AccessDenied403

1.1K posts

AccessDenied403 banner
AccessDenied403

AccessDenied403

@ADCDIII

Security engineer specializing in tokenization, RWAs, and smart contract development at @taurus_hq, CMTAT contributor (@cmta_ch)

Switzerland 🇨🇭 Katılım Haziran 2022
4.2K Takip Edilen267 Takipçiler
Sabitlenmiş Tweet
AccessDenied403
AccessDenied403@ADCDIII·
Excited and grateful for the opportunity to be at @EthCC to discuss CMTAT! CMTAT is a tokenization standard developed by CMTA, widely adopted by companies such as Taurus, UBS, or Obligate. Check out the CMTA implementation here: github.com/CMTA/CMTAT CC @taurus_hq , @cmta_ch
EthCC - Ethereum Community Conference@EthCC

Security token expert Ryan Sauge (@ADCDIII) breaks down "CMTAT: Engineering a Security Token on EVM, with a Path to Privacy" at the Built on Ethereum track. This is exactly the kind of infrastructure work that will unlock compliant DeFi for institutional capital.

English
0
1
8
515
AccessDenied403
AccessDenied403@ADCDIII·
@bsaepfl @BDeath75 Thank you for this opportunity, looking forward to tomorrow. Well done also for all the organization that this requires!
English
0
0
1
23
BSA - EPFL 🦇🔊
BSA - EPFL 🦇🔊@bsaepfl·
We just crossed 400 registrations for the conference. Since so many of you signed up, we decided to add a second stage: Introducing the Secondary Stage 🌟 A track dedicated to individual keynotes and fireside chats from our speakers. Featuring: William De'Ath @bdeath75 : Data Sovereignty: Blockchain in the Age of AI Gauthier Villa @goatv_bk : The Rise of Autonomous Agents in DeFi Nandy Ba @nandy_ba : How Token Issuers Efficiently Grow TVL Carmen Hett (UNHCR) & William De'Ath @bdeath75 : On-Chain Treasury: UN Adoption of Blockchain & Stablecoins Stanislas de Maistre (Belem Capital) : From Experiment to Infrastructure: Institutional Capital in DeFi Rosie Ovan (CMTA) & Ryan Sauge @ADCDIII : CMTAT Nicolas Rémond @nremond : Stablecoins Will Bring All the Trading Onchain 📍 EPFL, BC 410 📅 March 20 Parallel track. Limited spots. 👉 Register: luma.com/nepg7a02
English
2
3
17
1.2K
AccessDenied403
AccessDenied403@ADCDIII·
Always impressed by @bsaepfl events. Great to be here this time as both attendee and speaker, sharing Cross-Chain Stablecoins Made Easy with CMTAT (@cmta_ch).
BSA - EPFL 🦇🔊@bsaepfl

We just crossed 400 registrations for the conference. Since so many of you signed up, we decided to add a second stage: Introducing the Secondary Stage 🌟 A track dedicated to individual keynotes and fireside chats from our speakers. Featuring: William De'Ath @bdeath75 : Data Sovereignty: Blockchain in the Age of AI Gauthier Villa @goatv_bk : The Rise of Autonomous Agents in DeFi Nandy Ba @nandy_ba : How Token Issuers Efficiently Grow TVL Carmen Hett (UNHCR) & William De'Ath @bdeath75 : On-Chain Treasury: UN Adoption of Blockchain & Stablecoins Stanislas de Maistre (Belem Capital) : From Experiment to Infrastructure: Institutional Capital in DeFi Rosie Ovan (CMTA) & Ryan Sauge @ADCDIII : CMTAT Nicolas Rémond @nremond : Stablecoins Will Bring All the Trading Onchain 📍 EPFL, BC 410 📅 March 20 Parallel track. Limited spots. 👉 Register: luma.com/nepg7a02

English
0
0
5
48
AccessDenied403
AccessDenied403@ADCDIII·
CMTAT Solidity was used by Zand, through Taurus infrastructure, to launch an AED-backed stablecoin on Ethereum. Built for flexibility, CMTAT enables multiple RWA use cases: from equities and debt to money market funds, including stablecoins like this one. github.com/CMTA/CMTAT
CMTA@cmta_ch

CMTAT powers regulated stablecoins In November 2025, Zand launched the country’s first regulated, multi-chain AED-backed stablecoin on public blockchains, built using CMTAT. It’s a great example of how CMTAT can support digital asset issuance - including stablecoins. Zand AED (AEDZ) is issued using CMTAT v3.0.0 on Ethereum via @taurus_hq's infrastructure. The stablecoin is backed by the UAE Dirham and is fully transparent, with reserve data published regularly on the Zand Trust website. For projects specifically focused on stablecoins, CMTAT also offers a streamlined version called CMTAT Light, providing the functionality required for stablecoins in most jurisdictions: minting, burning, address freeze / blacklisting, pause without additional functions required by equities and debt instruments. More information on Zand AED here: zandtrust.com/en Explore the CMTAT code: github.com/CMTA/CMTAT

