Decurity

317 posts

Decurity banner
Decurity

Decurity

@DecurityHQ

DeFi Security | Tier-1 Security Audit Firm | Top-2 in @Paradigm and @OpenZeppelin CTF | Public audits: https://t.co/CqYGRNibvj

Katılım Ekim 2011
74 Takip Edilen3.4K Takipçiler
Decurity
Decurity@DecurityHQ·
>BlockSec Phalcon flagged it as a copycat of a near-identical exploit on Veil Cash, a smaller Base-network privacy protocol drained just days earlier for 2.9 ETH. Seems you missed this: x.com/Veildotcash/st…. The total amount was 4.5 eth, we detected the first attack and then rescued the other pools - eventually all the funds were returned (even the original attacker decided to return).
Veil.Cash@Veildotcash

Post-mortem: Legacy Veil Cash Fixed Pools Incident Yesterday, an incident impacted Veil Cash legacy fixed-denomination pools on Base. Live Veil pools (ETH, USDC, cbBTC) and staking were not affected. These pools were sunset from new deposits ~6 months ago and had no withdrawals from remaining funds in the past ~3 months. Timeline: At ~18:09 UTC, an exploiter drained ~2.9 ETH from ~4.5 ETH remaining in the legacy pools via a ZK proof forgery caused by a misconfigured Groth16 verifier. A whitehat (@DefimonAlerts) intervened shortly after, recovering 2.025 ETH and returning funds to veildotcash.eth. Later at ~22:05 UTC, the exploitor returned the remaining funds to veildotcash.eth without prior contact. In summary, 100% of funds from the affected pools have now been recovered and secured. Next steps: - Working with security partners to deploy a return contract enabling funds to be claimed by rightful owners. - Strengthening validation and expanding audit cadence across all current Veil Cash contracts. The affected legacy pools remain deprecated. The Veil Cash protocol continues operating normally.

English
1
0
0
321
Rekt News
Rekt News@RektHQ·
One skipped CLI step left @FOOMCASH's zk verifier broken from day 1. Someone read the Veil Cash post-mortem, scaled it up, & drained $2.26M. Decurity recovered $1.84M, for $100K fee. $320K kept under the protocol's own code is law bounty. Net loss $420K. rekt.news/the-unfinished…
Rekt News tweet media
English
5
6
41
8.1K
Decurity
Decurity@DecurityHQ·
>For four days, the entire Ethereum-side recovery sat in plain sight on-chain, unspent and unobscured, while the protocol and the security firm quietly negotiated the terms of return. That's not correct, you should better check the onchain data: we returned the rescued funds within 3 hours, the bounty was offered by the protocol - we didn't demand anything.
English
0
0
0
91
Decurity retweetledi
Foom
Foom@Foomclub_·
$2.26M Exploit on foom.cash On February 27th at 7:30 AM, foom.cash was hit for $2.26M. We have successfully recovered ~81% of the funds ($1.84M) thanks to an elite white-hat response. The Damage & Recovery Total Drained: $2.26M Recovered: $1.84M (90% of Ethereum funds) via @DecurityHQ. Bounty/Costs: $420k total. $320k to @duha_real (White-hat/Researcher). $100k to @DecurityHQ (Security fee). From Contestant to White-hat The exploit was first triggered by @duha_real. Interestingly, he was the winner of our Bitcointalk hacking contest held a year ago. He identified the vulnerability and moved to secure the funds on Base before malicious actors could strike, while @DecurityHQ handled the rescue operation on Ethereum.
Foom tweet media
English
6
14
55
7.1K
Decurity
Decurity@DecurityHQ·
Amid the AI frenzy, how healthy is the web3 security VC and M&A pipeline? Judge yourself! Here's a review of the past exits and future IPOs in the web3 security market: blog.decurity.io/web3-security-…
English
1
0
8
1.3K
Decurity retweetledi
Defimon Alerts
Defimon Alerts@DefimonAlerts·
USDT quirk that bricks contracts The reason why Tether destroyed balances of SimpleAssetWithdrawer and DiamondStakingV3 is not because they are malicious, but because of a mistake in these contracts. It's a known fact that USDT contract is ancient and does not conform with ERC20. Namely, it does not return a boolean value in transfer() and transferFrom(). We specifically monitor events when Tether destroys USDT balances of the smart contracts for this particular quirk. In this case both contracts have a require() for the return values of transfer() and transferFrom() calls, which makes it impossible to withdraw USDT from them (i.e. USDT balance is locked forever). As we have observed Tether just silently destroys balances and reimburses the contract owners, usually after they contact Tether directly. Some very well-known projects made this mistake before and had millions of USDT locked until Tether manually erased their balances. You can easily find it onchain 😉 References: #missing-return-values" target="_blank" rel="nofollow noopener">github.com/d-xo/weird-erc…
Defimon Alerts tweet media
Defimon Alerts@DefimonAlerts

