S7iter

671 posts

S7iter banner
S7iter

S7iter

@S7iter_

Founder/Dev/Researcher in @VectorBits | Web2/3Security

Katılım Temmuz 2022
605 Takip Edilen2.4K Takipçiler
S7iter
S7iter@S7iter_·
@Defi_Nerd_sec The analysis is excellent. The entry point for the vulnerability is the L2Pool contract's flashLoan: flashLoan -> executeFlashLoan -> _handleFlashLoanRepayment.
S7iter tweet media
English
1
0
2
64
Defi Nerd
Defi Nerd@Defi_Nerd_sec·
The vulnerability lies in the function _handleFlashLoanRepayment called by the entry public function executeFlashLoanSimple.
Defi Nerd tweet media
English
2
0
1
163
Defi Nerd
Defi Nerd@Defi_Nerd_sec·
😿On 2026-03-18, the dTRINITY @dTRINITY_DeFi dLEND lending protocol (an Aave v3 fork deployed on Ethereum mainnet) was exploited through a **flash loan abuse combined with a logic error** in the flash loan repayment accounting. An attacker manipulated the cbBTC reserve's liquidity index from ~1.0 RAY to 6,226,622 RAY in a preparatory transaction, then used that inflated index to borrow 257,328 dUSD against phantom collateral in the exploit transaction. The protocol lost **257,328.63 dUSD (~$257,000)** in outstanding undercollateralized debt; the cbBTC aToken is additionally insolvent by 7.86 cbBTC (~$786,000 at $100k/BTC) due to extraction of phantom cbBTC during the exploit. The attacker's net cost was approximately 0.1245 cbBTC (~$12,500) paid as a flash loan premium in the setup transaction, yielding a net profit of approximately $257,000 in dUSD transferred to the attacker EOA.
English
1
0
1
441
YEP
YEP@Flashing777·
@S7iter_ 使用住宅代理IP,你IP被ban了
日本語
2
0
0
53
S7iter
S7iter@S7iter_·
@Flashing777 不是这个问题,我让朋友也试了,而且开的纯净IP+指纹
中文
0
0
0
59
stephanie
stephanie@steph921004·
@S7iter_ 被封了是不是看不到之前写的SQL了?🤔
中文
1
0
0
79
S7iter
S7iter@S7iter_·
@w3bD4nny 就查询合约,可能是给这种查询语法ban掉了。查一次第二次就被ban了
中文
0
0
0
109
smhkptking
smhkptking@pennysplayer·
有没有什么焚决可以加速ai分析tx的速度,给gpt5.4 ultra high模式下喂了一个tx,分析了20多分钟,中途还分析错了,经过我中途一再提示,目前仍然还在分析。20分钟了gpt还在哼哧哼哧的转圈,好奇其他人那些审计agent怎么又快又牛逼的app.blocksec.com/phalcon/explor…
中文
7
0
1
1.5K
Du Jun
Du Jun@DujunX·
回归创业,Q2开启 机构交易所。 欢迎新老朋友们多多支持。 客服小杜即将上线~
Du Jun tweet mediaDu Jun tweet mediaDu Jun tweet media
中文
175
15
413
96.3K
S7iter retweetledi
Defimon Alerts
Defimon Alerts@DefimonAlerts·
🚨 @SolvProtocol has been exploited for $2.7M The BitcoinReserveOffering (BRO-SOLV-20MAY2026) contract's mint() function has a double-minting flaw. When a user mints by transferring a full ERC-3525 NFT, doSafeTransferIn triggers the onERC721Received callback which mints BRO tokens to the caller, and then mint() itself mints again for the same amount. The attacker looped burn→mint 22 times, turning 135 BRO into 567M BRO, then exchanged the inflated BRO for 38 SolvBTC (~$2.73M) via Solv's exchange contract. TX: etherscan.io/tx/0x44e637c7d… Victim: etherscan.io/address/0x014e… (BRO-SOLV-20MAY2026)
Defimon Alerts tweet media
English
15
27
160
75.1K
S7iter retweetledi
GM Wallet 华语
GM Wallet 华语@GMwalletHK·
🚀 GM Wallet|安全体验,重新定义 像热钱包一样好用, 却具备接近冷钱包级别的安全防护。 Apple 已官方确认:iPhone / iPad 可用于处理北约 NATO 级机密信息,这标志着其原生安全体系达到军用级安全标准。 基于完全原生开发的安全技术栈,GM Wallet 将 Apple 受认可的硬件级安全能力用于私钥的本地保护: 🔥 热钱包般的流畅体验 🧊 冷钱包级的安全模型 🔐 私钥始终仅在本地生成与存放,基于系统集成的安全芯片和物理随机数生成器,硬件级隔离防护 无需额外硬件。 无需托管。 让“高等级安全”,变得更简单、更易用。 🔗 Apple 官方来源: apple.com/newsroom/2026/…
中文
0
1
3
1.1K
S7iter
S7iter@S7iter_·
@pennysplayer 区块链真的是太精彩了(今晚睡不着了
中文
0
0
1
229
smhkptking
smhkptking@pennysplayer·
cnm,区块链真是太精彩了
中文
2
0
2
531
探姬 | Hello-CTF 🚩
探姬 | Hello-CTF 🚩@ProbiusOfficial·
@HappyQQ_AI 我其实觉得更像是草台班子的人情世故🤪 zf:不会真有人敢黑我吧😋 黑客:意思意思就行😲 ai:什么,是赏金项目🤓
中文
3
0
23
1K
Niner 🍡九儿🔶
Niner 🍡九儿🔶@lijiuer1·
elys只是个约炮软件啊 你们都下了干啥啊?
中文
326
32
1K
946.1K
S7iter retweetledi
VectorBits
VectorBits@VectorBits·
⚠️Earlier Attack: STO Protocol - Loss ~69k The attack reported by DefimonAlerts came from yet another imitator. We have identified an earlier and more serious attack incident. Same token name — Victim token $STO: 0xc6941C6bffdc844073e2c7C22816216C3890Cd65 The first $STO attack was carried out by a completely different Attacker: 0x87A8Ff8AD993C10aF4ad85b62Ddb50b4968ABc93 Attack TX: bscscan.com/tx/0xf7f741bf1… Profit from this $STO attack: ~69k Vulnerability type (both incidents): Logic Error — Deflationary Sell-Burn Drain
Defimon Alerts@DefimonAlerts

