Nascent Security

36 posts

Nascent Security banner
Nascent Security

Nascent Security

@NascentSecurity

Building for a more secure crypto ecosystem @nascentxyz

Katılım Eylül 2023
2 Takip Edilen709 Takipçiler
Sabitlenmiş Tweet
Nascent Security
Nascent Security@NascentSecurity·
Today we're releasing @bountyvision Here we aggregate bug bounty insights across platforms to: 1. Show the state of bug bounties across the ecosystem 2. Assess bounty sizes relative to funds at risk 3. Aid whitehats in finding bounty information (including in-scope assets)
Nascent Security tweet media
English
4
20
87
14.6K
Nascent Security retweetledi
Dan Elitzer
Dan Elitzer@delitzer·
Security is the #1 problem we need to solve for crypto and DeFi to reach their potential That's why I couldn't be more proud to have @nascentxyz co-lead this round for @phylaxsystems We have looked at a lot of security solutions, but here's why we believe this team is unique 🧵
Phylax Systems@phylaxsystems

Today, we are announcing our $4.5m pre-seed, led by @FigmentCapital and @nascentxyz with support from @robotventures, @hash3xyz, @BanklessVC, @breed_vc, and @publicworksfm. We will use these funds to develop The Credible Layer, a hack prevention protocol. Here's the story (there are some twists and turns): On August 1st, 2022, Nomad lost $190 million in one of crypto’s largest hacks—a turning point for @odysseas_eth, a protocol engineer at Nomad. Conversations with users, founders, and engineers revealed a sobering truth: Many can’t sleep for fear of being hacked; some have even left the space entirely. We’re not just losing the best builders and teams to hacks—we’re losing them to the fear of hacks. Read the full announcement here: phylax.systems/blog/phylax-sy… It should be obvious at this point, that one of the primary hurdles to adoption en masse is the BILLIONS of dollars of hacks that occur every year. Current solutions, like fuzzing, next block mitigation, and frontrunning protection, are valuable but by no means a silver bullet. They patch the problem—they don’t solve it. We need security that can’t be bypassed and is verifiable. This is what Phylax Systems is on a war path to deliver. We’re building the Credible Layer, a proactive security layer that allows dApps to define hack-prevention rules and communicate them to the block builder, specifying states they want to prevent. The assertion enforcer checks each transaction against these rules, stopping hacks before they happen. It is non-invasive and is functionally a coordination mechanism between dApps and the base layer, keeping dApps sovereign and secure. The Credible Layer is also fully transparent—anyone can view a dApp’s security rules and verify their enforcement. dApps pay fees for this validation, ensuring their assets remain safeguarded. Some may question the reliance on trusted entities to enforce these rules. However, this model builds on the trust assumptions that already underpin much of blockchain infrastructure; for example, a small number of entities currently support over 90% of Ethereum’s block production. We’re not advocating for increased centralization but rather creating new security mechanisms on top of existing, industry-tested trust structures. Regulators have scrutinized our industry due to high-profile hacks, and while their intentions may not always be entirely impartial and fair, this particular concern is valid. The recent $53MM Radiant hack underscores just how far we still have to go. It’s up to us to prove that security isn’t an afterthought but a core component of every crypto project. As an industry, we must prioritize security in our designs, our products, and how we position ourselves to users—it can no longer be secondary. As @nic_carter said: “We’re long overdue for moving DeFi hack mitigation from reactive to proactive, and Phylax is leading the charge.” We don't want to scar the mainstream as soon as we onboard them. We need security that makes them feel safe. We intend to make this a reality with the Credible Layer. To get the full picture of the Credible Layer, read the Whitepaper (we just released it): github.com/phylaxsystems/… And if you are interested in joining the waitlist for the Credible Layer please reach out here: t.co/DxKM64rvzo

