Gul Hameed

356 posts

Gul Hameed banner
Gul Hameed

Gul Hameed

@CyberGul

Security Researcher @block_apex | dApp Auditor @hackenclub | eCPPTv2 | CRTP | CEH (Practical) | DM for Audits/Pentest

Katılım Temmuz 2020
425 Takip Edilen204 Takipçiler
Gul Hameed retweetledi
Remedy
Remedy@xyz_remedy·
Another Uncommon approved. @CyberGul flags misuse of transient storage for authentication via (EIP-1153 TLOAD/TSTORE overwrite). Query below:
English
1
1
4
288
Gul Hameed
Gul Hameed@CyberGul·
1/ In June 2025, ResupplyFi was exploited for ~$9.56M and the root cause was a classic pattern. My @xyz_remedy Glider contribution now helps detect: oracle price used as a denominator without a non-zero result check.
Remedy@xyz_remedy

Rare query approved. @cybergul flagged oracle price logic used as a denominator without validating against zero, exposing contracts to potential failure scenarios. Query below:

English
2
1
9
967
Gul Hameed
Gul Hameed@CyberGul·
10/ Fixes are simple : require(exchangeRate > 0) before storing/using it add upper/lower bounds on oracle inputs/results avoid inverse pricing (C / price) unless validated at every step don’t use low-liquidity ERC-4626 pricePerShare as an oracle input without guardrails/thresholds rekt.news/resupplyfi-rekt
English
0
0
0
65
Gul Hameed
Gul Hameed@CyberGul·
9/ Impact checklist: ✅ solvency bypass ✅ unlimited borrowing / protocol drain ✅ oracle-driven systems become unsafe under low-liquidity/manipulable inputs This is a logic + integer-division edge case combo.
English
1
0
0
112
Gul Hameed retweetledi
Remedy
Remedy@xyz_remedy·
Rare query approved. @cybergul flagged oracle price logic used as a denominator without validating against zero, exposing contracts to potential failure scenarios. Query below:
English
1
1
5
1.2K
Gul Hameed
Gul Hameed@CyberGul·
7/ Lockouts are meant to slow attackers. But if recovery is blocked too, the lockout becomes a DoS primitive. Worth reviewing in any auth system. #account-lockout" target="_blank" rel="nofollow noopener">cheatsheetseries.owasp.org/cheatsheets/Au… #CyberSecurity #Pentesting #CEX
English
0
0
0
51
Gul Hameed
Gul Hameed@CyberGul·
6/ Defense-in-depth fixes that actually work: ✅ Allow password reset even while locked (reset should clear lockout counter) ✅ Send a generic “failed attempts / lockout” alert email to the user ✅ Add per-IP / device throttling + progressive delays (not just per-account lock)
English
1
0
0
65
Gul Hameed
Gul Hameed@CyberGul·
1/ Found a neat auth DoS pattern during a recent pentest: account lockout can be weaponized to deny access to any user, using only their email/username. 🧵👇
English
1
0
0
86