Wake

6.5K posts

Wake banner
Wake

Wake

@WakeFramework

Complete Solidity security: Wake Framework (open-source) for testing & fuzzing + Wake Arena for AI audits with graph-driven reasoning. By @AckeeBlockchain

EVM Katılım Eylül 2023
139 Takip Edilen2.3K Takipçiler
Sabitlenmiş Tweet
Wake
Wake@WakeFramework·
Four AI auditing tools. Fourteen protocols. The shape tells the story. Wake Arena 3.1's blue area contains the other three on every axis. Where all systems struggle — Burve, Notional — the gap closes. Where the work matters — Lend, Munchables, Virtuals — the edge is visible and consistent. What the chart doesn't show: 49 of the 63 found vulnerabilities were confirmed by more than one Wake Arena agent independently. The shape reflects consensus, not a single model's guess. Learn more ↓
Wake tweet media
English
5
2
15
701
Wake
Wake@WakeFramework·
Labels are from Code4rena and Sherlock, taken as ground truth. Some may have been miscategorized, a known limitation of any competition-based benchmark. • Follow @WakeFramework for protocol-by-protocol breakdowns • Repost to help the security community calibrate AI audit expectations Benchmarks: github.com/Ackee-Blockcha… Try Wake Arena: ackee.xyz/wake/arena
English
0
0
0
33
Wake
Wake@WakeFramework·
Most tools give you a headline number. Here's every number. 9 models × 14 protocols = 126 cells. Wake Arena 3.1 is the darkest row. But look at where all systems struggle: Burve, Notional Exponent, Lambo.win. No tool finds everything, and this chart makes that visible. On Lend, the hardest protocol in the dataset with 28 high-severity findings: Wake Arena 3.1 found 20. Zellic v12 found 10. Learn more ↓
Wake tweet media
English
1
0
2
128
Wake
Wake@WakeFramework·
Why use Wake's extension? Real-time vulnerability detection as you type: Same detectors used in Lido, Aave, Axelar, Safe audits. Red squiggles for security issues, not just syntax errors. Only extension with proven audit framework integration.
GIF
English
1
1
8
389
Wake
Wake@WakeFramework·
Graph-driven reasoning. Multi-agent cross-checking. Static analysis context from 200+ audits. That's the architecture behind the step change. • Follow @WakeFramework for technical breakdowns • Repost if you build or secure smart contracts Benchmarks: github.com/Ackee-Blockcha… Try Wake Arena: ackee.xyz/wake/arena
English
0
0
0
58
Wake
Wake@WakeFramework·
The jump from Wake Arena 3.0 to 3.1 is a +21 percentage point increase in detection rate. 3.0 at 46% → 3.1 at 67% Frontier LLMs plateau around 44%. That ceiling is real: more compute, better prompts, same result. The staircase: Opus 4.5 (22%) GPT-5 (26%) GPT-5.2 xhigh (44%) = Zellic v12 (44%) Wake Arena 3.0 (46%) Wake Arena 3.1 (67%). Breaking through that ceiling required a different architecture. Not a different prompt. Learn more ↓
Wake tweet media
English
1
4
7
884
Wake
Wake@WakeFramework·
4/ Access control bugs and incorrect guard logic appear consistently in production audits. Testing the revert path is the check most teams keep skipping. • Follow @WakeFramework for more insights • Repost to help others Get Wake: getwake.io
English
4
0
2
45
Wake
Wake@WakeFramework·
3/ Extend it: assert the specific revert reason. After the block, check the captured error to confirm the correct reason was returned — not just that something reverted. Tests that verify the right error catch guard logic bugs, not just guard existence.
English
1
0
1
51
Wake
Wake@WakeFramework·
Access control tests that only verify the authorized caller leave the unauthorized caller untested. Wake's must_revert() makes revert testing as clean as success testing. Here's the pattern: Thread ↓
Wake tweet media
English
9
0
8
278
Wake
Wake@WakeFramework·
Congrats! Developers keep voting with their time: better Solidity tooling wins. The IDE space is still underserved. Most extensions handle syntax and compilation. Few integrate security into the writing experience. Fewer still connect analysis to a full fuzzing pipeline. Wake's VS Code extension was built from the same frustration. Vulnerability detection on every keystroke, powered by detectors from 200+ production audits. Inheritance graphs, call flows, Remix-like testing, all without leaving the editor. 44,000+ installs. What a first-place finish for a Solidity IDE proves: the market rewards integrated developer experience. That signal matters across the whole ecosystem.
Yogesh Kumar@itsyogesh18

