vi
923 posts

vi
@_vielite_
22| Hacker | ctf player for @infobahn_ctf


Another Rare approved. @0xK42 flags rounding asymmetry in share debt conversion flows. Query below:





His first paid report was $300. His second paid report was $100,000. This is how legends are made. Welcome to the security researcher community, oct0pwn.



Congrats to BBB for winning the CFO to DEF CON CTF! We have no doubt that with talents from @PlaidCTF, we will see the competition continue to push boundaries and inspire the community. We wish BBB and DEF CON all the best for the upcoming editions of DEF CON CTF!






One of the biggest bounties I've earned came from a vulnerability that most auditors would have never found. Not because it was deeply complex. Because it wasn't where anyone was looking. The vulnerability didn't exist in the GitHub version of the smart contract. It only existed in the on-chain deployed contracts. The code that was actually live, holding real funds. Most auditors only review the GitHub repo. That's the standard scope. But the deployed contract can differ. Different constructor arguments. Post-deployment configurations. State changes after initialization. I found it because I wasn't randomly scrolling through code. I chose one specific impact I wanted to test for: drain of funds. Then I worked backwards. Where does the money flow? Which functions move funds? What checks exist on those paths? I audited both the GitHub repo and the on-chain contracts. The discrepancy between them is where the critical was hiding. The methodology is simple. Pick the worst-case impact. Trace every path that could lead there. Audit both the repo and what's actually deployed. The GitHub repo is a draft. The on-chain contract is what attackers see. Audit both.


@claudeai Impressive. Very nice. Now do this, but for smart contracts











