RazkkyDev

347 posts

RazkkyDev

RazkkyDev

@dev_razkky

Web3 security researcher || @CyfrinUpdraft alumni

参加日 Eylül 2024
351 フォロー中144 フォロワー
RazkkyDev がリツイート
Immunefi
Immunefi@immunefi·
Security researcher bpop23293 (@Ehsan1579) just scored $50,000 for a critical blockchain/dlt vulnerability disclosure. Someone stop this man, he's taking all the bounties. Pledge $IMU to him here so you can earn $IMU rewards when he finds more bugs: immunefi.com/pledge/bpop232…
Immunefi tweet media
English
30
16
342
9.5K
RazkkyDev がリツイート
chrisdior.eth
chrisdior.eth@chrisdior777·
🚨SADLY NOT AN APRIL FOOL'S JOKE🚨 Solana DEX Drift Protocol may have been exploited for over $270M The exploiter is swapping the stolen assets into $USDC, then bridging to #Ethereum to buy $ETH So far, they have bought 19,913 $ETH ($42.6M) $DRIFT token down ~45% CRAZY! 🤯
chrisdior.eth tweet mediachrisdior.eth tweet media
English
10
22
89
5.9K
RazkkyDev がリツイート
Kann Audits
Kann Audits@KannAudits·
Kann Audits 🤝 @APTreeio We’re excited to announce our official security partnership with APTree! APTree is yield distribution layer simplifying defi and tracking yield performance across Defi yielding protocols.
Kann Audits tweet media
English
7
30
76
3.1K
RazkkyDev がリツイート
Akintola Steve
Akintola Steve@Akintola_steve·
If you don’t understand how things like auth, payments, or scaling work… You’re not really building products yet. You’re just writing code.
Akintola Steve tweet media
English
4
4
42
1K
RazkkyDev
RazkkyDev@dev_razkky·
@Akintola_steve Never update internal accounting outside a transaction and raw locking. Concurrent db reads and writes is always a possibility
English
0
0
0
21
Akintola Steve
Akintola Steve@Akintola_steve·
Things to avoid when handling payments: 1. Never assume a successful API response means money actually moved. Always verify. 2. Never skip logging failed transactions. The day a user says “I paid and nothing happened”, that log is all you have. 3. Never rely on users to report failures. They won’t, they’ll just charge back and move on. 4. Never leave a PENDING transaction hanging without resolution logic. Pending is not a final state. 5. Never go live without a reconciliation job. Money isn’t something you eyeball and hope for the best. Your payment system is only as trustworthy as how you handle failures. What else would you add?
English
8
16
116
3K
Komfort Trost
Komfort Trost@komforttrost·
@Akintola_steve Never never also assume error/failed response from a money transfer means money was never moved. Why? Many reasons e.g You could call a third party to move money, they moved it but their backend caught a serialization error while returning response to you.
English
2
0
6
204
RazkkyDev
RazkkyDev@dev_razkky·
@felix_asan77503 @Akintola_steve I think it’s best to compress your response just once, and avoid compressing already compressed files and responses as well
English
1
0
0
78
felix asante
felix asante@felix_asan77503·
@Akintola_steve Is it still necessary to do that if compression is already handled by a reverse proxy like Nginx?
English
1
0
1
218
Akintola Steve
Akintola Steve@Akintola_steve·
Backend devs, always compress your payloads for faster responses. Make use of Brotli (or gzip), it does exactly that.
English
4
10
121
5.4K
RazkkyDev がリツイート
Immunefi
Immunefi@immunefi·
The AI security agent race continues. @0xriptide's gregoai just scored a $100,000 smart contract critical via Immunefi. Whose agent will strike next?
Immunefi tweet media
English
28
27
379
25.2K
RazkkyDev
RazkkyDev@dev_razkky·
This shows how dangerous backend mistakes can be. Debit succeeds, credit fails money gone. That’s what happens without proper transaction handling. Always use transactions, make operations idempotent, and lock DB rows during updates to avoid race conditions under high load.
Akintola Steve@Akintola_steve

A Nigerian fintech startup lost ₦47 million in one night. Not to hackers. Not to fraud. To one missing line of code. Every backend dev in Nigeria needs to see this

English
1
0
1
99
chief (w/acc)
chief (w/acc)@0x0fd4·
Eidukum Mubaarakun!!! May Allah accept our prayers and fasting as acts of iba’adah!! Aameen 🤲
English
14
3
48
608
Sev
Sev@00xSEV·
My biggest solo payout so far, thanks @immunefi and the project! It took me a while to get there
Immunefi@immunefi

Whitehat @00xSEV recently scored a $50,000 payout for a High smart contract vulnerability. Well done! You can pledge IMU to this security researcher here and earn IMU when they find more vulnerabilities: immunefi.com/pledge/xSEV/

English
28
4
347
10.3K
RazkkyDev がリツイート
chief (w/acc)
chief (w/acc)@0x0fd4·
open AI is giving one month free for the chat GPT plus plan, only for a limited time.
chief (w/acc) tweet mediachief (w/acc) tweet media
English
7
1
28
4.5K
RazkkyDev がリツイート
Qudra IO
Qudra IO@qudraIO·
Website vs Webapp: A website is where people discover your business. They see your products, learn what you offer, and place orders. A web app is where the business runs. You manage inventory, track orders, record sales, and see how things are performing.
Qudra IO tweet mediaQudra IO tweet mediaQudra IO tweet mediaQudra IO tweet media
English
1
1
4
50
Uddercover
Uddercover@Uddercover·
6th place in this one and I found the only high issue. Pretty cool. All the glory goes to Yahweh 🙇‍♂️
Uddercover tweet media
English
12
0
67
1.3K
RazkkyDev がリツイート
JohnnyTime 🤓🔥
JohnnyTime 🤓🔥@RealJohnnyTime·
🚨 A Malicious Validator Can Steal 32 ETH From Users in a Single Block Finding these in Lido forks or new LSDs? Direct path to huge bounties. Liquid staking protocols have billions in TVL. One missed validator betrayal = instant $10M+ drain. A malicious validator front-runs the protocol's deposit: sends 1 ETH first with their own withdrawal credentials, then lets the protocol top-up the remaining 32 ETH. Boom — now they control the full validator and the users' funds. Credentials only set on the initial deposit. This vector has been missed in real audits. Spot it = massive Immunefi payout White hat hacking mindset: - Always ask: "What if the validator lies or races me?" - Check every deposit path for race conditions.
English
4
6
30
3.3K