Achim

309 posts

Achim banner
Achim

Achim

@Achthar

DeFi Founder Quant Trading Risk Managment Mathematics MSc

Berlin, Germany Katılım Şubat 2021
122 Takip Edilen570 Takipçiler
Achim retweetledi
Clearstone Fusion - DeFi for institutions
Quick story on @clearstoneAI: Started as 1delta Obelisk during the Stablehacks hackathon. Kept building alongside @SuperteamDE. Rebranded to Clearstone as the vision sharpened - institutional-grade, audit-first DeFi rails on Solana. Same team, same conviction, sharper focus.
English
0
1
1
28
Achim retweetledi
WDK
WDK@WDK_tether·
🥇 USD₮007 — License to yield AI agents that autonomously optimize your DeFi lending positions across Aave, Compound, Morpho and Silo. One signature, zero capital at risk. Built by @Achthar ⌨️ github.com/1delta-DAO/wdk…
English
1
1
3
392
Achim retweetledi
Achim
Achim@Achthar·
How can a bank run happen on a trustless lender like Aave - even with over $25B in reserves (at the time) and less than $300M (~1.2%) at risk of bad debt? I put together a short explainer on what happened and why this behavior actually makes sense: youtu.be/K67sgKnpT-o
YouTube video
YouTube
English
0
0
0
44
Achim
Achim@Achthar·
I set up a draft extension of @Uniswap's Permit2: github.com/1delta-DAO/per… While Permit2 works well for token transfers - as shown by @0xProject's aggregator, Uniswap X and others - I felt that it could be more modular This version enables it for e.g. borrows - via any lender
English
0
0
1
25
Achim retweetledi
Arc
Arc@arc·
As Arc approaches mainnet, we’re opening the network. Starting today, developers can spin up a testnet node, inspect the code, and actively test and challenge Arc through our live bug bounty on HackerOne. → Arc Testnet code is now open-source → The Arc bug bounty is live on @Hacker0x01 → Developers can run their own Arc nodes Inspect it. Test it. Validate it. Blog: arc.network/blog/open-sour… Bug Bounty: hackerone.com/circle-bbp
English
256
220
1.2K
190.2K
Achim
Achim@Achthar·
@no__hive Thanks for the appreciation!
English
0
0
1
3
Achim
Achim@Achthar·
@StaniKulechov @aave Interesting I would have assumed that Aave would just start deploying V4 instead of V3 for new chains. V3 is still great, I just think the gain in capital efficiency for V4 would be a stronger sell for Monad
English
0
0
0
56
Achim retweetledi
1delta
1delta@1deltaDAO·
We're co-hosting a full day with @DeFiFounders @ EthCC 🇫🇷 on April 2nd. - a vault ecosystem brunch for allocators and LPs - an investor pitch session - a panel with @Ledger, @privy_io, and @zerion - a private DeFi Soirée to close If you're going to be in Cannes, apply here: luma.com/defifounders
English
3
3
6
3.1K
Achim
Achim@Achthar·
We built a institutional lending solution using @kamino on @solana Institutions can deploy markets where retail users can deposit after a KYC process and institutions can deposit collateral and borrow after passing KYB Details: dorahacks.io/buidl/42055/
English
0
0
1
75
Achim
Achim@Achthar·
Built Verato at @synthesis_md — a trustless settlement gateway on @CeloOrg where users delegate DeFi ops to AI agents via Merkle-proof permissions. Agents autonomously migrate lending positions across Aave V3, Moola & Morpho with oracle-verified swaps via @Uniswap.
English
0
0
1
91
Achim retweetledi
1delta
1delta@1deltaDAO·
We're proud to share 1delta's @Compound_xyz integration has been reviewed by @Certora. There were zero critical findings and all key issues were resolved. We're building the onchain API for lending and borrowing across 50+ chains and 200+ protocols, now fully audited and ready to integrate. Full audit report below.
1delta tweet media
English
2
7
17
1.1K
Achim
Achim@Achthar·
Most likely a rug-pull as on Hemi, an EOA used `mintUnbacked` to mint 1.3m equivalend collateral USDC to then borrow all funds in the protocol: explorer.hemi.xyz/tx/0x1ec7c369e… This should only be callable by bridges...
CertiK Alert@CertiKAlert

#CertiKInsight 🚨 Earlier this morning @ploutos_money was exploited and lost 187.36 (~$388k) due to an apparent price oracle misconfiguration. skylens.certik.com/tx/eth/0xa17dc… Since the attack, the Ploutos website and social media accounts have been deleted.

