tequ {X}🪝

9.4K posts

tequ {X}🪝 banner
tequ {X}🪝

tequ {X}🪝

@_tequ_

XRP Ledger Protocol Ecosystem Developer

Japan Katılım Eylül 2017
520 Takip Edilen4.8K Takipçiler
tequ {X}🪝 retweetledi
Cbot 🏴‍☠️
Cbot 🏴‍☠️@Cbot_Xrpl·
@XahauNetwork Let’s discuss royalties. I would like to see royalty functionality on #Xahau. I believe the key components of this feature should be accessibility for users and developers, lightweight on-chain costs, and consistent functionality at a broad scale. It’s my take that native royalties are a better option than hook stacks that vary across the chain. Having a native transfer fee (and fee recipient field) would open doors for Xahau users while not limiting anyone’s ability to build custom broker or royalty stacks. #discussion-9665043" target="_blank" rel="nofollow noopener">github.com/Xahau/xahaud/d…
English
2
6
12
1K
tequ {X}🪝 retweetledi
Ekiserrepé {X}
Ekiserrepé {X}@ekiserrepe·
I added a small front-end for people who aren’t coders but want to understand what Hooks and on-chain really mean. No database, just the ledger providing the data. It looks like Web2 to you, but Xahau is actually handling your collection on-chain. nft.xahau.love
Ekiserrepé {X} tweet media
Ekiserrepé {X}@ekiserrepe

🚀 New article in the Learning Xahau series! Learn how to build an automatic NFT factory using Hooks. A Xahau account that mints NFTs automatically when it receives the correct payment, no backend, no servers, just on-chain logic. dev.to/ekiserrepe/lea…

English
2
9
28
1.4K
tequ {X}🪝
tequ {X}🪝@_tequ_·
As a general rule, if bug bounty rewards are too low, researchers may become critical of the ecosystem despite having helped it. Naturally, the opportunity for that researcher to discover the next bug will be lost.
f4lc0n@al_f4lc0n

I Saved Injective's $500M. They Pay Me $50K. I like hunting bugs on @immunefi . I'm decent at it. - #1 — Attackathon | Stacks - #2 — Attackathon | Stacks II - #1 — Attackathon | XRPL Lending Protocol - 1 Critical and 1 High from bug bounties (not counting this one) Life was good. Then I found a Critical vulnerability in @injective . This vulnerability allowed any user to directly drain any account on the chain. No special permissions needed. Over $500M in on-chain assets were at risk. I reported it through Immunefi. The next day, a mainnet upgrade to fix the bug went to governance vote. The Injective team clearly understood the severity. Then — silence. For 3 months. No follow up. No technical discussion. Nothing. A few days ago, they notified me of their decision: $50K. The maximum payout for a Critical vulnerability in their bug bounty program is $500K. I disputed it. Silence again. No explanation for the reduced payout. No explanation for the 3 month ghost. No conversation at all. To be clear: the $50K has not been paid either. I've seen others share bad experiences with bug bounty payouts recently. I never thought it would happen to me. I can't force them to do the right thing. But I won't let this be forgotten. I will dedicate 10% of all my future bug bounty earnings to making sure this story stays visible — until Injective pays what I deserve. Full Technical Report: github.com/injective-wall…

