Auditware

769 posts

Auditware banner
Auditware

Auditware

@audit_wizard

Industry leading OpSec audits, security tools, and code reviews performed by true security wizards

Katılım Ağustos 2022
516 Takip Edilen2.7K Takipçiler
Sabitlenmiş Tweet
Auditware
Auditware@audit_wizard·
In 2022, we performed one of the first ever OpSec audits for a web3 company, pulling from over 7 years of experience securing the most sensitive and high value teams at companies like Apple and Amazon. We built a bespoke audit process from the ground up that covers all of the weak points that code and infra audits don't. Over the past 4 years we've reviewed OpSec for VCs, startups, mature companies, and teams ranging from 5 people to 50+. Including crypto-adjacent orgs with no on-chain presence, and crypto-native orgs with dozens of multi-sigs and hot wallets. We started with ad-hoc reviews tailored to each organization: Meet with the team to ask all the questions we could think of, build a threat model, and write a report highlighting risks and recommending mitigations. But we quickly learned that, while there are unique risks each team faces, much of the topics we covered were shared between orgs. We wrote guides for securing Discord servers, Twitter/X accounts, email servers, and developed both targeted and generalized trainings for whole teams. We also learned that these audits ran most smoothly with some sort of structure in place to define what each meeting should cover, who we needed to talk to in the org, and when we knew we were done. And when we spoke about OpSec to teams they didn't have a solid understanding of what it even meant or what the scope included. We built a very detailed internal process and set of resources outlining all of this. Since then, we've taken that internal playbook and refined it across multiple audits, each with their own unique risks and challenges. But this was something we felt we could not keep to ourselves. Last year, we converted that playbook into a comprehensive set of requirements, guides, and tools - all open source and free for anyone to use. We called it the Web3 OpSec Standard (W3OS). What sets W3OS apart from other OpSec resources is that it aggregates a comprehensive set of guidance into one place; presents everything as actionable checklists; and provides concrete guides for configuring platforms, setting up secure development environments, and training teams to stay secure. This year, we've also started building tools to support these guides and requirements and enable teams to take their OpSec seriously without having to build complex monitoring tools themselves. Auditware has been doing OpSec audits for over 10 years, we wrote the book on web3 OpSec, and we continue to build open source public goods for tackling OpSec issues because we truly believe that our industry cannot thrive without preventing the many, easily preventable security failures we have seen over the years. We highly encourage everyone to put these resources to good use and tighten up your OpSec before you have an incident! The best way to get started with this is making an account on our free OpSec collaboration platform platform, Sentry, which allows you to navigate W3OS requirements and guides with ease, track tasks across your team, and set up monitoring tools: sentry.auditware.io
English
2
3
9
499
Auditware
Auditware@audit_wizard·
We're sharing our ShieldFlow audit report. 👇 One curl request to a public endpoint returned live auth tokens, encryption keys, and internal infrastructure secrets. This was not a smart contract bug. It was a web2 misconfiguration. The gap most audits miss is that Web3 protocols run on Web2 infra. Auditing the full stack is the only way to know what you are actually exposed to. 🕵️‍♂️ 10 critical and high severity findings which they fixed in record time! github.com/Auditware/audi…
English
1
0
1
233
Auditware retweetledi
forefy
forefy@forefy·
For all the auditors getting scared by this contests market shift - let me walk you through bugonomics history 🐛🪨⏬ 1⃣9⃣9⃣5⃣ Netscape (old browser) paid researchers for bugs which was radical at the time 2⃣0⃣1⃣2⃣ @Hacker0x01 and @Bugcrowd dominated the bounty space and no notion of contests they had private invite-only events which is close, but a contest model didn't fit large web2 companies e.g. Uber Airbnb etc - don't want 500 hackers hammering their servers at a single week 2⃣0⃣2⃣1⃣ @code4rena realized that contests are of different nature: - Smart contracts store loads of money directly, and get hacked like crazy - Smart contracts are "immutable" - once deployed must find bugs before launch - Open source means auditor can fully understand logic, not just probe blindly - More auditor attention, better results For protocols - contests costs more than bounty Let's think like a protocol for a second 🤔 contest = coverage, more eyes, pre-launch safety net - Pay $200k pool upfront - Runs 1-4 weeks - Payout regardless of findings quality (money still gone) bounty = sparse coverage, reactive not proactive - Pay $0 until valid bug reported - Only pay on confirmed severity - Treasury preserved until hit in bull markets - protocols don't want to get hacked, they spend what they can (contests + bounty after) in bear markets - same, but now protocols have no funds - bounty is cheaper 2⃣0⃣2⃣5⃣ bear market gets worse, AI spamming submissions left and right making triaging costs increase exponentially 2⃣0⃣2⃣6⃣ even worse - still bear market, MORE (way more) AI and there are less new protocols on top of it all That's why today we are back to web2-style bounties. The protocols that make real money, real impact. In 2015 people made a living of web2 bounties, this ain't different @immunefi @HackenProof @xyz_remedy all are live and kicking, and there's money on the table for you to take, harder than before, true - but since when hard stopped us?
forefy@forefy