English
0
0
0
48
Achim
Achim@Achthar·
Seems like a ‘mintUnbacked’ by a protocol admin of just enough collateral tokens to borrow and drain the entire protocol here: explorer.hemi.xyz/tx/0x1ec7c369e… Most likely a rug-pull as there is no communication by team Also, the txns are all separate instead of one clean run
Hemi@hemi_xyz

Addressing the Ploutos Protocol Exploit On February 26, 2026, at approximately 05:00 UTC, a security incident occurred on the DeFi protocol Ploutos Money affecting all major deployments of the Ploutos protocol on Hemi, Ethereum, Arbitrum, Hyperliquid, and Avalanche. As a result of the exploit, all funds on Ploutos were drained. Assets were quickly exfiltrated to the Ethereum mainnet through crosschain bridges Stargate (Hemi) and Li.Fi (Arbitrum, Hyperliquid, and Avalanche). The attack took various forms across the affected chains, including updating oracles to malicious contracts, as reported by onchain security monitors such as @Certik and @BlockSecTeam, and minting unbacked collateral tokens used to take out invalid loans. Following the exploit, Ploutos Money’s website and social feeds were taken offline without an announcement or explanation from the team. A subsequently shared message in the official Ploutos Telegram channel has not yet been confirmed as verified team communication, and users should exercise caution before following any recovery steps until the validity of these communications can be confirmed by independent security firms and blockchain project teams. Ploutos Money is one of many protocols integrated on the Hemi chain that provide lending and were previously incentivized through Merkl campaigns. The exploited vulnerability was confined solely to the Ploutos deployments and does not affect the Hemi core protocol or other connected protocols. An internal investigation is ongoing to understand the scope and full impact of this exploit and advise affected users on next steps. For now, all users should take extra precautions when interacting with Ploutos and related contracts. Users who interacted with Ploutos across Hemi, Ethereum, Arbitrum, Hyperliquid, Avalanche, or any chain should revoke permissions for the relevant contracts. To revoke any token approvals to Ploutos contracts, use wallets such as Rabby or web-based tools, including pure.finance/token-revokes/ (Hemi-only) or other third-party revoke tools. On Hemi, permissions should be revoked for all of the following addresses: 0xDdc98fF53945e334Ecca339b4DD8847b3769e8f0 0x5E660Deb9F5122bc185681b194a442590BcFcb64 0x87c6f09FA2DFd99717bDEeDf19496970Ca84264d 0x3FaA464dE86ca69863FF0ae029A7A0F0466B8fD9 0xB75a86dEedb9b4c95543D2dD0cc41CB641a28C24 0xA8F2DcaEE054809017FDF6EFbacdD5387a065Bc9 0x9DF7B63fD5295944038E061cb2e4637618227f85 0x682f12e6DD63495E31c24572F9997B3Bc7A99442 0x01d65Ded4C3c4F76Acd5EAE730320eBb4aF0E156 0xa9b9cCE44fe4150e87965bb31FB2b55D009812B1 0x9D7a3590cA6621893bC6B908B8Bce925d9407bB9 0xD6203b39b1e57301fd10CB946436Dda71D933F4D

English
0
0
0
48
Achim
Achim@Achthar·
@berastotle @0xosprey I think there should have been additional vetting towards users and devs on this, especially given how wallets behave when they fail to simulate (which I think still is the case for Rabby Wallet)
English
0
0
0
25
Berastotle
Berastotle@berastotle·
@Achthar @0xosprey LOL most forked protocol frontends will be totally cooked. Thankfully gas is cheap
English
2
0
0
35
Joe
Joe@0x_Osprey·
Congratulations to 0x7f4e...fa7d who managed to spend their entire Monad airdrop (112.7k) on failed txn fees 🫡
Joe tweet media
English
41
16
549
58.8K
Achim
Achim@Achthar·
@berastotle @0xosprey It is intentional They use it for parallelization, since one can spam txns with high gas limits (and low usage) and meddle with the overall block gas limit This is a major issue on Ethereum where MEV bots can just frontrun everyone with higher gas limits at no additional cost
English
0
0
0
24