
0
1
67
Dedaub
Dedaub@dedaub·
Just mitigated: The CPIMP Attack – a stealthy front-running exploit infecting 100s of DeFi proxies across many protocols Attacker inserts hidden proxies that self-restore, spoof Etherscan, and lie dormant for high-value strikes Tens of millions at risk dedaub.com/blog/the-cpimp…
English
3
17
70
16.8K
pseca
pseca@pseudoSeneca·
@raykov_krasimir @pcaversaccio If you wanted to check your contracts, you could look at the trace on tenderly and see if there is a malicious implementation in the middle of a call? @pcaversaccio
English
0
0
0
68
sudo rm -rf --no-preserve-root /
It gets even more fancy: the way Etherscan was tricked showing the wrong implementation contract is based on setting 2 different proxy slots in the same frontrunning tx. So Etherscan uses a certain heuristic that incorporates different storage slots to retrieve the implementation contract. There is an old proxy by OpenZeppelin who used the following slot: `keccak256("org.zeppelinos.proxy.implementation")` = `0x7050c9e0f4ca769c69bd3a8ef740bc37934f8e2c036e5a723fd8ee048ed3f8c3` We now also have the standard EIP-1967 slot `bytes32(uint256(keccak256('eip1967.proxy.implementation')) - 1)` = `0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc` So what happened is that the old OpenZeppelin proxy slot was written to with the benign implementation address _and_ the standard EIP-1967 slot was also written to with the malicious implementation address. Since Etherscan queries first the old proxy slot, it retrieved the benign looking one first and thus displayed it.
sudo rm -rf --no-preserve-root / tweet media
deebeez@deeberiroz

We @VennBuild just discovered a critical backdoor on thousands of smart contracts leaving over $10,000,000 at risk for months Along with the help of security researchers @dedaub @pcaversaccio, the seals team @seal_911 and others, we managed to rescue the majority of funds before the attacker could make their move. This is the story of how a sophisticated attacker (cough Lazarus) put backdoors in thousands of contracts and ALMOST got away with it 🧵

English
13
44
312
60.4K
deebeez
deebeez@deeberiroz·
We @VennBuild just discovered a critical backdoor on thousands of smart contracts leaving over $10,000,000 at risk for months Along with the help of security researchers @dedaub @pcaversaccio, the seals team @seal_911 and others, we managed to rescue the majority of funds before the attacker could make their move. This is the story of how a sophisticated attacker (cough Lazarus) put backdoors in thousands of contracts and ALMOST got away with it 🧵
English
53
116
784
132.6K
pseca
pseca@pseudoSeneca·
@sparkdotfi I help maintain a contract which had $15k of USDC supplied into AAVE at the snapshot time (Arbitrum) but we have not received an allocation. It seems like this meets the criteria – is it possible that there is an error? @sparkdotfi @RuneKek
English
0
0
0
36
Spark
Spark@sparkdotfi·
Welcome to the Spark Ignition Airdrop. It’s the launch moment for a new era of decentralized finance. Recognizing the visionaries. The believers. The ones who saw the future. Ignition Phase 1 eligibility checker is now live. See if you’re eligible 👇
English
551
234
1.4K
677K
CoW DAO
CoW DAO@CoWSwap·
It's official: CoW Protocol is officially moving from single Batch Auctions to a new core mechanism: the Fair Combinatorial Auction (FCA). This is one of the biggest changes in how trades are settled on-chain - and it's great news for users. Here's why 🐮✨
English
23
39
357
36K