Matthew Garrett

734 posts

Matthew Garrett banner
Matthew Garrett

Matthew Garrett

@MatthewDtotheG

Senior SWE @multisig

Katılım Aralık 2011
1.1K Takip Edilen253 Takipçiler
Matthew Garrett retweetledi
Altitude
Altitude@altitude·
Your business runs on stablecoins. Your cards should too. Issue virtual cards, spend directly from your Altitude balance and earn up to 2% cashback*. Altitude Card is coming soon, apply for early access: altitude.xyz/card.
English
23
42
187
46.5K
Matthew Garrett retweetledi
Altitude
Altitude@altitude·
Businesses no longer need a bank account. We've raised $18M on this bet. Go altitude.xyz
English
143
97
1K
520.6K
Matthew Garrett retweetledi
Squads
Squads@multisig·
Announcing Solana Multisig Tools Three new open-source tools for Squads Protocol v4. All three are small, self-hostable, and built with minimal dependencies. We're actively engaging with STRIDE to help strengthen multisig management practices on Solana. This is the first step towards multiple independent frontends and access points to v4. multisig-cli A focused Rust CLI for reviewing, simulating, signing, and executing multisig proposals. It parses multisig accounts and instructions directly instead of pulling in a large dependency tree. The result is a binary that's easy to audit and well suited for high-trust operational workflows. If you're using an older CLI, we recommend switching to this multisig-cli which has minimal dependencies. multisig-verifier A static, zero-backend browser UI. Reads multisigs state directly from Solana RPCs, decodes proposals, tracks approvals, and lets members approve or reject from their own wallet. No secrets leave the browser. Strict CSP rules by default. multisig-monitor Real-time visibility into multisig activity. Watches configured multisigs, decodes actions, and emits notifications when members create, vote on, execute, or modify configuration. Treasury and governance events surface as they happen. The pattern across all three: inspect before signing, verify before approving, monitor after execution. Smaller dependency surfaces reduce supply-chain risk. Direct decoding reduces blind signing. Open implementations are reviewable end-to-end. Monitoring closes the loop. We strongly encourage every team to verify what they're signing through more than one interface. Don't rely solely on any single frontend. Cross-check with a CLI, an independent verifier, or a second client before approving anything that matters. We're working with a number of security teams who will host their own versions of the multisig-verifier. You can self-host today. Soon teams will also be able to access independently operated instances run by parties with no affiliation to Squads. Link to the repo in the post below.
English
26
47
304
89.7K
Matthew Garrett retweetledi
Param
Param@Param_eth·
Worst month for DeFi: - Drift hacked - rsETH exploit - Aave liquidity crisis - USDT frozen on Tron - Arbitrum is centralised - Multiple bridges drained - Lazarus group become more rich - Several protocols paused operations
English
69
53
465
36.3K
Matthew Garrett retweetledi
Solana Foundation
Solana Foundation@SolanaFndn·
New episode of The Stack with @nocircuit: @carlosnoriega covers how he discovered Solana before joining @multisig, plus a deep dive into multi-sig protocols, smart accounts, and AI-driven financial primitives. Check out the full episode - Available now!
English
15
13
79
11.4K
Matthew Garrett retweetledi
Altitude
Altitude@altitude·
Most cross-border payments already run on stablecoins. You just don't see it. Fiat in, stablecoin across, fiat out. The conversion happens in the middle and disappears. The sandwich works. The next step is skipping it. Our take is in @range_org 's Dollar Supremacy report.
Range@range_org

1/ 3 exchanges hold 36% of $180B in USD stablecoins. Binance alone holds ~$46B! Our new report, Dollar Supremacy, maps the full distribution of USDT, USDC, USDe, PYUSD, and USDG across Ethereum and Solana. Here's what the data shows 🧵👇

English
0
8
28
3.2K
Matthew Garrett retweetledi
Altitude
Altitude@altitude·
Old rails. New money. Wrong combination. If you're feeling it, DM @philjacobson.
English
3
6
39
2.4K
Matthew Garrett retweetledi
Deni | squads.xyz
Deni | squads.xyz@deni_ersht·
Digital banking made money look fast. It didn’t make money fast. Agents on these rails is a Ferrari engine moving pictures of a horse across the globe. Horse stables were not made for this, unlike stablecoins.
English
0
3
8
413
Matthew Garrett retweetledi
Stepan | squads.xyz
Stepan | squads.xyz@SimkinStepan·
An update on what we're focusing on with @multisig in light of the Drift incident last week. What we're building now: 1. A proxy program for v4 that lets you opt in to killing durable nonces for a specific signer. This removes the ability for pre-signed transactions to sit indefinitely waiting to be executed. 2. A dedicated protocol management multisig program with configurable template policies and a UI you can run locally. Built for teams that need tighter governance controls over admin operations. 3. Exploring clear signing with intents so signers can verify exactly what a transaction does before approving it (cc @Redacted_Noah). What's already available on v4 and can be set up by your team today: – Timelocks. You can set these up in Settings. They create a mandatory delay between proposal approval and execution. – Signer permissions. You can assign Propose, Vote, and Execute rights separately, so not every signer has the same level of access. – Multisig nesting. You can set up configurations where eg two separate multisigs are signers on a third. Adding a layer of operational separation. -Minimal UI. An interface on top of v4 that you can run locally (github.com/Squads-Protoco…). If you're unsure about your current setup or want guidance on how to configure any of this, DM us.
Squads@multisig