🚫 Blacklist Event: usdt_destroyed_black_funds 🌐 Network: mainnet 🏷️ Token: 0xdac17f958d2ee523a2206206994597c13d831ec7 (USDT) ⛔️ Address: 0xb5a73cbee0af2f98fdf8ba515aa8fabdf307a47c (DiamondStakingV3) 💰 Destroyed balance: $15,655 etherscan.io/tx/0x06694e252…

English
1
4
19
3.8K
Decurity retweetledi
100proof.org
100proof.org@1_00_proof·
Cryptotwitter misses all but the biggest and most visible hacks. There's a steady stream of protocols affected by hacks. Shout out to @DefimonAlerts for these excellent alerts. (Please refrain from cynical or unempathetic replies to this post)
100proof.org tweet media
English
1
6
40
4.1K
Decurity
Decurity@DecurityHQ·
Most audits miss Web2.5 Smart contract auditors focus onchain. Backend devs trust the blockchain. But the real attack surface is the interaction between them. Case study from our recent audit: double-spend via reverted tx secret leak + ECDSA mismatches. blog.decurity.io/a-web2-5-vulne…
English
1
8
15
1.6K
Decurity
Decurity@DecurityHQ·
🧐 Your protocol was audited in 2022? That's exactly why it got hacked in 2025. 2025 was the year hackers went hunting through old, audited code — and rounding errors became million-dollar exploits. Our breakdown of top 10 DeFi incidents of this year: 2025-recap.decurity.io
English
0
7
39
3.6K
Decurity
Decurity@DecurityHQ·
anchor-constraints-analyzer parses your constraints and shows: 🟢 constants/system addresses 🔴 undefined accounts (potential vulns) 🟠 needs manual review No more tracing has_one and seeds by hand.
English
1
0
1
590
Decurity
Decurity@DecurityHQ·
Ever audited Solana Anchor constraints with 20+ accounts and cross-checks everywhere? Our own @passkeyra built a tool that turns them into visual graphs - red flags for missing checks pop out immediately. blog.decurity.io/auditing-solan…
English
1
6
16
1.9K
Decurity retweetledi
Midl
Midl@midl_xyz·
Hack Happens: Decoding Yearn with @DecurityHQ ⚙️ Bitcoin Security Council has a new job to do: join our DevRel, @MidlBigG, and @theRaz0r, CTO & Co-Founder of Decurity debriefing the recent @yearnfi exploit. As usual, we will have a deep dive into the circumstances and outcomes of Yearn’s incident and run through the security management under high pressure. See you December 2, 13:00 UTC!
Midl tweet media
English
69
77
197
10.2K
Decurity retweetledi
Decurity retweetledi
Defimon Alerts
Defimon Alerts@DefimonAlerts·
Unprotected uniswapV3SwapCallback callback in 0xc0ffee's MEV-bot contract was exploited The callback verifies msg.sender against input arguments which makes it trivial to bypass it. As a result the attacker stole $218k worth of LINK tokens. basescan.org/tx/0x83da47641…
Defimon Alerts tweet media
Defimon Alerts@DefimonAlerts

🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $218,678.11 💎 Full Details at Defimon Signals t.me/+m9BMRKlMuW5iM…

English
1
1
5
1.5K