English
2
7
21
5.2K
tequ {X}🪝
tequ {X}🪝@_tequ_·
@nabe3_m dAppsは(少なくとも長期的には)複数ウォレット対応することを望むということを仮定すると、こちらのライブラリのTipsの方が長期的に有用なものになるかもしれません github.com/XRPL-Commons/x… Xaman SDKだけだとどこかのタイミングで他のウォレット統合の壁にぶつかるので
日本語
2
3
14
2.8K
Nabe {X} / XRPL Japan
まずいな…そろそろXaman SDKの実装Tipsをまとめるべきだと思う ここだけでバイブコーダー全滅しそう
日本語
1
0
9
917
tequ {X}🪝 retweetledi
InFTF
InFTF@IncFinTech·
A reminder that we maintain an archive of github repositories from the Xahau and XRPL ecosystem at git.inftf.org/ARCHIVE . We are open to suggestions on adding more!
English
2
13
30
2.5K
tequ {X}🪝
tequ {X}🪝@_tequ_·
@DhalXrp あ、ほんとですね。 livenet.xrpl.org でも利用されているので、もしかしたら一時的なものかもしれません
日本語
1
0
1
139
ダル
ダル@DhalXrp·
@_tequ_ 今落ちてるっぽいですね。。。REST API叩いてもトークン情報が出ないですわ。。。
日本語
1
0
0
90
ダル
ダル@DhalXrp·
IOUトークンのアイコンを取得するAPIって公開されてたりすんのかな
日本語
1
0
0
1K
tequ {X}🪝 retweetledi
Evergram
Evergram@evergramhq·
Evergram is live. Fully encrypted messaging for Web3. No central message database. End-to-end encryption by default. Try it via Xaman xApp or web: evergram.app
Evergram tweet media
English
30
68
215
59.4K
tequ {X}🪝 retweetledi
Max
Max@krkmu_·
Introducing XRPL Monday Brew ☕ Every Monday, get a clear summary of what happened across #XRPL development: what merged, what's in progress, and what to watch next. Built from real GitHub data across all XRPLF repos (rippled, client libraries, docs...). Written for developers and non-developers alike ✨ First brew is live → xrplbrew.com
English
13
28
136
18.9K
tequ {X}🪝 retweetledi
XRPLWin
XRPLWin@XRPLWin·
What if you could search over billions and billions of XRPL transactions in seconds. That is exactly what we had been preparing for you in 2026 with easy query interface, and not limited to transactions only. Our new datasets will provide aggregated metrics, token metrics, balances, activations, ledgers, NFTs, … just to name few. Engine will be directly integrated into explorer and expand upon limitations of XRPL search.
English
6
32
108
7K
tequ {X}🪝 retweetledi
Joel Mun
Joel Mun@9oelM·
I built a 'proper' CLI for XRPL, finally. It’s wild that after 10+ years, the XRP Ledger still hasn't had a proper, developer-first CLI. Power users have been stuck writing custom scripts for basic tasks. Until now. Now there's xrpl-cli-ng. It brings everything from wallet management, standard payments to DIDs and Multi-Purpose Tokens into a single terminal interface. In the age of AI agents, a robust CLI is more critical than ever. Agents don't need shiny buttons; they just need a bridge to the ledger. xrpl-cli-ng is that bridge. I'm planning to add xrpl-cli-ng skills so that agents can use the CLI properly. The software is currently in Alpha. Use with extreme caution on mainnet (I see some AMM tests are failing), if you want to. github.com/9oelM/xrpl-cli… npmjs.com/package/xrpl-c… Personally, it has been the first large-scale project where I used @claudeai and @ryancarson's Ralph for 99% of the things. Doesn't mean it's an AI slop. So far the repository has 799 tests, most of which are E2E tests that cover the actual functionalities. Will share more insights on AI-centric development later too. Let's go XRPL
English
31
67
279
43.3K
tequ {X}🪝
tequ {X}🪝@_tequ_·
I feel some users in the ecosystem are misunderstanding that this feature is intended also for general consumers. Essentially, this feature requires off-chain trust in the borrower/broker. If funds are lent to an untrustworthy party, any amount exceeding what is covered by the first-loss capital could potentially be stolen. Given there was the issue with the Batch, it will likely take some time before it's enabled. I think we need to educate the ecosystem so that people don't get deceived by malicious actors.
English
0
0
0
136
tequ {X}🪝 retweetledi
Honeycluster 🐝
Honeycluster 🐝@HoneyclusterX·
Big day! Honeycluster just went live! We're launching public infrastructure services for developers building on the XRP Ledger. Starting today, public endpoints are available: Mainnet RPC — honeycluster.io WS — wss://honeycluster.io Testnet RPC — testnet.honeycluster.io WS — wss://testnet.honeycluster.io Devnet RPC — devnet.honeycluster.io WS — wss://devnet.honeycluster.io If you're building on XRPL, come check it out. This is just the beginning.
Honeycluster 🐝 tweet media
English
43
146
541
125K
tequ {X}🪝
tequ {X}🪝@_tequ_·
Over the past few months, several vulnerabilities of the worst severity have been discovered. Fortunately, they were found before being activated on the mainnet. Luck does not last forever. Should we really continue to move forward as we are now?
Daniel "CEO of the XRPL" Keller@daniel_wwf

