SecLat

102 posts

SecLat banner
SecLat

SecLat

@SecLat_Security

Educación en Seguridad Web3 y Auditorías de Seguridad de Smart Contracts. Education and SmartContracts Security Audits https://t.co/2W7QBxDKS1 - https://t.co/blRBEsAdOt

Mexico y Latinoamerica Katılım Ağustos 2024
123 Takip Edilen77 Takipçiler
Sabitlenmiş Tweet
SecLat
SecLat@SecLat_Security·
Un hilito con los protocolos que hemos ayudado a proteger 😀👇
Español
1
2
6
794
SecLat
SecLat@SecLat_Security·
Most smart contract exploits are not “complex hacks”. They’re broken assumptions between components. One missing check can cost millions. That’s why protocol architecture reviews matter as much as line-by-line audits. - 7/7
English
0
0
0
30
SecLat
SecLat@SecLat_Security·
Core lesson: 1.- A missing access control in a vital function can allow an attacker to drain your protocol. 2.- Signer validation != spending authorization. Authentication and inventory ownership must always be cryptographically bound to the SAME address. - 6/7
English
1
0
0
31
SecLat
SecLat@SecLat_Security·
🚨 $5.87M drained from TrustedVolumes in ONE transaction. No private key leak. No oracle manipulation. No governance attack. Just 3 bugs chained together. 🧵👇 - 1/7
English
1
6
8
381
SecLat
SecLat@SecLat_Security·
Don't make the mistake of thinking that if you don't verify the contract, it cannot be hacked. Audit your contracts before deployment to strengthen your security. Send us a DM if you're looking for an audit. 2/2 polygonscan.com/address/0xa184…
English
0
0
0
31
SecLat
SecLat@SecLat_Security·
Ink Finance was hacked due to an access control bug in a function, yeah, this type of bugs still happens in web3. The contract wasn't verified on-chain, even though it got hacked. 1/2
English
1
1
1
77
SecLat
SecLat@SecLat_Security·
Seclat Security blog is online. We'll be sharing content on web3 security, blockchain, and smart contracts. You can read it in English or Spanish; select your preferred language on the website. Support us by retweeting and following to reach more people. seclat.xyz/es/blog
English
0
5
9
350
SecLat
SecLat@SecLat_Security·
Don't wait until your protocol is hacked to request an audit; do it before a hacker steals all your protocol's funds and your users' data. Contact us via DM here or by email through our website: seclat.xyz
English
0
1
3
81
SecLat
SecLat@SecLat_Security·
Another day, another hack in #Web3 AI is accelerating the attacks to different protocols, security-related work is more important now than ever!!
Blockaid@blockaid_

🚨 Blockaid's exploit detection system has identified an on-going exploit on TrustedVolumes (1inch market maker / resolver, @trustedvolumes ). Chain: Ethereum Victim contract: TrustedVolumes resolver — 0x9bA0CF1588E1DFA905eC948F7FE5104dD40EDa31 Exploiter: 0xC3EBDdEa4f69df717a8f5c89e7cF20C1c0389100 Exploit tx: 0xc5c61b3ac39d854773b9dc34bd0cdbc8b5bbf75f18551802a0b5881fcb990513 Total extracted so far: ~$5.87M (1,291.16 WETH + 206,282 USDT + 16.939 WBTC + 1,268,771 USDC). Same operator as the March-2025 1inch Fusion V1 incident; this is a different vulnerability, in a TrustedVolumes-controlled custom RFQ swap proxy (0xeEeEEe53033F7227d488ae83a27Bc9A9D5051756). More details will follow.

English
0
0
0
27
SecLat retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
⚠️ Critical Apache HTTP Server Flaw Exposes Millions of Servers to RCE Attacks Source: cybersecuritynews.com/apache-http-se… The Apache Software Foundation has released a critical security update for Apache HTTP Server, patching five vulnerabilities, including a dangerous double-free flaw capable of enabling Remote Code Execution (RCE) in version 2.4.67, released on May 4, 2026. All users running version 2.4.66 or earlier are strongly urged to upgrade immediately. The most severe of the five vulnerabilities is CVE-2026-23918, rated High with a CVSS base score of 8.8. The flaw is a double-free memory corruption bug triggered within Apache's HTTP/2 protocol implementation during an "early stream reset" sequence. #cybersecuritynews #vulnerability
Cyber Security News tweet media
English
33
669
2.1K
296.8K
SecLat
SecLat@SecLat_Security·
For this quadratic funding round, it's more important that 100 people donate $1 each than one person donate $100, because the fund is based on the number of users who donate, not the total amount donated. Thank you all in advance!
English
0
0
1
15
SecLat
SecLat@SecLat_Security·
The round starts on April 21st, and every dollar donated helps us receive support from @thedaofund to continue our work educating users to create a safer ecosystem.
English
1
0
0
16
SecLat
SecLat@SecLat_Security·
Friends, we've registered Seclat Security Education to participate in the @ethereum security foundation's Quadratic Round funding on @Giveth. We're asking for your support for our project so we can continue sharing completely free security education in Spanish.
English
1
0
1
28
SecLat
SecLat@SecLat_Security·
para la ronda de fondeo cuadrático es mas importante que 100 personas donen 1 usd cada uno a que una sola persona nos done 100 usd, porque el fondo apoya en base a la cantidad de usuarios que donaron al proyecto y no la cantidad de dinero donado. Gracias a todos por adelantado!
Español
0
0
0
15
SecLat
SecLat@SecLat_Security·
La ronda empezara el 21 de abril y cada dolar donado nos ayuda a recibir apoyo de @thedaofund para continuar con nuestra labor de educar a los usarios para generar un ecosistema mas seguro.
Español
1
0
0
15
SecLat
SecLat@SecLat_Security·
Registramos Seclat Educacion en seguridad para participar en Quadratic Round funding de la @ethereum security fundation en @Giveth por lo que pedimos su apoyo a nuestro proyecto para seguir compartiendo educación en seguridad complemente gratuita y en español
Español
1
0
1
27