W.Max

42 posts

W.Max

W.Max

@_William_Max

Solidity developer for #Defi. Auditor @code4rena.

Etherum Katılım Kasım 2022
151 Takip Edilen17 Takipçiler
0xScope
0xScope@ScopeProtocol·
Affected by the @eulerfinance hack incident, some projects and individuals have also been implicated. @AngleProtocol: 0xf5ad02f3dbbf4b42dee1f1255607f929ca2a7c5a This is a USDC generic optimized lender strategy contract, with currently 17.6M $USDC still trapped in #Euler.
English
2
3
16
49.4K
nemveer
nemveer@nem_veer·
Received my payout for finding another critical bug on @immunefi 😍😎
nemveer tweet media
English
30
13
213
23.6K
W.Max
W.Max@_William_Max·
@dev_chinmayf It is a technique to interact with the liquidity pair contract directly to swap instead of using the router. in this way, you can get the output token first and then transfer the input token. It is just like flash loan, thays why we call it flashswap
English
0
0
0
36
Chinmay Farkya
Chinmay Farkya@dev_chinmayf·
An important tip while working with Uniswap V2 Router If your contract calls any of the swap functions,it leads to a transfer of tokens using safeTransferfrom the router needs to be approved for spending the caller's tokens before this swap call, otherwise it would revert
English
1
0
8
1.3K
W.Max retweetledi
Dinduz
Dinduz@CryptoDinduz·
What is $fUSD and why its development is crucial for $FTM in a Thread! 5 Minutes Reading:👇
Dinduz tweet media
English
16
85
401
53.4K
W.Max
W.Max@_William_Max·
@SlowMist_Team Oh... seems big trouble. No wonder he did not move fund into tornado cash.
English
0
0
0
838
SlowMist
SlowMist@SlowMist_Team·
7/ It is worth mentioning that after decompiling the attack contract, we found that the attacker did not implement the withdrawal function in the contract, so that the profit from the attack could not be extracted and was locked in the attack contract.
English
4
0
28
16.8K
SlowMist
SlowMist@SlowMist_Team·
On February 17, @Platypusdefi, a stablecoin exchange platform on the Avalanche chain was attacked, and the attacker made a profit of approximately $8.5 million. Here is a brief report👇
English
1
6
36
81.5K
W.Max
W.Max@_William_Max·
@immunefi 1. there must a checker to check if it is a zero-address after create2. 2. If I find a hash collision, I can deploy again by passing 2 different testPool addresses with same hash value to re deploy the contract deployed by create2. This will influence the exsisting contracts.
English
1
0
0
259
Immunefi
Immunefi@immunefi·
Our newest #spotthebugchallenge is live. But this time, whoever has a mix of the best and fastest answer will receive a brand-new Immunefi Swag Pack. We'll tag the winner of the contest once we select the answer:)
Immunefi tweet mediaImmunefi tweet media
English
22
5
51
20.8K
W.Max
W.Max@_William_Max·
@immunefi Also the poolAddr can be zero address without check (if revert)
English
0
0
0
49
W.Max
W.Max@_William_Max·
@immunefi Hey, create2 is not safe in use because the deployer can call SELFDESTRUCT and deploy again the pool to replace the former pool with another but malicious contract to steal fund.
English
1
0
0
229
W.Max
W.Max@_William_Max·
@SolidlyDEX @MonolithETH_ I used to discuss with @VelodromeFi about making a solidsex like project for them. But looking this, the veNFT shouldn't be released with any liquid token. However, still believe in solidly and you can solve it and become more solid!
English
0
0
4
1.3K
Solidly Labs
Solidly Labs@SolidlyLabs·
1/2 We are cutting all ties with @MonolithETH_ immediately. They have breached contractual agreements and community trust ❌ Needless to say, we are deeply disappointed in their conduct and condemn their theft of ecosystem incentive funds we gave them to grow. Details 👇
English
14
18
52
19.6K
W.Max
W.Max@_William_Max·
@dedaub I thought these should be eliminated by processes like dead code elimination... No wonder deplying some contracts with inheriting many standard contracts costs toooo much gas.
English
0
0
1
271
Dedaub
Dedaub@dedaub·
Heads up: the Dedaub team has discovered a Solidity compiler bug impacting a *large* number of smart contracts. The bug results in up to 90% of the deployed bytecode being "dead code", significantly increasing gas costs when deploying and operating smart contracts. 🧵 👇
Dedaub tweet media
English
21
74
330
126.6K
W.Max
W.Max@_William_Max·
@GalloDaSballo Oh this reminds me auditing codes filled with `.call`, `.delegatecall`, `.transfer`, `.balance`...
English
0
0
0
92
W.Max
W.Max@_William_Max·
@bytes032 language of course solidity. I do love using ganache + remix if I am developing some small projects. Its sooo convenient and just write test contracts in solidity. for complex ones, I prefer hardhat. and for self audting, just use slither.
English
0
0
2
232
@bytes032.xyz
@bytes032.xyz@bytes032·
EVM devs, what does your go-to “tech stack” look like? Favorite solidity libraries, frameworks, tooling (cli and web-based), service providers, etc.
English
35
15
192
63.1K
W.Max
W.Max@_William_Max·
@immunefi @PwningEth best honor for a whitehat. I wish to have one some day. Its awesome
English
0
0
0
262
Immunefi
Immunefi@immunefi·
Big news today... @PwningEth just received his THIRD Whitehat Hall of Fame card for his crit report in Moonbeam / Astar / Acala, which saved $200m in funds and earned him a $1m payout. He can't keep getting away with it... Read more here: medium.com/immunefi/pwnin…
English
5
13
123
39.7K