Statement on dUNL Responsibilities and my position following the Batch amendment incident (XLS-56) Over the past weekend, in spaces and in several DM conversations regarding the recent Batch amendment issue (widely referred to as BatchGate), I have seen widespread confusion about the actual role and responsibilities of dUNL validators. I want to provide clarity from my perspective as a long-standing operator, along with the conclusions I have reached. The role of dUNL validators is specific and limited: We coordinate the activation (or rejection) of amendments by casting “Yay” or “Nay” votes once an amendment is proposed. We are supposed to judge pending amendments. That is our primary governance function. The baseline expectations for anyone on the dUNL are straightforward technical competencies: - Deep understanding of how rippled works - Operational experience running and maintaining rippled nodes - Solid knowledge of decentralised network principles - Ability to debug issues quickly - Proactive mindset to identify risks before they materialise Importantly, dUNL participation is uncompensated. The principle “no incentive is the best incentive” has always guided consensus security, and I fully support it. I run my validator as a service to the network because I believe I am well-positioned to help protect its long-term health and uptime, better than the vast majority of voices in the ecosystem. I have repeatedly pushed back against Ripple when I believed it was in the network’s best interest, and I will continue to do so. Ripple’s corporate objectives are not always aligned with the XRPL’s security and decentralisation priorities. My success metric is simple: 100% uptime and preventing issues, not their resolution after the fact. The dUNL is not a free code-review or protocol-auditing body. Expecting validators to spend dozens of unpaid hours reviewing complex amendment code was never part of the design and never will be. Instead, parties proposing amendments should be required to deliver comprehensive documentation, test suites, security analyses, and formal proofs upon request. If you want my vote, prove the change is safe and beneficial. I have applied this standard consistently for years. However, requiring proposers to ask them to review their own code is simply not enough. We need more eyes and hands on the code. Past warnings ignored. Over the last five years, I have publicly flagged serious concerns with several high-impact amendments, including XLS-20 (NFTs), XLS-30 (AMM), and now XLS-56 (Batch). In every case, my concerns proved valid. Despite this track record, the pattern has not changed: proposals continue to advance with insufficient scrutiny, and public discourse rarely engages with the actual technical risks. The recent critical vulnerability in XLS-56, which could have allowed unauthorised transaction execution and potential fund drainage, is the latest and most serious example. The fact that it reached the voting stage on mainnet before being caught, and that public disclosure by an independent researcher and an AI tool was ultimately required to prevent harm, highlights a systemic failure in review processes. By public opinion, this issue rests with the amendment’s authors and the dUNL. Meanwhile, formal verification and AI are being pitched as the complete solution, as the holy grail. This is unacceptable. My actions moving forward, effective immediately: - Withdrawing all current “Yay” votes on every amendment under consideration (excluding pending fixes) - Refusing to upgrade to rippled 3.1.1 (unless staying on the prior version risks removal from the network) I will not vote in favour of any future amendments until Ripple makes a credible, concrete commitment to substantially increase investment in XRPL core protocol engineering, security review, and long-term sustainability. I am pinning this on Ripple as no well-funded alternative exists in the ecosystem as of today. If XRP is truly Ripple’s “North Star,” as repeatedly stated, then the network’s foundational security and decentralisation must receive the attention and resources they deserve. A fintech company positioning itself at the centre of future finance cannot afford to under-invest in the very ledger that powers its vision. A fancy blogpost with made-up numbers is not enough. I remain fully committed to the XRPL’s success and will continue to operate my validator to the highest standards of reliability. However, I will no longer participate in a governance process that repeatedly accepts elevated risk without corresponding accountability. The network’s security and longevity must come first. Always.

