Sabitlenmiş Tweet
VulSight
54 posts

VulSight
@VulsightSec
Audits for Move, Rust, EVM. Oracle/DeFi focus. And full-stack cyber—pentests, red team, DFIR. Book via DM.
Katılım Eylül 2025
4 Takip Edilen1.2K Takipçiler

100+ audits completed
Top 15 all-time on Cantina
$500K+ in bug bounties
A CVE on Ethereum's Geth client.
We don't just review code. We break it before someone else does.
If your protocol is heading to mainnet and you want auditors who compete at the highest level...
DMs are open.
Or reply here. We read everything. 🔒
English

🏆Top 15 All time on Cantina Leaderboard
🏆Top 3 on Hackenproof weekly Leaderboard for 2 consecutive weeks.
🏆Multiple 5-6 figure bug bounties on Immunify, Hackenproof and Cantina.
🛡️Securing Billions in TVL on live protocols.
Rankings don't lie.
If you're launching a protocol, we're the team you want reviewing your code.
DMs open.
English
VulSight retweetledi

One of the biggest bounties I've earned came from a vulnerability that most auditors would have never found.
Not because it was deeply complex. Because it wasn't where anyone was looking.
The vulnerability didn't exist in the GitHub version of the smart contract. It only existed in the on-chain deployed contracts. The code that was actually live, holding real funds.
Most auditors only review the GitHub repo. That's the standard scope. But the deployed contract can differ. Different constructor arguments. Post-deployment configurations. State changes after initialization.
I found it because I wasn't randomly scrolling through code. I chose one specific impact I wanted to test for: drain of funds. Then I worked backwards.
Where does the money flow? Which functions move funds? What checks exist on those paths?
I audited both the GitHub repo and the on-chain contracts. The discrepancy between them is where the critical was hiding.
The methodology is simple. Pick the worst-case impact. Trace every path that could lead there. Audit both the repo and what's actually deployed.
The GitHub repo is a draft. The on-chain contract is what attackers see.
Audit both.
English