Our investigation into the @DriftProtocol incident remains ongoing. Early evidence points to two compromised signers on Drift's admin multisig, which were used to execute a transaction modifying Drift's program configuration. Squads programs were not compromised. We have also found no evidence of compromise to Squads infrastructure, though we are actively investigating to confirm this with full confidence. We will share further findings as they become available. Best Practices for Operationally Critical Multisigs Thresholds: Any multisig with operational or administrative control over a program should have a signing threshold of 3 or above. This requires an attacker to concurrently compromise multiple independent signers, significantly raising the difficulty of this type of attack. Where possible, signers should also be geographically and organizationally dispersed. Signers sharing the same location, devices, or org structure introduce correlated risk. Timelocks: Multisigs with program-level control should implement a timelock (can be set up in Settings of your Squads multisig). It won't prevent a malicious transaction from being proposed, but it creates a window to detect and reject it before execution. The tradeoff: timelocks also slow down legitimate emergency responses to bugs or active exploits, so teams should factor this into their operational setup. Alerts & Monitoring: We encourage all operationally critical multisigs to set up monitoring and alerts through our security partner @RangeSecurity. Range provides two key things: an alternative interface for independently verifying transaction content outside of the Squads UI, and proactive Slack alerts so signers are notified before a proposal moves forward. If you want help getting set up, reach out and we'll connect you directly. A high threshold, a timelock, and monitoring are the foundation for any multisig with program-level control. Signing Process: Signers should use dedicated devices and hardware wallets, never a general-purpose machine. Additionally, signatures are only valid for approximately 2 minutes each, so introduce at least a 2 minute delay between each signer taking actions to ensure signatures cannot be collected & bundled by an attacker. Always verify transaction content independently across all three available sources: the Squads UI, Range's alternative interface, and Solana Explorer or Solscan On Durable Nonces 
The Drift attack exploited durable nonces to collect signatures without time pressure, bypassing the 2-minute transaction expiry that would otherwise limit this type of attack. We are actively exploring ways to block durable nonce usage across all of our programs, both at the program level and through other enforcement mechanisms, to ensure this protection extends to our immutable programs V3, V4, and our current Smart Account Program. Beyond this, the broader Solana ecosystem is taking steps to address this at the protocol level, with a new transaction format that drops durable nonces as a feature entirely. We will follow up with more information on this soon.

Beyond Multisig, Operational Security Technical controls only go so far. Most high-profile compromises lately have been social engineering attacks targeting the people behind the keys, not the contracts themselves. If you are running mission-critical protocol operations, invest in your internal opsec processes and team culture accordingly, how proposals are initiated, communicated, and approved all matter. We recommend engaging dedicated security advisors. @zeroshadow_io and @0xGroomLake are trusted starting points, and we are happy to connect you directly.

English
18
35
214
34K
Matthew Garrett retweetledi
Altitude
Altitude@altitude·
We're hiring a PMM. Stablecoin-native fintech needs a defining story. Come write it.
Altitude tweet media
English
44
6
110
15.5K
Matthew Garrett retweetledi
Public
Public@public·
NEW: You can now build AI Agents that monitor the market, manage your cash, and execute your trades. The Agentic Brokerage has arrived.
English
404
755
6.3K
3M
Matthew Garrett retweetledi
Altitude
Altitude@altitude·
52 years old. Still somehow how the world moves money across borders. We built Altitude on stablecoins. We added SWIFT anyway.
Altitude tweet media
English
4
6
37
1.7K
Matthew Garrett retweetledi
Stepan | squads.xyz
Stepan | squads.xyz@SimkinStepan·
Stablecoins did not come from continuous improvement of banks
English
6
3
59
3.2K
Matthew Garrett retweetledi
Altitude
Altitude@altitude·
You moved your treasury to USDC. Every bill still pulls you back into a bank account. Altitude Bill Pay closes the gap. Pay directly from your stablecoin balance and deliver via ACH, wire, SEPA, or SWIFT.
Altitude tweet media
English
13
10
41
7.4K