🚨🚨 DAILYWARDEN IS DOWN 🚨🚨 DAILYWARDEN IS DOWN 🚨🚨 DAILYWARDEN IS DOWN!!! I guess we are all officially transitioning back to bounties now 😈😈 dailywarden.com Here's where I'd go to next 👇 hackenproof.com/programs?langu… immunefi.com/bug-bounty/?fi…

English
2
3
21
2K
Auditware
Auditware@audit_wizard·
Huge thanks to @Giveth for having us in the Ethereum Security QF Final Project Showcase 🛡️ Today is the LAST DAY to donate and every donation is matched! The projects in this round are building the security layer Ethereum runs on, and W3OS is one of them, bringing free practical and accessible OpSec tooling to web3 teams that need it. If you believe in a safer web3, now's the time to act 👇 W3OS: giveth.io/project/the-we… Full round: qf.giveth.io/qf/ethereum-se…
English
1
2
11
372
Auditware
Auditware@audit_wizard·
We're very sad to hear this news. C4 were the first innovators that really paved the way for solving the unique challenges of web3 in a way that the industry really needed. Thanks for all of the years of keeping projects secure and launching security researchers' careers 🫡
Code4rena@code4rena

After careful consideration, we’ve made the decision to wind down @code4rena. This community has meant a great deal to everyone who has been part of building it, and sharing this news is not easy.

English
0
0
11
354
Auditware
Auditware@audit_wizard·
In 2022, we performed one of the first ever OpSec audits for a web3 company, pulling from over 7 years of experience securing the most sensitive and high value teams at companies like Apple and Amazon. We built a bespoke audit process from the ground up that covers all of the weak points that code and infra audits don't. Over the past 4 years we've reviewed OpSec for VCs, startups, mature companies, and teams ranging from 5 people to 50+. Including crypto-adjacent orgs with no on-chain presence, and crypto-native orgs with dozens of multi-sigs and hot wallets. We started with ad-hoc reviews tailored to each organization: Meet with the team to ask all the questions we could think of, build a threat model, and write a report highlighting risks and recommending mitigations. But we quickly learned that, while there are unique risks each team faces, much of the topics we covered were shared between orgs. We wrote guides for securing Discord servers, Twitter/X accounts, email servers, and developed both targeted and generalized trainings for whole teams. We also learned that these audits ran most smoothly with some sort of structure in place to define what each meeting should cover, who we needed to talk to in the org, and when we knew we were done. And when we spoke about OpSec to teams they didn't have a solid understanding of what it even meant or what the scope included. We built a very detailed internal process and set of resources outlining all of this. Since then, we've taken that internal playbook and refined it across multiple audits, each with their own unique risks and challenges. But this was something we felt we could not keep to ourselves. Last year, we converted that playbook into a comprehensive set of requirements, guides, and tools - all open source and free for anyone to use. We called it the Web3 OpSec Standard (W3OS). What sets W3OS apart from other OpSec resources is that it aggregates a comprehensive set of guidance into one place; presents everything as actionable checklists; and provides concrete guides for configuring platforms, setting up secure development environments, and training teams to stay secure. This year, we've also started building tools to support these guides and requirements and enable teams to take their OpSec seriously without having to build complex monitoring tools themselves. Auditware has been doing OpSec audits for over 10 years, we wrote the book on web3 OpSec, and we continue to build open source public goods for tackling OpSec issues because we truly believe that our industry cannot thrive without preventing the many, easily preventable security failures we have seen over the years. We highly encourage everyone to put these resources to good use and tighten up your OpSec before you have an incident! The best way to get started with this is making an account on our free OpSec collaboration platform platform, Sentry, which allows you to navigate W3OS requirements and guides with ease, track tasks across your team, and set up monitoring tools: sentry.auditware.io
English
2
3
9
499
Auditware
Auditware@audit_wizard·
We're joining @Giveth's Ethereum Security QF showcase tomorrow Wednesday, May 13th 🛡️ We built W3OS an open-source OpSec standard for web3 teams to lock down their operations without needing security expertise or expensive audits. Donations are matched. Come watch, then support! 👇 giveth.io/project/the-we…
Giveth@Giveth