English
0
0
2
81
Parth
Parth@0xparthdev·
@ethereum devs, have you seen proper usecase of optional access list in transactions? eips.ethereum.org/EIPS/eip-2930 It was proposed long time ago but I am not aware if anyone is using it meaningfully.
English
1
0
2
103
Luka M
Luka M@LukaM33·
Another @CodeHawks First Flight contest completed — this time I managed to take first place! There were some great takeaways from a couple of findings I missed in this contest. Really excited to jump into the Intuition contest today!
Luka M tweet media
English
2
1
7
164
CMTA
CMTA@cmta_ch·
CMTA has integrated LayerZero’s OFT with CMTAT Solidity, enabling tokenized securities to move across supported EVM chains while maintaining unified supply and compliance controls. Built by @noxlabs, the project introduces a LayerZero adapter integrating OFT with CMTAT via ERC-3643 and ERC-7802 interfaces. Key features: • Cross-chain CMTAT transfers • LayerZero V2 messaging • ERC-3643 & ERC-7802 compatible • Mint-and-burn unified supply • Foundry deployment scripts --> Technical details and source code: github.com/CMTA/CMTAT-Lay… --> Full announcement: cmta.ch/news-articles/… @LayerZero_Core @LayerZero_Fndn @domdotx @cameron_nili @taurus_hq @ADCDIII @veorq
CMTA tweet media
English
12
19
45
10.3K
AccessDenied403
AccessDenied403@ADCDIII·
LayerZero bridge adapters for CMTAT are now available through ERC-3643 and ERC-7802 compatibility, enabling secure and canonical cross-chain transfers of CMTAT across all LZ-supported EVM networks. Thanks to @noxlabs for their great work and collaboration github.com/CMTA/CMTAT-Lay…
CMTA@cmta_ch

CMTA has integrated LayerZero’s OFT with CMTAT Solidity, enabling tokenized securities to move across supported EVM chains while maintaining unified supply and compliance controls. Built by @noxlabs, the project introduces a LayerZero adapter integrating OFT with CMTAT via ERC-3643 and ERC-7802 interfaces. Key features: • Cross-chain CMTAT transfers • LayerZero V2 messaging • ERC-3643 & ERC-7802 compatible • Mint-and-burn unified supply • Foundry deployment scripts --> Technical details and source code: github.com/CMTA/CMTAT-Lay… --> Full announcement: cmta.ch/news-articles/… @LayerZero_Core @LayerZero_Fndn @domdotx @cameron_nili @taurus_hq @ADCDIII @veorq

English
0
0
1
136
AccessDenied403
AccessDenied403@ADCDIII·
@Brickken @cmta_ch Many thanks for this standard and the announcement. Its integration has enabled us to standardize several functions, errors, and events within CMTAT, while maintaining full compatibility with other standards, including ERC-3643 and ERC-1404.
English
0
0
0
31
Brickken
Brickken@Brickken·
Standards Are the Foundation of Institutional Tokenization Institutional capital does not scale on proprietary frameworks. It scales on open standards. We are partnering with the Capital Markets and Technology Association (@cmta_ch ) on the incorporation of ERC-7943 into their CMTA Token (CMTAT) Solidity implementation. CMTA’s framework is one of the most established open, blockchain-agnostic standards for tokenized securities, with implementations across Ethereum and other chains, and oversight from its Technical Committee and Advisory Board in Switzerland. Its modular architecture supports on-chain corporate actions, enforcement logic, and institutional-grade compliance. ERC-7943, authored by our Co-Founder and Head of Blockchain Dario Lo Buglio (@xaler2 ) , introduces a universal compliance interface for transfer validation, freezing, forced transfers, and standardized error signaling. By aligning ERC-7943 with CMTAT, we are: • Strengthening cross-platform interoperability across the RWA ecosystem. • Reducing fragmentation in regulated tokenization frameworks. • Embedding standardized compliance hooks at the protocol level. • Supporting cross-jurisdictional compatibility and long-term maintainability. This integration is a concrete step toward a unified compliance layer for tokenized financial instruments.
Brickken tweet media
English
21
29
72
3.4K
AccessDenied403
AccessDenied403@ADCDIII·
ERC-7943 (Universal RWA) is now supported in the CMTAT. This ERC, by @xaler2, defines a minimal interface for representing financial instruments on-chain, introducing core compliance features such as asset freezing, enforcement transfers, and authorized transfer restrictions.
CMTA@cmta_ch

CMTA announces ERC-7943 support in the CMTAT Solidity implementation (v3.2.0). ERC-7943 (Universal RWA) standard introduces a minimal, modular interface for compliance-related events and transfer restrictions, designed to sit on top of existing token standards. Its integration into CMTAT strengthens interoperability and helps reduce fragmentation in the tokenization of financial instruments. ERC-7943 Authored by Dario Lo Buglio @xaler2 (@Brickken co-founder). Learn more: cmta.ch/news-articles/… GitHub: github.com/CMTA/CMTAT Release: github.com/CMTA/CMTAT/rel… Thanks to the CMTA Technical Committee, all contributors to the release and @Brickken for the support. @ADCDIII @veorq