English
7
6
43
7.3K
Nascent Security retweetledi
BountyVision
BountyVision@BountyVision·
🚨 "Recent Updates" is live! 🚨 We aggregate bounties across every platform and showcase those with the latest changes 🎯 Spot fresh code in bounties—prime targets for new bugs 🐛🔍 Stay up to date on Twitter and in our new Telegram channel 📢 t.me/bountyvision
GIF
English
1
5
89
1.5M
Nascent Security retweetledi
plotchy🔅
plotchy🔅@plotchy·
The onchain game @kamigotchiworld has pulled me in like none before It's both a fun game and an onchain way to prove your hacker skills Here's how I've used my technological superiority to dominate 🧵👇
plotchy🔅 tweet media
English
16
21
159
54.5K
Nascent Security retweetledi
BountyVision
BountyVision@BountyVision·
Morpho's massive new max bounty of $2.5M makes them leapfrog 3 other protocols in the lending space. Here's the new lending leaderboard 🏆💵👀 1. @fraxfinance ($10M) 2. @sparkdotfi ($5M) 3. @MorphoLabs ($2.5M) ⬆️⬆️⬆️ 4. (tied) @aave ($1M) ⬇️ 4. (tied) @solendprotocol ($1M) ⬇️ 4. (tied) @SovrynBTC ($1M) ⬇️ Find where you stack up at bounty.vision
BountyVision tweet media
English
1
3
9
2.5K
Nascent Security retweetledi
BountyVision
BountyVision@BountyVision·
When starting on a new bounty, one of the first thing to do is find which contracts hold funds. Usually this requires opening every explorer page in the bounty and making a mental note of the high-value contracts. We make it easy!
BountyVision tweet media
English
0
6
22
4.3K
Nascent Security retweetledi
Nascent Security retweetledi
BountyVision
BountyVision@BountyVision·
Protocol pages are live! Our goal for BV is to be great at both: 1. Providing insights into the overall bug bounty landscape 2. Giving security researchers what they need to quickly find bugs in live contracts Protocol pages will be our main hub for #2
BountyVision tweet media
English
3
2
8
2.5K
Nascent Security retweetledi
plotchy🔅
plotchy🔅@plotchy·
Bounty-size / TVL tracks how a protocol incentivizes whitehats or blackhats Bounty-size / LoC tracks the reward vs effort of digging LoC in scope / Total LoC tracks if a bounty is bullshit or real
brock@brockjelmore

A couple important metrics pop in my head: 1. bounty $s / bountied line of code 2. bountied lines of code / protocol lines of code 3. bounty $s / TVL @BountyVision takes the first step to helping measure the quality of bug bounties via Bounty $s / TVL

English
0
2
9
2.2K
Nascent Security retweetledi
brock
brock@brockjelmore·
With the release of bounty.vision from @NascentSecurity, something has popped into my head: does "Bigger Number == Better Security"? and I've come to the conclusion: a resounding NO* *in isolation let explore what makes a good bug bounty 👇
English
5
7
45
7.7K
Nascent Security retweetledi
Dan Elitzer
Dan Elitzer@delitzer·
No one outside of North Korea is happy with the current state of DeFi security Fortunately, there is something we can do about it: SPEND MORE ON SECURITY! Strap in for a discussion of security budgets, bounty flywheels, and a new tool from @NascentSecurity...
Dan Elitzer tweet media
English
16
13
115
34.3K
Nascent Security retweetledi
p0pular
p0pular@popular_12345·
Pleased to release the beta version of our bounty aggregator, @BountyVision! Quoted is a great explainer on our goals for the platform - however, I wanted to comment a bit on the benefits for security researchers:
Dan Elitzer@delitzer

No one outside of North Korea is happy with the current state of DeFi security Fortunately, there is something we can do about it: SPEND MORE ON SECURITY! Strap in for a discussion of security budgets, bounty flywheels, and a new tool from @NascentSecurity...

English
1
4
14
2.2K
Nascent Security
Nascent Security@NascentSecurity·
Today we're releasing @bountyvision Here we aggregate bug bounty insights across platforms to: 1. Show the state of bug bounties across the ecosystem 2. Assess bounty sizes relative to funds at risk 3. Aid whitehats in finding bounty information (including in-scope assets)
Nascent Security tweet media
English
4
20
87
14.6K