🚨 STO Protocol - Loss $16.1K (2026-02-23) Token: $STO (no CoinGecko listing) MC: Unknown TVL: $5.65K (STO/WBNB pair) Type: Logic Error — Deflationary Sell-Burn Drain The STO token burns sold tokens from the PancakePair on every subsequent sell via \_executePendingSellBurn(), which removes STO from the pair and calls sync() to update reserves. An attacker flash-loaned 360,894 WBNB, then executed 45 repeated sell cycles: each sell accumulated pendingBurnFromSell, and the next sell's \_update burned those tokens from the pair before the new swap, shrinking STO reserves and inflating the WBNB output. This created a compounding drain loop, extracting ~26.57 BNB ($16.1K) of excess WBNB from the pair. The root cause is that \_executePendingSellBurn (STO.sol:313-323) burns pair tokens and syncs reserves mid-swap flow, allowing an attacker to manipulate the AMM price curve within a single transaction. TX: bscscan.com/tx/0x8ba17bea9… Victim: bscscan.com/address/0x7c40… Token: bscscan.com/address/0xfe33…

English
1
1
7
1.3K
S7iter retweetledi
S7iter
S7iter@S7iter_·
@GMwalletHK 钱包我只用GMwallet(本评论由GM Wallet倾情赞助)
中文
0
0
3
151
GM Wallet 华语
GM Wallet 华语@GMwalletHK·
GM! 钱包我只用 GM Wallet GM Wallet 不只是工具,更是连接 Web2 与 Web3 的桥梁。 GM Wallet 是一款开源、非托管的区块链钱包,我们提供极简体验,无需学习复杂机制,即可安全转账、参与 DeFi、探索链上世界;自动处理Gas让每笔交易更高效、更省心。 ⚫️零门槛操作:Web2 用户上手即用,一键连接主流链上生态,多链资产一目了然,完成转账、资产管理 ⚫️自动处理Gas:无需持有 TRX 支付 Gas,降低交易成本,实现无缝链上交互 ⚫️安全自托管:开源、非托管、私钥永不离设备 欢迎大家用GM Wallet开启你的链上自由之旅! 本文由马斯克和GM Wallet倾情赞助 | @elonmusk @GMwalletApp @GMwalletHK
中文
3
0
5
450
S7iter retweetledi
BradMoon
BradMoon@xy9301·
人们在使用AI/LLM时的两个极端误区,核心问题是对工程化投入的认知偏差。 第一类人的问题是过度乐观和以偏概全。他们可能碰巧在某个case上得到了不错的结果,就立刻觉得找到了"银弹",忽视了这些成功可能只是任务本身恰好适合LLM的能力边界、运气好碰到了模型训练数据覆盖良好的领域、或者没有遇到edge cases和各种实际场景中的复杂情况。他们没意识到从"demo能跑"到"生产可用"之间有巨大鸿沟。 第二类人的问题是过早放弃和懒惰思维。他们把LLM当成魔法棒,期望零投入就能得到完美结果。当发现需要精心设计prompt、迭代优化、处理各种corner cases时,就直接否定工具本身,而不反思是否自己投入不足。 而那些系统性工程工作,才是把LLM从"有潜力的工具"变成"可靠生产力"的必经之路:1. Prompt Engineering不是简单写几句话,而是需要反复实验迭代,包括指令的结构设计、few-shot examples的精心挑选、输出格式的明确约束、edge case的处理说明,每个细节都可能影响结果的质量和稳定性;2. 跨文件跨合约的Context Engineering需要精心设计如何处理合约之间的依赖关系、继承关系、跨合约调用,如何将这些context有效地喂给LLM,如何分块、如何保持关联性、如何控制token预算;3. Checklist的收集需要基于实际使用中遇到的问题、已知的漏洞模式、行业最佳实践来系统化地构建检查项;4. 回归测试要确保每次优化不会破坏之前已经work的场景,需要建立测试用例集并持续维护,建立大量的benchmark,用真实的、多样化的案例来验证效果,确保结果是稳定的、可复现的、适用性强的,而不是偶然成功。 这和传统软件开发没什么不同,都需要工程化的严谨态度。问题在于AI的营销话术和一些早期成功案例给了人们"AI很容易用"的错觉,导致很多人低估了把它用好所需的专业性和投入。
Anthropic@AnthropicAI

New on our Frontier Red Team blog: We tested whether AIs can exploit blockchain smart contracts. In simulated testing, AI agents found $4.6M in exploits. The research (with @MATSprogram and the Anthropic Fellows program) also developed a new benchmark: red.anthropic.com/2025/smart-con…

中文
1
4
36
9K