English
0
1
1
153
AccessDenied403
AccessDenied403@ADCDIII·
@0xluk3 Nice, cool that works locally in the browser. I will test it next week :)
English
0
0
1
25
Łukasz M
Łukasz M@0xluk3·
Built a small extension for myself - stops me from paranoid domain checking every time I visit a bank or exchange. It simply maintains trusted sites in local storage to don't have to investigate every letter in the URL. github.com/0xluk3/scamaway
English
2
1
10
608
AccessDenied403
AccessDenied403@ADCDIII·
@moo9000 Yes agree. I will add that you can use Claude/Cursor to write fuzzing tests, inspect code coverage report and add missing tests, review the implementation and make feedbacks, review static analysers reports. It is take time but you can have a solid result with all these step.
English
0
0
0
36
Mikko Ohtamaa
Mikko Ohtamaa@moo9000·
"Claude wrote vulnerable code" raised my eyebrows because it doesn't feel right 🤨 So I investigated it with Claude and asked what is the wrong with this PR. It indeed looks like an AI agent made a mistake here. However, the same mistake could have been made by a human. The prompt: "Inspect this pull request and changes and check what oracle address is incorrect and why, causing the ETH rate to be wrong" Claude also gives a good post-mortem analysis; see the screenshots. Also this was not a code vulnerability error, but a configuration error, just to be accurate. Regardless of whether the code is written by an AI or by a human, these kinds of errors are caught in an automated integration test suite. You can ask Claude to generate the test cases regardless of whether you write the code yourself or just autocomplete it. In this case, tests existed, but there was no test case for price sanity, not in the tests, not in the production itself (which I would also recommend: have DAO controlled safe price range). As a human deployer, you will also perform manual checks when deploying changes like this, as part of the DAO process or similar.
Mikko Ohtamaa tweet mediaMikko Ohtamaa tweet mediaMikko Ohtamaa tweet mediaMikko Ohtamaa tweet media
pashov@pashov

🚨Claude Opus 4.6 wrote vulnerable code, leading to a smart contract exploit with $1.78M loss cbETH asset's price was set to $1.12 instead of ~$2,200. The PRs of the project show commits were co-authored by Claude - Is this the first hack of vibe-coded Solidity code?

English
25
19
117
22.9K
AccessDenied403
AccessDenied403@ADCDIII·
@Up4theLayUp Very Interesting! Great work for an hackaton. I have opened some issue in the github. Quick question: how do you guarantee that the documents submitted are authentic?
English
1
0
0
58
Hassene
Hassene@Up4theLayUp·
Introducing UniShield 🛡️ DeFi adoption is stalled by a paradox: Institutions need KYC, but on-chain KYC kills privacy. We shouldn’t have to choose between compliance and data security. We built UniShield to fix the privacy-compliance gap in DeFi. 🧵 (1/6)
Hassene tweet media
English
2
3
13
498
AccessDenied403
AccessDenied403@ADCDIII·
@KhanAbbas201 This was also my understanding after several years of work in smart contract developement. Audit cost and risks are one the reason why it is hard to push more projets and financial instruments on-chain.
English
0
0
1
15
Abbas Khan ⟠
Abbas Khan ⟠@KhanAbbas201·
One of the biggest reasons why it's hard to experiment in crypto is security audits and their costs. I've spoken to more than 10 teams in the last month who are all currently ready to launch on mainnet, but are held back by audits and their insane cost. A basic audit can cost up to 50k for a small codebase, which makes it hard for bootstrapped projects to launch and explore if they should even be spending their time on this. The industry did a terrible job of overpricing security audits and it has strongly held the space back.
English
175
19
488
173.8K
AccessDenied403 retweetledi
DefiMoon 🦇🔊
DefiMoon 🦇🔊@DefiMoon·
🚨 $crvUSD depeging again as borrow rates have exploded to 40% crvUSD/USDC 0.985: If bitcoin starts cascading here due to $MSTR crashing, crvUSD will depeg very hard as the pegkeepers are empty and the pools are very imbalanced. There's only $2m of exit liquidity in each of the top crvUSD pools on Curve, so it won't take much to crush the crvUSD peg right now. The ratio is 10:1 😬😱 If @yieldbasis LPs start to panic at some point and begin to withdraw their BTC, the downward pressure on the peg will increase substantially!! Like I said many times before, CurveDAO was irresponsible to approve not only the initial 60m crvUSD credit line, but also the subsequent 300m credit line for YieldBasis without extensive real-world testing. RIP $YB $CRV $CVX 🪦
DefiMoon 🦇🔊 tweet mediaDefiMoon 🦇🔊 tweet media
DefiMoon 🦇🔊@DefiMoon

UPDATE #2: Significant depeg on $crvUSD now as pegkeepers exhausted all their reserves ⚠️ crvUSD/USDT trading down to 0.95 crvUSD/USDC trading down to 0.96 Borrow rates have spiked to 30% lol @yieldbasis is not good for crvUSD, only a matter of time before crvUSD/YieldBasis end up with a sizable chunk of bad debt!! $YB $CRV $CVX

English
25
7
92
36.3K