The Ethereum Security QF round is almost at the finish line 🛡️ Join us for the final project showcase before the round closes and hear from the teams working to make Ethereum safer. Still deciding who to support? This is the Space to join x.com/i/spaces/1RKjp…

English
0
1
6
264
Giveth
Giveth@Giveth·
The Ethereum Security QF round is almost at the finish line 🛡️ Join us for the final project showcase before the round closes and hear from the teams working to make Ethereum safer. Still deciding who to support? This is the Space to join x.com/i/spaces/1RKjp…
English
1
7
38
2.5K
Auditware
Auditware@audit_wizard·
New facelift to the multisigmonitor repo! Marketing asked our CTO @forefy for a logo We were going for "trustworthy multisig monitor" He delivered a purple octopus with demonic red eyes clutching security padlocks on its tentacles that stares into your soul 🐙 Everyone warns about non-techies using AI dangerously. Nobody warns us about CTOs using it for design.
Auditware tweet media
English
2
0
5
406
Auditware retweetledi
forefy
forefy@forefy·
🚨🚨 AI triagers are screening our bug submissions before a human even sees them. I reverese-engineered triage skills like @HackenProof 's hackenproof-bulk-triage to answer what gets your reports downgraded and HOW TO AVOID IT 👇👇
English
2
3
40
2.7K
Auditware
Auditware@audit_wizard·
Thank you @thedaofund 💜 AuditWare has been at the forefront of Web3 OpSec since 2022. W3OS covers everything we've learned: key management, infrastructure access controls, phishing-resistant authentication, and secure communications. Help us keep the ecosystem safe through our extensive guides and open source tools, all part of W3OS and all free to use! Donate 👉 qf.giveth.io/project/the-we… Explore W3OS 👉 github.com/W3OSC/web3-ops…
thedao.fund@thedaofund

Operational security is the leading cause of hacks these days. We need a shared standard to apply across our industry and @audit_wizard is building it. Learn more: youtube.com/watch?v=8EMlOl… Support: qf.giveth.io/project/the-we…

English
0
2
5
371
Auditware
Auditware@audit_wizard·
🚨 @hackenclub Q1 2026 report: $482M lost across 44 incidents. Resolv Labs completed 18 security audits before losing $25M. The attacker never touched the smart contracts, they compromised AWS keys and drained the treasury. Access control failures (compromised keys and cloud services) cost $72M in Q1, nearly matching the $86.2M from smart contract exploits. Phishing and social engineering added another $306M. We've been performing OpSec audits since 2022, covering key management, access controls, MFA configuration, multisig policies, and infrastructure hardening. W3OS codifies what we've learned into an open-source standard. Book a free 1-hour OpSec training session with us. We'll walk through your current setup and identify what's missing. 🔒 auditware.io/opsec-training
English
0
0
3
287
Auditware
Auditware@audit_wizard·
Multisigmonitor tracks every treasury transaction: who signed, what got approved, and flags anomalies in real-time. Whether it's an AI agent or a compromised admin, unauthorized transfers get caught. Free and open source! 🕵️‍♂️ msm.w3os.org
English
0
0
1
125
Auditware
Auditware@audit_wizard·
AI agents need the same guardrails your team does: multisig approval requirements, transaction limits, authorization policies. Without those controls, a prompt can become an exploit.
English
2
0
1
121
Auditware
Auditware@audit_wizard·
@grok lost $175k+ in $DRB tokens yesterday through a multi-layered prompt injection attack. An attacker gifted an NFT that unlocked Bankr transfer tools, then embedded code that obfuscated the transfer command and used Morse code to instruct withdrawal. h/t @Phineas_Sol
Auditware tweet media
English
1
0
8
413