English
7
9
57
4.4K
tequ {X}🪝
tequ {X}🪝@_tequ_·
If the number of chains based on the XRPL protocol increases, it means we'll have more developers who are well-versed in the xrpld code. Xahau is one of those chains, but it doesn't necessarily have to be Xahau specifically. Rather than focusing on XRPL mainnet to EVM sidechains, we should be pushing more for connections between the XRPL mainnet and XRPL protocol-based sidechains.
English
1
0
5
135
Cbot 🏴‍☠️
Cbot 🏴‍☠️@Cbot_Xrpl·
@_tequ_ The #XRPL is not a test ground and needs to slow down. Experimental amendments and technology should be running on sidechains like #Xahau or EVM.
English
1
0
7
133
tequ {X}🪝
tequ {X}🪝@_tequ_·
This isn't the first time something like this has happened to us; it's the second time. I don't think there have been any major changes since the first occurrence. Validators are voting on new features just as they always have, and I've been asked by the community many times why you wouldn't vote.
English
2
0
10
278
🔥Kris Dangerfield
🔥Kris Dangerfield@krisdangerfield·
I have said several times over the weekend, we got lucky. It's time to recognise that, celebrate it and then importantly put in place changes so that next time luck is not part of the equation. The answer is a combination of more developer resources, new tooling (such as advanced ai) and recognition from everyone that change needs to be managed carefully and thoughtfully without going too negative and being scared from making progress at all.
English
3
0
7
352
tequ {X}🪝 retweetledi
Daniel "CEO of the XRPL" Keller
Statement on dUNL Responsibilities and my position following the Batch amendment incident (XLS-56) Over the past weekend, in spaces and in several DM conversations regarding the recent Batch amendment issue (widely referred to as BatchGate), I have seen widespread confusion about the actual role and responsibilities of dUNL validators. I want to provide clarity from my perspective as a long-standing operator, along with the conclusions I have reached. The role of dUNL validators is specific and limited: We coordinate the activation (or rejection) of amendments by casting “Yay” or “Nay” votes once an amendment is proposed. We are supposed to judge pending amendments. That is our primary governance function. The baseline expectations for anyone on the dUNL are straightforward technical competencies: - Deep understanding of how rippled works - Operational experience running and maintaining rippled nodes - Solid knowledge of decentralised network principles - Ability to debug issues quickly - Proactive mindset to identify risks before they materialise Importantly, dUNL participation is uncompensated. The principle “no incentive is the best incentive” has always guided consensus security, and I fully support it. I run my validator as a service to the network because I believe I am well-positioned to help protect its long-term health and uptime, better than the vast majority of voices in the ecosystem. I have repeatedly pushed back against Ripple when I believed it was in the network’s best interest, and I will continue to do so. Ripple’s corporate objectives are not always aligned with the XRPL’s security and decentralisation priorities. My success metric is simple: 100% uptime and preventing issues, not their resolution after the fact. The dUNL is not a free code-review or protocol-auditing body. Expecting validators to spend dozens of unpaid hours reviewing complex amendment code was never part of the design and never will be. Instead, parties proposing amendments should be required to deliver comprehensive documentation, test suites, security analyses, and formal proofs upon request. If you want my vote, prove the change is safe and beneficial. I have applied this standard consistently for years. However, requiring proposers to ask them to review their own code is simply not enough. We need more eyes and hands on the code. Past warnings ignored. Over the last five years, I have publicly flagged serious concerns with several high-impact amendments, including XLS-20 (NFTs), XLS-30 (AMM), and now XLS-56 (Batch). In every case, my concerns proved valid. Despite this track record, the pattern has not changed: proposals continue to advance with insufficient scrutiny, and public discourse rarely engages with the actual technical risks. The recent critical vulnerability in XLS-56, which could have allowed unauthorised transaction execution and potential fund drainage, is the latest and most serious example. The fact that it reached the voting stage on mainnet before being caught, and that public disclosure by an independent researcher and an AI tool was ultimately required to prevent harm, highlights a systemic failure in review processes. By public opinion, this issue rests with the amendment’s authors and the dUNL. Meanwhile, formal verification and AI are being pitched as the complete solution, as the holy grail. This is unacceptable. My actions moving forward, effective immediately: - Withdrawing all current “Yay” votes on every amendment under consideration (excluding pending fixes) - Refusing to upgrade to rippled 3.1.1 (unless staying on the prior version risks removal from the network) I will not vote in favour of any future amendments until Ripple makes a credible, concrete commitment to substantially increase investment in XRPL core protocol engineering, security review, and long-term sustainability. I am pinning this on Ripple as no well-funded alternative exists in the ecosystem as of today. If XRP is truly Ripple’s “North Star,” as repeatedly stated, then the network’s foundational security and decentralisation must receive the attention and resources they deserve. A fintech company positioning itself at the centre of future finance cannot afford to under-invest in the very ledger that powers its vision. A fancy blogpost with made-up numbers is not enough. I remain fully committed to the XRPL’s success and will continue to operate my validator to the highest standards of reliability. However, I will no longer participate in a governance process that repeatedly accepts elevated risk without corresponding accountability. The network’s security and longevity must come first. Always.
English
51
57
248
63.8K