Sam

557 posts

Sam banner
Sam

Sam

@_0x5am

dumb guy breaking smart contracts👨‍💻

England Katılım Ekim 2016
1.8K Takip Edilen341 Takipçiler
Sabitlenmiş Tweet
Sam
Sam@_0x5am·
I'm super proud of myself. One step closer to quitting my job and becoming a full-time auditor. Thank you to @cantinaxyz for the opportunity.
Sam tweet media
English
10
0
138
4K
Sam
Sam@_0x5am·
@pashov Lambo owner AMA 🙏
Español
1
0
1
260
winnie
winnie@xuwinniexu·
I've been designing a game recently and am now looking for some beta testers. If you're interested in simulation games, text games, LLM-native games, or simply something new, feel free to leave a comment or send me a DM.
English
11
0
29
2.3K
pashov
pashov@pashov·
More than a year ago. Some killer security researchers came out of this internship. Many got hired in big companies with good salaries - very welcome. If another internship cohort sounds interesting, do comment below - let's see if there are people that would want this
pashov@pashov

Pashov Audit Group security researcher internship coming soon. Learn by doing, 100% practice. Real audits, real projects. Like/RT this post if you'd be interested in this. There will be lots of slots, I've thought of a scalable model to do this right, full announcement soon🫡

English
117
14
247
17.4K
Sam
Sam@_0x5am·
@pashov This is what makes PAG chads🫡
English
0
0
1
80
pashov
pashov@pashov·
🧠AI security tools are booming. Still, many are slow, painful to set up or expensive to run. solidity-auditor v2 drops tomorrow. 1 command install. 8 parallel specialist agents. <10min on 5000 nSLOC. Runs locally on a cheap API plan. Free (even though it probably shouldn't be)
pashov tweet media
English
26
17
223
9.9K
Sam retweetledi
f4lc0n
f4lc0n@al_f4lc0n·
the figures referenced in the post are entirely misleading. There was no impact realized from this issue. Zero user funds were affected and zero addresses were compromised. My response: Are you suggesting I should have actually exploited the bug and caused real damage before coming to talk to you? For the stated vulnerability to work in practice, it would require execution of several suspicious transactions that would have an extraordinarily limited impact. My response: You should know better than anyone that on a Cosmos-based chain, a single transaction can pack multiple messages. Just one transaction is more than enough to completely drain multiple whale accounts. Injective has dynamic rate limiting functionalities which are applied automatically based on our live monitoring systems. This functionality has been live on mainnet since last year and is publicly available in our code base. My response: First, this has nothing to do with the vulnerability itself. Rate limiting doesn't stop attackers from stealing funds. It only slows them down when they try to bridge those funds over to Ethereum. Second, when I submitted my report, the mainnet configuration for this feature was not set. In other words, this feature wasn't even turned on! In addition to all of the above, this report was reviewed against the clearly defined terms of our Immunefi program. Based on those terms, issues such as those raised in this report that DO NOT impact block production or consensus are categorized outside of the Blockchain/DLT tier and carry a maximum payout of $50,000. My response: First, Immunefi has always put the impact of direct fund theft at the very top of its priority list. This is a fact that everyone knows. Second, you changed your bug bounty page after I submitted my report. Here’s the snapshot from November 8, 2025: web.archive.org/web/2025110816… . And now, there’s an extra line added to your bug bounty page: “IMPORTANT: Within the Assets in Scope table, the injective-core folder is listed for both Blockchain/DLT and Web/App due to overlap between the two within the same folder. However, for a report to be categorized as Blockchain/DLT, the resulting impact has to be directly involved with the block production process or with consensus failures. All reports not dealing directly with either of these are to be categorized as Web/App.” I’d really like to know when this line was added. and do you really value chain consensus more than users' funds? We remain committed to fair, transparent, and consistent handling of all reports, and to maintaining the highest standards of security for the ecosystem. Injective has done so since its mainnet inception in 2021 and will continue to do so in perpetuity, always putting builders and security first. My response: You never even replied to my messages, and now you’re blaming me for not requesting mediation? I can post the original report if you agree. I left many messages, but you haven't replied to a single one. ---------- Finally: Stop making excuses from every angle and trying to use technical jargon to confuse people who aren't developers. That doesn’t work anymore these days. Anyone can just ask an AI to fact-check what both of us are saying. I have no ill intentions toward your project. All I'm asking is for you to be honest and handle this transparently.
Bojan Angjelkoski@bangjelkoski