We won 🏆 1st Place in Track 1 (EVM) at the Polkadot Solidity Hackathon. What started as "let me add one component to the builder" turned into a full smart contract IDE for Polkadot Hub. Two sleepless nights, shipped live, quoted by @Polkadot, and now this 🥹 Thank you @openguildwtf and @Web3foundation for putting this together. And everyone who tried it, reported bugs, and showed support on the original thread 🙌 Project Link ➡️ relaycode.org/studio

English
0
2
2
172
Wake
Wake@WakeFramework·
Audit access is one barrier. Code readiness is the other. Most teams arrive at their first audit with surface-level bugs that burn expensive reviewer hours. Reentrancy, missing checks, storage collisions. Mechanical issues that tools should catch before a human ever reads the code. The pattern that works: static analysis and targeted fuzzing before submission. Wake Arena runs multi-agent AI + 108 detectors from 200+ audits, property-based fuzzing on pytest, and AI-driven analysis. All before an auditor opens the repo. Arbitrum builders applying to this program should ask what state their code is in first. Cleaner submissions mean faster turnarounds and sharper findings where it counts, deep protocol logic.
Arbitrum Developers@ArbitrumDevs

Prioritize your security from day one on Arbitrum 🔐 Launched in Aug 2025, the Arbitrum Audit Program has helped projects access high-quality smart contract audits, removing a key blocker to shipping securely. Applications are still open. Apply here 👇🏻 tally.so/r/3xzEzv?progr…

