QED Audit

23 posts

QED Audit

QED Audit

@QED_Audit

Concluding web3 security.

0xcafe Katılım Aralık 2025
4 Takip Edilen442 Takipçiler
QED Audit retweetledi
sahuang
sahuang@sahuang97·
Interesting article by @r0bre. Some of my takes: To prove the effectiveness of AI tools, I think it's definitely the best to showcase in a bounty/contest with explanations of the architecture/logics. The Cosmos bug from @QED_Audit and Monad win from @octane_security are very nice examples. In terms of EVMbench, it is a pretty basic/light baseline research work that's essentially a Codex wrapper, and I see a lot of research on improving the agentic workflows. Exploit mode is definitely one of the more interesting contributions out of the OpenAI/Paradigm work. IMO it makes little sense to just find another benchmark (or even the same benchmark), run the tool and say "hey we got much higher detection rate vs. XYZ", since it could be subjective and performance can be very dataset-/model-dependent. Past research from @xy9301 have proved that. People would want to get the tool running and instantly catch real world bugs instead of spending time on benchmarks or looking at bull-shitposting all the time. Note: This is not directing at any AI tool, just some random thoughts. We should definitely leverage AI much more to improve audit workflow.
r0bre | Accretion.xyz@r0bre

x.com/i/article/2026…

English
0
1
29
5K
QED Audit retweetledi
noah.eth
noah.eth@Noah_eth·
LLM: finds bug CT: doesn’t count, junior could do it LLM: claims bounty CT: show receipts, doesn’t count LLM: wins competition CT: large codebase, previous audit, doesn’t count None of those headlines claim humans in the mix aren’t productive. It’s been established that these tools are useful. Learn to use them or get left behind.
English
7
4
76
7.1K
QED Audit retweetledi
Raiders
Raiders@__Raiders·
If integrated AI + fuzzing + formal verification finds real bugs. So why no persistent scanner for high-TVL chains? lot's of potential usecase which helps with: → Continuous detection across live contracts → Responsible disclosure pipeline to affected teams → Public feed of patched vulns maybe get it funded via ecosystem grants. Audit-as-a-service → security-as-infrastructure ^^
English
4
4
27
1.8K
QED Audit
QED Audit@QED_Audit·
@shresth3103 We can cover mostly everything from PBFT to simplex to minimmit.
English
0
0
0
95
shresth
shresth@shresth3103·
any rust auditor available for a 1-week gig on short notice? ideally someone with experience auditing complex financial systems and/or BFT consensus logic.
English
16
5
59
7.9K
QED Audit
QED Audit@QED_Audit·
20b4ec1675a76e5943cab97cecfd0472aa4ca273381527e68735fea1aec050db
Indonesia
0
0
3
578
QED Audit
QED Audit@QED_Audit·
0605882c4c9d5a3942284e26d2d682df2161d5b4f5f9f45289784e9535899537
Français
0
1
6
3.4K
QED Audit
QED Audit@QED_Audit·
cdc0f73e39eeff1e875baa3d076475e281dfda9cf8b4d76bb55328b4b58611a0 dc3fc1313818a0a8544992066ccfdd205f9f22da1888c8786160351081201c17
Suomi
0
0
6
3.5K
Nolan | Exvul
Nolan | Exvul@ma1fan·
I have read all the yETH exploit writeups (The actually keypoint is how vb_prod turn into `0`) Although they are all well written, they do not provide a detailed analysis of the key calculation steps. I have manually reproduced the entire process(the picture `p` ==`vb_prod` ==0)and I will release my writeup as soon as possible! @yearnfi
Nolan | Exvul tweet media
Nolan | Exvul@ma1fan

Many people say that the YETH attack was discovered through fuzzing I don't believe that fuzzing can directly discover such a complex attack path. It's more likely that it discovered exploitable attack primitives and then amplified the harm step by step. @yearn github.com/yearn/yearn-se…

English
3
6
108
18.1K
QED Audit
QED Audit@QED_Audit·
Moreover, we identified an independent vulnerability outside of _calc_supply() that zeroes vb_prod and operates irrespective of the four primary issues. #file-exploitoneshotpicollapse-t-sol" target="_blank" rel="nofollow noopener">gist.github.com/ainta/1ebce1b9…
English
1
3
6
945