hexens

1.8K posts

hexens banner
hexens

hexens

@hexensio

New approach to cybersecurity solutions. Indisputable skills and a unique super-focused perspective on every single case are the value we create.

Katılım Eylül 2021
3 Takip Edilen8.6K Takipçiler
Sabitlenmiş Tweet
hexens
hexens@hexensio·
10 years of silence on major SOLC bug front is over TSTORE Poison: a silent tstore/sstore storage corruption bug Full explanation: hexens.io/research/solid… — This is the opening article of our new Research page. There is more come, so stay tuned. — TL;DR: delete ; ~~☠️ — Blast Radius discovery is cornerstone of these kind of incident reports, we have used Glider to scan through all the integrated chains additionally we want to thank everyone for help during the IR: @_SEAL_Org @etherscan @dedaub @danielvf And of course @solidity_lang team for handling the report professionally.
Solidity@solidity_lang

Full bug explainer: soliditylang.org/blog/2026/02/1… Thanks to @hexensio for the discovery and thorough report, @_SEAL_Org and @dedaub for their swift response and help in identifying affected contracts.

English
23
30
159
19K
hexens
hexens@hexensio·
Audit Completed: @crosscurvefi Happy to be @crosscurvefi's security parter. Looking forward to working together again in the future.
CrossCurve ✈️ Paris Blockchain Week 🇫🇷@crosscurvefi

🛡️ CrossCurve Successfully Completes Second OFT Bridge Audit by @Hexensio As part of its ongoing security efforts, CrossCurve has completed a second audit of its OFT-enabled Token Bridge module, with a focus on further validating system architecture and resilience. 🔍 Audit Results 👇🏻

English
1
1
8
663
hexens retweetledi
Remedy
Remedy@xyz_remedy·
Glider Contest: Phase 3 starts today Only Epic and Legendary queries get cash rewards now → Epic (2.95–4.49 rarity): $2,000 | min $10k at risk → Legendary (4.50+): $5,000 | min $50k at risk Rare and Uncommon queries are still welcome and will be added as public goods for the community. All submissions before April 7, 12:00 pm UTC gets assessed under Phase 2 rules. Full rules on the contest page. Join us on Discord for questions and help. discord.com/invite/remedy
English
2
2
11
987
hexens
hexens@hexensio·
Hacks break protocols. How you respond is what defines you. @ResolvLabs chose full transparency with a detailed post-mortem. Every team in this space will face hard moments given the kind of adversaries who target them. The ones who face them head-on are the ones worth trusting.
Resolv Labs@ResolvLabs

x.com/i/article/2040…

English
2
1
12
659
hexens
hexens@hexensio·
Don't miss today's live at 12:00 UTC. Joining @roycoprotocol for an Audit Retrospective: scope breakdown, finding highlights and key takeaways. Right here on X.
hexens@hexensio

We're going live with @roycoprotocol for an Audit Retrospective A candid breakdown of how we audited a tranche-based DeFi protocol right before launch. Will cover key findings, mechanism design decisions, and what changed as a result. April 2, 12:00 PM UTC, on Hexens X

English
0
1
11
699
hexens
hexens@hexensio·
Part 2 of our series on Gröbner bases in cryptanalysis is live We turn the Poseidon hash function into a polynomial system over a finite field and run a full preimage attack on a reduced-round instance with SageMath. hexens.io/blog/groebner-…
English
0
1
14
552
hexens
hexens@hexensio·
We're going live with @roycoprotocol for an Audit Retrospective A candid breakdown of how we audited a tranche-based DeFi protocol right before launch. Will cover key findings, mechanism design decisions, and what changed as a result. April 2, 12:00 PM UTC, on Hexens X
hexens@hexensio

Audits Completed: @roycoprotocol Two consecutive security reviews of Royco - a perpetual risk-tranching protocol dividing yield opportunities into senior and junior tranches. Our assessments covered the core protocol contracts, tranche and kernel mechanics, liquidation bonus mechanisms, and RWA integration alignment. We're glad to support @roycoprotocol 's ecosystem and look forward to working together again in the future. Full reports below:

English
1
5
15
1.4K
hexens
hexens@hexensio·
Cross-chain bridges remain critical infrastructure, proof verification is the core of their security model. New disclosure on our research page: a vulnerability in the Polygon Plasma bridge that allowed transaction proofs to be forged. At the time of discovery, $800M in POL was at risk, exploitable in a single transaction with no prerequisites. The research covers how the proof verification breaks, how the exploit was built, and what it means for bridge security. Full technical deep-dive: hexens.io/research/polyg…
English
7
16
77
10.6K
hexens
hexens@hexensio·
Audits Completed: @roycoprotocol Two consecutive security reviews of Royco - a perpetual risk-tranching protocol dividing yield opportunities into senior and junior tranches. Our assessments covered the core protocol contracts, tranche and kernel mechanics, liquidation bonus mechanisms, and RWA integration alignment. We're glad to support @roycoprotocol 's ecosystem and look forward to working together again in the future. Full reports below:
English
3
3
18
2.3K
hexens
hexens@hexensio·
Gröbner bases sit at the heart of many algebraic attacks on modern cryptographic primitives. This post covers the theory from first principles, walking through Buchberger's algorithm step by step and solving a polynomial system by hand hexens.io/blog/groebner-…
English
0
2
17
760
hexens
hexens@hexensio·
Audit Completed: @Zharta Security review of Zharta's structured credit order book protocol for ERC20 tokens. Our assessment focused on updated lending contract logic, asset handling, and overall fund safety. We're glad to support Zharta's ecosystem and look forward to working together again in the future. Full report below:
English
1
3
15
9K
hexens
hexens@hexensio·
@katana Always good to work with great teams. Excited to see where the project goes.
English
0
1
8
463
Katana ⚔️
Katana ⚔️@katana·
KAT is live. The Armory is open⚔️ Katana introduces something new: A chain that routes revenue back into the ecosystem to reward active users. At the center is KAT. Stake, vote, earn here: app.katana.network/stake
English
182
114
573
201.5K
hexens
hexens@hexensio·
@Zharta Happy to have secured this project. Looking forward to what's next for the protocol.
English
0
0
1
46
hexens
hexens@hexensio·
Audit Completed: @katana Security review of the new KAT Vault and the LayerZero OFT integration for the KAT token. Our assessment focused on vault logic, cross-chain token flows, access controls, and fund safety. Glad to support the @katana ecosystem. 📄 Full report:
English
4
4
30
5.3K