LEVI_104

70 posts

LEVI_104 banner
LEVI_104

LEVI_104

@0xLEVI104

Katılım Ekim 2022
686 Takip Edilen107 Takipçiler
LEVI_104
LEVI_104@0xLEVI104·
@pennysplayer 之前做paradigm ctf 2022的时候,vanity那题也是这样,不过题目要算的是0x1626ba7e(算了三个多小时,but python)。这里是0x00000000,那个人在petal合约部署之后的四小时就搞定了😲
中文
1
0
0
446
smhkptking
smhkptking@pennysplayer·
巧妙的ponzi hash游戏,稍微慢了2min,能躺着收米的000000邀请码被人抢先注册上了。曼巴out #code" target="_blank" rel="nofollow noopener">etherscan.io/address/0xe097…
中文
1
0
13
3.8K
LEVI_104
LEVI_104@0xLEVI104·
Clara is something I actually use in my daily life among numerous AI products. tbh although it may sometimes make mistakes in analysis(just for now), it still gives me a general description when an attack occurs which helps me a lot.
Liyi Zhou@lzhou1110

Nearly 300 incidents so far, including 26 in March alone, and we are only at the 18th of March. That is about 1.5 incidents per day on average, and the rate is still increasing. We are still backfilling data, and a more detailed analysis will come soon. This is a much improved version of my DeFi Attacks SoK (accepted by IEEE S&P, 320 citations), and I think I have surpassed my previous work. The scale of this is honestly quite stunning, and we believe @clara_oracle is highly useful for the entire community. Not entirely sure why Clara has not gained much much more attention yet (Clara only has 250 followers, even fewer than the number of citations I had for my academic paper), so any help in spreading this would be greatly appreciated (Retweet or spread within your network 🙏). Clara will collect more than 1000 incidents soon. Together, we are building a much safer DeFi for tomorrow. Clara will become one of the best security dataset for both academia and the industry. Clara: clarahacks.com DeFi attack SoK: arxiv.org/pdf/2208.13035

English
2
1
2
584
LEVI_104
LEVI_104@0xLEVI104·
@lzhou1110 AI will be helpful if someone is gonna build WhereToMigrate ;D
English
0
0
0
50
Liyi Zhou
Liyi Zhou@lzhou1110·
Looks like we have an imitator here for this Alkemi liquidation thing. Someone copied the attacks after 40 mins?
Liyi Zhou tweet media
English
3
0
5
973
LEVI_104
LEVI_104@0xLEVI104·
@hklst4r 噢噢有道理,攻击比rugpull更快一步😂
中文
0
0
0
35
Weilin (William) Li
Weilin (William) Li@hklst4r·
@0xLEVI104 原本的就是被攻击了。因为被黑客拿走的钱owner本来就能拿走。后续项目方直接跑路了
中文
1
0
1
80
Weilin (William) Li
Weilin (William) Li@hklst4r·
The root cause of the @SynapLogic apears to be a business logic fault. When purchasing the SYP token with ETH (or USDC), you can fill in the `address[] refBy` parameter with a list of addresses, each getting a certain percentage (10%) of the ETH/USDC user spend. However, the attacker uses `refBy = [self, self, ...]`, setting himself as the refer 31 times (reference gets 31 * 10% = 310% of the total spending) to drain the purchasing contract. The total loss is around $88K. --- It seems the contract has been already paused. This is only my preliminary analysis and I may make mistakes.
Weilin (William) Li tweet media
English
7
5
53
9K
LEVI_104
LEVI_104@0xLEVI104·
It seems someone is building a honeypot for hackers. 15 ETH, does it look tempting? Who is the prey, who is the hunter? Honeypot contract: #code" target="_blank" rel="nofollow noopener">etherscan.io/address/0x8326… Actually Log contract: etherscan.io/address/0xa865…
LEVI_104 tweet mediaLEVI_104 tweet media
English
0
0
1
306
LEVI_104
LEVI_104@0xLEVI104·
thread 4) the end, see u on chain
LEVI_104 tweet media
English
0
0
0
106
LEVI_104
LEVI_104@0xLEVI104·
thread 3) When the market is good, your bot will keep climbing upwards, printing money :D
LEVI_104 tweet media
English
1
0
0
142
LEVI_104
LEVI_104@0xLEVI104·
thread 1) In October last year, when fourmeme was in full swing, I used my spare time to build a fourmeme sniper bot, which I am now open sourcing: github.com/chen4903/group…. It can still run stably, but whether it is profitable depends on your strategy and the market.
English
1
0
1
188
LEVI_104
LEVI_104@0xLEVI104·
thread 6) Therefore, if you plan to test on the mainnet, do not use commonly used addresses. You can use something like `makeAddr("user1-prevent-abuse")`. Or your tests maybe fail unexpectedly due to the fisherman. And never send real assets to such addresses
English
0
0
0
223
LEVI_104
LEVI_104@0xLEVI104·
thread 5) He is constantly abusing other addresses we usually use... No need to decompile, it must be a malicious contract: #code" target="_blank" rel="nofollow noopener">basescan.org/address/0x3Ae1…
LEVI_104 tweet media
English
1
0
0
280
LEVI_104
LEVI_104@0xLEVI104·
thread 1) Fisherman has a new idea to hack with 7702, plz note to use a public account when making tests or other stuffs
English
1
0
0
253
LEVI_104
LEVI_104@0xLEVI104·
thread end) Everything will be open-sourced in July 2025.
LEVI_104 tweet media
English
1
0
9
397
LEVI_104
LEVI_104@0xLEVI104·
thread 1) A simple tool, capable of comparing the similarity of Similar Contracts and guessing EVM contracts that are not open-source. paprika-evm.xyz
LEVI_104 tweet media
English
2
0
5
643
jon becker
jon becker@beckerrjon·
🦦🦦🦦🦦🦦🦦🦦🦦🦦🦦🦦🦦🦦🦦🦦🦦🦦🦦🦦🦦🦦🦦🦦🦦🦦
jon becker tweet media
QME
1
0
21
2K