Security is paramount at @injective and we take our bug bounty program very seriously. First and foremost, the figures referenced in the post are entirely misleading. There was no impact realized from this issue. Zero user funds were affected and zero addresses were compromised. For the stated vulnerability to work in practice, it would require execution of several suspicious transactions that would have an extraordinarily limited impact. Injective has dynamic rate limiting functionalities which are applied automatically based on our live monitoring systems. This functionality has been live on mainnet since last year and is publicly available in our code base. In addition to all of the above, this report was reviewed against the clearly defined terms of our Immunefi program. Based on those terms, issues such as those raised in this report that DO NOT impact block production or consensus are categorized outside of the Blockchain/DLT tier and carry a maximum payout of $50,000. If the poster had requested a mediation we would explain to him the dynamic rate limiters and monitoring systems we have in place and why his stated figures are misleading. However, he did not do so. We always follow the procedures set forth by the Immunefi program and expect the submitter to do so as well. We remain committed to fair, transparent, and consistent handling of all reports, and to maintaining the highest standards of security for the ecosystem. Injective has done so since its mainnet inception in 2021 and will continue to do so in perpetuity, always putting builders and security first.

English
41
36
474
46.4K
Sam retweetledi
Immunefi
Immunefi@immunefi·
Security researcher ily2 has just earned a staggering $3,000,000 from submitting a critical smart contract bug via Immunefi. That's the largest single payout in web3 security in recent memory. In total, he's submitted 3 reports. All 3 were paid. 100% accuracy. His leaderboard update is coming soon, but you can pledge IMU to him now and earn when he finds the next one: immunefi.com/pledge/ily2
Immunefi tweet media
English
197
156
1.2K
339.2K
Sam retweetledi
Pashov Audit Group
Pashov Audit Group@PashovAuditGrp·
🚨JUST IN: Pashov Audit Group🤝Discord Welcome to our new community with technical topics around security, AI and dev. We live and breathe web3 technologies🫡 Join, RT and comment below for a chance to win 3x full-year Claude/GPT subscriptions👇 discord.gg/pashovauditgro…
English
160
146
284
26.1K
Sam
Sam@_0x5am·
@legendydx Earning less than $10 in a contest is a rite of passage.
English
0
0
0
32
Sam
Sam@_0x5am·
@denicmarko Amazing! Cryptozombies is a tiny bit outdated now though, I'd recommend replacing it with @CyfrinUpdraft
English
0
0
0
27
Sam
Sam@_0x5am·
@infosec_us_team There's gotta be a word for when someone creates exactly what you've been dreaming of. Free and open-source too. Cannot wait to try this. We really don't deserve you guys♥️
English
0
0
1
423
kriko.eth
kriko.eth@krikoeth·
@0xmahdirostami tracking with toggle, no pomodoro, I just stare at screen for 8-12 hours 😄
English
2
0
6
310
kriko.eth
kriko.eth@krikoeth·
Had the best year again. Doubled my 2024 income over 1300 hours. 💰 Spent the last three months recharging - family time and a side project I've been building. No $$ goals for 2026. This year I want to double the HOURS. ⏰ Splitting my time: Bug bounties and the side project. Wanted to start in the new year but couldn't wait. Starting today. 🚀 Happy new year, may Devana guide you in your hunts! Time to work! 🎯
kriko.eth@krikoeth

every year so far was my best year and i want to keep it that way 2025 im gonna do more contests and less shit posting on twitter hehe Happy new year everyone 🔥

English
5
1
59
5.7K
Sam
Sam@_0x5am·
@Hcrlen I don't think I could find a bad one😅. It all depends where you're starting from and what you wanna learn.
English
0
0
1
58
0xch
0xch@Hcrlen·
@_0x5am brother can you list me some goods rareskills blog that i should read ?
English
1
0
1
71
VERITAS PROTOCOL
VERITAS PROTOCOL@veritas_web3·
@_0x5am Chris is a legend and you’re a chad for being consistent. Great job!
English
1
0
1
261
Sam
Sam@_0x5am·
@solwrrr 🫡. Cyfrin is the best place to be + learning alongside school or work is not for the weak, I'm rooting for you bro!
English
1
0
0
110
Sam
Sam@_0x5am·
@ShieldRey 6 months is still infancy in this field (especially if you don't come from a relevant field). Don't be so hard on yourself and try and not restructure your path too much/often, you will just feel like you're getting nowhere. Pick something and stay consistent.
English
1
0
1
106
၊|||!
၊|||!@ShieldRey·
@_0x5am I have done 6 months. I still feel underachieved or maybe restructure the learning path
English
1
0
1
116
chiboy
chiboy@chiboy0123·
@_0x5am Is that a roadmap
English
1
0
1
230