ArefXV

529 posts

ArefXV banner
ArefXV

ArefXV

@XVisHere

Solidity & Vyper dev | Security Researcher

Katılım Eylül 2024
603 Takip Edilen546 Takipçiler
ArefXV
ArefXV@XVisHere·
4) And the most important part, shout out to the GOAT, my inspiration, the person who lit my life’s path—@PatrickAlphaC , to whom I owe so much, and who changed the course of my life🫡
English
0
0
0
7
ArefXV
ArefXV@XVisHere·
2) This isn't just a portfolio - it's a live showcase of working demos you can interact with. 👉 Check it out: secudity.com Security + Solidity What do you think? Would love your feedback!
English
1
0
0
9
ArefXV
ArefXV@XVisHere·
🧵Excited to unveil Secudity - my professional portfolio showcasing blockchain security & Web3 development!
English
1
0
0
9
ArefXV
ArefXV@XVisHere·
How to protect yourself: ✅ Use OpenZeppelin's upgradeable patterns ✅ Never allow arbitrary delegatecall targets ✅ Match storage layouts EXACTLY in proxy patterns ✅ Get your contracts audited
English
0
0
0
1
ArefXV
ArefXV@XVisHere·
Real-world damage: • Parity Wallet hack: $30M lost • Multiple DeFi protocols drained • Still seeing this in 2024/2025 audits The pattern never dies because devs keep making the same mistake.
English
1
0
0
9
ArefXV
ArefXV@XVisHere·
Most devs think they understand Solidity's delegatecall. Then they lose millions. Here's the vulnerability hiding in plain sight: 🧵
English
2
0
1
12
ArefXV
ArefXV@XVisHere·
At @Secudity, we detect these automatically before you interact with them. Our engine flags modified transfer functions and compares against known good contracts. Stay safe out there
English
0
0
0
15
ArefXV
ArefXV@XVisHere·
How to spot it: ✅ Check the contract on Etherscan ✅ Look at the transfer() function code ✅ See if there's a whitelist/blacklist mechanism ✅ Verify it matches the OFFICIAL USDT contract
English
1
0
0
19
ArefXV
ArefXV@XVisHere·
🚨 Just analyzed another Flash USDT scam that stole $50k this week. Here's the exact honeypot pattern scammers are using (and how to spot it in 30 seconds): 🧵👇
English
1
0
0
34
ArefXV
ArefXV@XVisHere·
Never share your private key. Never reuse your private key. Never screenshot your private key. Never trust anyone who asks for your private key. 🔑 It’s the one thing you don’t get a second chance with
English
1
0
3
84
ArefXV
ArefXV@XVisHere·
smart contract bugs don’t sleep. unfortunately, neither do auditors :)
English
1
0
1
68
ArefXV
ArefXV@XVisHere·
Attack Highlight (2025): Polter Finance lost $8.7M using oracle manipulation + flash loans. They inflated BOO token price via flash lending, borrowed against it, and drained funds. Tip: Always require TWAP or aggregated price feeds + audit oracle logic t.me/XVdevLabs/9
English
0
0
1
146