0xBabsAudits

187 posts

0xBabsAudits banner
0xBabsAudits

0xBabsAudits

@BABS96711

Smart Contract Auditor @sherlockdefi | I work on security reviews of DeFi protocols with focus on accounting risks, invariant breaks and trust assumptions.

Nigeria Katılım Ekim 2023
86 Takip Edilen66 Takipçiler
0xBabsAudits
0xBabsAudits@BABS96711·
@HackenProof 1. Send the "amount" to "msg.sender" instead of "account". 2. Missing access control in upstateRoot function, anyone can call it and replace with malicious Root. That's all I can see.
English
1
0
3
75
HackenProof
HackenProof@HackenProof·
Spot the Bug 🧠 Merkle reward claiming Two bugs in this one. Can you find both?👇
HackenProof tweet media
English
23
6
75
5.7K
chrisdior
chrisdior@chrisdior777·
One of the toughest months Web3 has faced. April 2026: • 30+ security incidents • ~$630m drained This chart shows the hacked projects, estimated losses, and the cause behind each incident.
chrisdior tweet media
English
13
14
94
10K
Blockaid
Blockaid@blockaid_·
🚨Community Alert: Ongoing exploit on @SweatEconomy on @NEARProtocol. Exploiter: 3be304b2151870b2be88b9de0b80acab921337ad152584138bd852fc6e9ae018 Largest exploit tx: DvrSMfY85Anc6AuLUmoEDkDdab7qX5NUZLu76HN8NoPn
English
72
64
357
390.7K
Abubakar Tanko
Abubakar Tanko@maigadohcrypto·
Observe something about audit guys on CT, the real ones that really participate in BBP/Contest are hardly active on x, if you see one know that he has made enough fortune that gives him enough time for flexibility due to reduction in his commitment. What i mean is that, SRs early stage is real hustle none-stop, this makes it almost impossible for him to be active on x posting, but once he has earned enough, then he becomes very active here 🤣🤣. Thats my oberrvation
English
5
0
37
618
0xBabsAudits retweetledi
SlowMist
SlowMist@SlowMist_Team·
🚨. @ZetaChain has been exploited. Based on initial analysis, the following outlines the root cause. Root Cause The core vulnerability lies in the call function of ZetaChain's GatewayZEVM contract, which lacks both access control and input validation. This allows any arbitrary user to invoke cross-chain calls through GatewayZEVM and execute arbitrary operations on external chains via the relayer. Specifically, an attacker can craft a malicious call on ZetaChain to emit a cross-chain event. ZetaChain's relayer picks up this event and, through TSS, executes the malicious call on the destination chain — enabling the attacker to drain funds. Transactions: zetascan.com/tx/0xdaa19f995… etherscan.io/tx/0x81fc9b245…
SlowMist tweet media
ZetaChain 🟩@ZetaChain

There was an attack against the ZetaChain GatewayEVM contract today that impacted the internal ZetaChain team wallets only. We've already blocked the attack vector so no more funds can be compromised and will be releasing a detailed post mortem after we have completed our investigation. As a precaution cross-chain transactions are currently paused on ZetaChain. Investigation is still ongoing and at this time no user funds were impacted by this attack. The current status can be tracked at status.zetachain.com.

English
11
27
83
23.6K
0xasen
0xasen@asen_sec·
The best security researchers in 2026 spend more time reading post-mortems than audit reports. Post-mortems show you how hackers think. Audit reports show you how auditors write.
English
6
3
88
1.9K
Silvermist
Silvermist@0xSilvermist·
A few months ago, I was the one watching from the outside, thinking, "Everyone's winning, I'm still fighting." Now I'm the one with the win. People see a five-figure win, and that's all they see - the win. But nobody sees what it actually costs. For me, this win is: - 2+ years in the space - Multiple times, I almost gave up - Countless moments where I had no idea how to keep going - The thought "this isn't for me" on repeat And honestly? I'm grateful for the almost. That word is everything. A friend used to tell me: "You keep saying you're giving up. This is the third time I'm hearing it, but I don't care how many times you say it, I only care that I hear it, never see it." And yet, I don't know exactly what kept me going. Probably stubbornness. If you're somewhere in that spiral right now, thinking the same things I was thinking - keep going. Your win is waiting for you.
English
10
13
183
3.4K
Code4rena
Code4rena@code4rena·
Welcome, Monetrix. We're thrilled to collaborate with Monetrix for an audit competition to help secure their codebase! The audit will run for 10 days, stay tuned for more info. Let's go 🤝 @MonetrixFinance
Code4rena tweet media
English
9
2
100
5.7K
0xasen
0xasen@asen_sec·
When I started in web3 security, I knew one thing - I wouldn't quit. I'm not the smartest or the most intense. Just stubborn. That's enough. Stay stubborn.
English
11
4
127
2.1K
0xBabsAudits
0xBabsAudits@BABS96711·
@chrisdior777 Why is there a contest shortage these days? Is it because we’re in a bear market, or because contests are dying?
English
1
0
0
600
chrisdior
chrisdior@chrisdior777·
Web3 Security Contests 2024 vs 2026
chrisdior tweet media
English
9
10
118
8.5K
0xBabsAudits
0xBabsAudits@BABS96711·
@0xZulkifilu It's really different bro, bug bounty programs treat us as if we're the blackhats.
English
0
0
1
16
0xZulkifilu 💎🥷
0xZulkifilu 💎🥷@0xZulkifilu·
@BABS96711 dis thing just dey scare me oo, i wan start bug bounty too but all what i am seeing is different stories.
English
1
0
2
35
0xBabsAudits
0xBabsAudits@BABS96711·
@viveksh0062 The thing is indeed a scary, it is very strict, can't even imagine what happens next.😐
English
0
0
1
7
Vivek Sharma
Vivek Sharma@viveksh0062·
@BABS96711 The contests are not coming and working on these type of bug bounty programs scares me a lot that what is going to happen next?😅
English
1
0
1
34
0xBabsAudits
0xBabsAudits@BABS96711·
@HackenProof The way platform rejects reports without PoC even if they're real issue.
English
0
0
1
184
HackenProof
HackenProof@HackenProof·
What was difficult for you to understand in a bug bounty?
English
14
1
30
3.1K
Ritik Verma
Ritik Verma@RV_Programmer·
@BABS96711 Solid call. I’d focus on understanding real-world exploits and writing PoCs. Finding bugs is one thing, proving impact is what matters
English
1
0
1
13
0xBabsAudits
0xBabsAudits@BABS96711·
This is exactly what prevents me from submitting issues there, I even visited their website last week with intention of participating in some bug bounty programs, but I actually don't have time to complete their kyc requirements.
Mx (beta)@0xMSF14

I don't know what happened to @immunefi but they are partly responsible for the surge in hacks in 2026. People may want to submit a critical vulnerabilities and you are asking them to submit KYC information first ? to limit "spam". What happens if they don't want to ?

English
0
0
7
489