English
0
1
4
154
Wake
Wake@WakeFramework·
@Priscilla_nuel You clearly get it. Appreciate your comment. Meanwhile, as we are growing our community, a follow from you would mean a lot. Thanks in advance.
English
1
0
1
8
Wake
Wake@WakeFramework·
Security issues don't announce themselves in the file you're currently editing. Wake's Security Overview panel surfaces every detected vulnerability across your whole project — severity-sorted, always current, no terminal required. Thread ↓
GIF
English
6
3
11
198
Wake
Wake@WakeFramework·
@abhi3700 Well done, solid work! I dropped you a DM with some open-source tooling you may find interesting, given your work.
English
1
0
1
32
Abhijit Roy
Abhijit Roy@abhi3700·
🚀 𝗦𝗲𝗹𝗳-𝗖𝘂𝘀𝘁𝗼𝗱𝗶𝗮𝗹 𝗣𝗮𝘆𝗺𝗲𝗻𝘁𝘀 𝗼𝗻 𝗨𝗻𝗶𝗙𝗶 — 𝗟𝗼𝘄-𝗰𝗼𝘀𝘁, 𝗚𝗮𝘀𝗹𝗲𝘀𝘀, 𝗦𝗲𝗰𝘂𝗿𝗲 & 𝗧𝗿𝗮𝗻𝘀𝗽𝗮𝗿𝗲𝗻𝘁 In this demo, we showcase the 𝗰𝘂𝘀𝘁𝗼𝗱𝗶𝗮𝗹 𝗽𝗮𝘆𝗺𝗲𝗻𝘁 𝗳𝗹𝗼𝘄 𝗶𝗻 𝗨𝗻𝗶𝗙𝗶. A user can sign up using 𝗠𝗲𝘁𝗮𝗺𝗮𝘀𝗸 🦊 and confirm the payment with a signature from installed Metamask browser extension. Once the payment is sent on-chain, UniFi 𝗱𝗼𝗲𝘀 𝗻𝗼𝘁 𝗶𝗺𝗺𝗲𝗱𝗶𝗮𝘁𝗲𝗹𝘆 𝗺𝗮𝗿𝗸 𝘁𝗵𝗲 𝘁𝗿𝗮𝗻𝘀𝗮𝗰𝘁𝗶𝗼𝗻 𝗮𝘀 𝗰𝗼𝗺𝗽𝗹𝗲𝘁𝗲. Instead, it waits for the transaction to reach 𝗻𝗲𝘁𝘄𝗼𝗿𝗸 𝗳𝗶𝗻𝗮𝗹𝗶𝘁𝘆. On 𝗘𝘁𝗵𝗲𝗿𝗲𝘂𝗺, finality typically takes ~𝟭𝟮–𝟭𝟱 𝗺𝗶𝗻𝘂𝘁𝗲𝘀. During this period: • The payment receipt shows “𝗖𝗼𝗻𝗳𝗶𝗿𝗺𝗲𝗱” • Once the network finalizes the transaction, the status automatically changes to “𝗙𝗶𝗻𝗮𝗹𝗶𝘇𝗲𝗱” This update happens 𝗮𝘂𝘁𝗼𝗺𝗮𝘁𝗶𝗰𝗮𝗹𝗹𝘆, even if neither the payer nor the payee refreshes the page. ⚠️ 𝗜𝗺𝗽𝗼𝗿𝘁𝗮𝗻𝘁: Finality is an inherent property of the blockchain network. UniFi does 𝗻𝗼𝘁 𝗰𝗼𝗻𝘁𝗿𝗼𝗹 𝘁𝗵𝗶𝘀 𝗽𝗿𝗼𝗰𝗲𝘀𝘀. This approach ensures 𝘁𝗿𝗮𝗻𝘀𝗽𝗮𝗿𝗲𝗻𝗰𝘆, 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆, 𝗮𝗻𝗱 𝗮𝗰𝗰𝘂𝗿𝗮𝘁𝗲 𝗽𝗮𝘆𝗺𝗲𝗻𝘁 𝘀𝘁𝗮𝘁𝘂𝘀 𝘁𝗿𝗮𝗰𝗸𝗶𝗻𝗴 for users. #Web3Payments #Stablecoin #Stablecoins #CryptoPayments #Fintech #Blockchain #UniFi #Ethereum #USDT #USDC #DAI #Polygon #Binance #BSC #Rust #Finance #Payment #PaymentGateway #Merchant #Stripe
Abhijit Roy tweet media
English
1
1
1
45
Wake
Wake@WakeFramework·
4/ Same detectors used in Ackee audits securing Lido, Aave, Axelar, Safe. Not syntax warnings. Vulnerability detection from the same framework behind 200+ audits. • Follow @WakeFramework for more insights • Repost to help others Get the Solidity extension: marketplace.visualstudio.com/items?itemName…
English
0
0
2
69
Wake
Wake@WakeFramework·
3/ One prerequisite: your project needs to compile cleanly. Once it does, the panel runs continuous analysis on every file in your workspace — not just the one that's open. Fix compilation errors first, then expect the panel to populate.
English
1
0
1
49
Wake
Wake@WakeFramework·
@0xVoid_Web3 Exactly! We are proud to say that Wake Arena achieves: True positive rate >70% False positive rate <30% I appreciate your comment, and as we are growing our community, a follow from you would mean a lot. Thanks in advance.
English
0
0
1
14
Wake
Wake@WakeFramework·
Impressive benchmark, and it highlights where the industry is heading. Raw LLMs can identify known vulnerabilities. But production security demands more: structured, multi-step validation, domain-specific reasoning, and false-positive control. A single prompt to Claude or GPT catches some bugs. It also produces an 86%+ false positive rate on real Solana codebases. Wake Arena takes a different approach. Multi-agent AI with graph-driven reasoning through Data Dependency Graphs, fed by 108 battle-tested detectors from audits securing $180B+ in TVL. On Printr Protocol, it caught 5 critical vulnerabilities plus 17 additional issues before deployment. The question isn't whether AI can find bugs. It's whether it can do so reliably enough to act on.
Rohan Paul@rohanpaul_ai

Anthropic top researcher Nicolas Carlini (67.2k citations on Google Scholar) says Claude is a better security researcher than him, made $3.7 mn from exploiting smart contracts, and found vulnerabilities in Ghost (a 52K+ Github star project).

English
3
1
7
198