⚡C@lee⚡
891 posts



Ran our first OpenClaw workshop yesterday. 11 people came to learn how to use AI to find bugs and contribute to Percolator. Main takeaways from the call: You do not need to be technical. Download Claude Code, clone a Percolator repo, and ask it what the most vulnerable parts of the system are -> Then ask it to write you a specific prompt for finding bugs in those areas. -> Paste that prompt in a new session. -> Claude reads the code, finds issues, writes the report, and can even open the PR for you. The key insight @dcc_crypto shared: use one Claude session to craft the prompt, a separate session to actually do the audit. The first session gives you something specific what types of attacks to look for in the risk engine, the pricing engine rather than a generic scan. For running it 24/7, you want OpenClaw on a VPS. For one time audits and contributions, Claude Code is easier and has fewer security risks. Percolator is open source. All the repos are public. The prompts and context are already in the code. You show up, clone the repo, and start asking questions. Workshop recording will be shared for anyone who missed it. Come find bugs. discord.gg/PCVrGSmCr


This is our last call for the first Percolator OpenClaw Workshop which takes place in less than 2 hours, don’t miss the opportunity to learn how our AI work and help ship percolator in real time. We are going to show you how it works, how to run your own to scan code -> find bugs -> report bugs -> make contributions With over tens of thousand of dollars already paid out through bug bounties and active contributors, this is your opportunity to not only learn but earn. Join the discord: discord.gg/guPnxpHkE

























