Auditware

705 posts

Auditware banner
Auditware

Auditware

@audit_wizard

Industry leading OpSec audits, security tools, and code reviews performed by true security wizards

Katılım Ağustos 2022
507 Takip Edilen2.6K Takipçiler
Sabitlenmiş Tweet
Auditware
Auditware@audit_wizard·
Announcing our latest product: Sentry Sentry is a platform for continuously monitoring OpSec for web3 organizations W3OS compliance, security training, domain monitoring, credential leakage alerts, GitHub repo compromise detection, and our own custom EDR - all in one platform
Auditware tweet media
English
3
4
17
1.9K
Auditware retweetledi
forefy
forefy@forefy·
🚨🚨 WATCH ME VIBE-AUDIT A SMART CONTRACT > end-to-end without an IDE > from skills and prompts to a google doc report > result report and repo below ▶️ youtube.com/watch?v=5jcZ85… I didn't risk my auditing career posting this just to have fun with prompts. This is a social demonstration of the power that's at hand of the new version of our adversaries. I literally just sat down and showed you a summarized way of my first 15 minutes starting an audit (before the first coffee ends) - it's obviously not enough for a professional audit, not even close, it's a really good starting point though (still have an entire week after that in industry timelines). I want you all to start interacting with code like this, exploring it through the agents, asking questions, creating creative skills and gain more and more ways of asking the right questions and improve and learn always Skills I've used can all be found at the Auditor Skill Registry: ✨ forefy.com/skills Skills used (other than the ones under github.com/forefy/.context): - solidity-auditor by @pashov github.com/pashov/skills - security-auditor by @archethect github.com/Archethect/sc-… - hackenproof-triage-marketplace by @HackenProof github.com/hackenproof-pu… - web3-poc-foundry by @shuvonsec github.com/shuvonsec/web3… - code-sleuth by @ZeroCool_AI github.com/zerocoolailabs… Repo and Report: github.com/forefy/vulnvau… Would've used much more, but wanted to make this fit under a 15 minutes video and improvised what came to mind at the moment ▶️ youtube.com/watch?v=5jcZ85… Please repost, comment, share and raise awareness for what's coming!
YouTube video
YouTube
English
6
5
51
5.1K
Auditware
Auditware@audit_wizard·
Oracle manipulation exploits like this often succeed when liquidity checks are absent and price feeds lack deviation monitoring. Common safeguards include liquidity thresholds, median aggregation across sources, and circuit breakers for anomalies. quillaudits.com/blog/hack-anal…
English
0
0
1
90
Auditware
Auditware@audit_wizard·
The attacker bought 0.05 USTRY for $106.74 in a market with under $1 hourly volume, inflating the price 100x. This manipulated price fed into the oracle, valuing their 153k USTRY at $16M instead of $160k, which let them borrow $1M USDC and 61M XLM before exiting as prices fixed.
English
1
0
1
112
Auditware
Auditware@audit_wizard·
YieldBlox on Stellar lost $10.97M on Feb 22 through oracle manipulation. An attacker exploited an illiquid collateral market to inflate asset prices, allowing them to borrow against the manipulated valuation. They manipulated it due to the pool’s low volume.
Auditware tweet media
English
1
0
4
338
Auditware
Auditware@audit_wizard·
While initially run on a test account, in the real use case, the context was too large and compaction resulted in a truncation of the protections in the prompt. This is a great reminder that, even if you think you know how AI will behave, it is ultimately non-deterministic.
English
0
0
2
107
Auditware
Auditware@audit_wizard·
A Meta security researcher ran an OpenClaw AI agent on her inbox with one rule: confirm before deleting anything. The agent lost the instruction and started deleting emails until the process was stopped. x.com/summeryue0/sta…
Summer Yue@summeryue0

Nothing humbles you like telling your OpenClaw “confirm before acting” and watching it speedrun deleting your inbox. I couldn’t stop it from my phone. I had to RUN to my Mac mini like I was defusing a bomb.

English
1
2
4
381
Savant.chat
Savant.chat@savantchat·
@audit_wizard auditing the contract is the easy part. auditing the key management, the deploymet pipeline, and the dependency tree is where most teams have zero coverage
English
1
0
1
25
Auditware
Auditware@audit_wizard·
Web3 exploits hit billions in losses last year, but the attack surface is shifting. Compromised keys, malicious dependencies, and social engineering now cause more losses than reentrancy bugs. Here's what's actually getting exploited:
English
2
1
11
648
Auditware retweetledi
forefy
forefy@forefy·
🪐 Livestream tomorrow 📻🎙️ to share thoughts about the recent AI auditing changes Hype is only usefull if the right people step up to channel it to practical secure and professional flows that will shape our future Set an alarm ⏰ ⏰ and don't miss it!
QuillAudits@QuillAudits_AI

Hot take: AI might be the biggest thing to happen to smart contract security or it might be the most overhyped tool since static analyzers. We are finding it out tomorrow, joining us are @forefy, @d0rsky, @iampeersky and Siddharth! What - AI vs Hackers: The Future of Smart Contract Auditing Wen - 10th March | 3:30 PM UTC | LIVE on X

English
0
1
5
347
Auditware retweetledi
forefy
forefy@forefy·
Being the 1st public auditing skills author I can share this: •⁠ ⁠AI can't write skills as well as actual auditors •⁠ ⁠Over-verbose skills (e.g more than 5000 tokens a page) are creating context rot •⁠ ⁠Installing other people's skills is much scarier than npm install I solved this by utilizing my profile site to host the Auditor Skills Registry •⁠ ⁠Skills I personally use (including skills from @pashov , @trailofbits , @QuillAudits_AI , @auditmos myself etc.) •⁠ ⁠Security reviewed, guardrails, AI reliance rating •⁠ ⁠Easy and secure 1-click installation to claude code / copilot cli / gemini cli / codex IMPORTANT: Like or repost if you plan on using it, to let me know if I should keep it live: forefy.com/skills
forefy tweet media
English
5
9
74
6.5K
Auditware
Auditware@audit_wizard·
Sentry and Multisigmonitor are built for this. Free and open source: auditware.io
English
0
0
2
65
Auditware
Auditware@audit_wizard·
The real threats: * Compromised accounts deploying malicious upgrades * Dev machines with leaked keys and env files * AI assistants suggesting poisoned packages * Forgotten token approvals These are the things code audits don't include.
English
1
0
2
78
Auditware
Auditware@audit_wizard·
Protect yourself: * Lock your package dependencies to known-good versions * Scan packages with Socket before installing * Keep sensitive keys off dev machines entirely Full technical breakdown: socket.dev/blog/sandworm-…
English
0
0
3
138
Auditware
Auditware@audit_wizard·
The attack works through AI coding assistants like Cursor and GitHub Copilot; they suggest malicious packages during development, devs blindly install them, and the worm gets full access to local files and environment variables. Automated infection through AI-suggested tools.
English
1
1
4
178
Auditware
Auditware@audit_wizard·
A new supply chain malware, SANDWORM_MODE is spreading through npm packages right now via poisoned AI recommendations. 19+ malicious packages are stealing crypto private keys, CI/CD secrets, and API keys from developer machines.
English
1
0
7
301
Auditware
Auditware@audit_wizard·
Radar is free and open source. Hunt for vulnerabilities at scale with shared detectors across Solidity and Rust contracts. github.com/Auditware/radar
English
0
0
4
199
Auditware
Auditware@audit_wizard·
The new EVMbench from OpenAI + Paradigm finds 70%+ of critical smart contract bugs in benchmarks. If attackers have this, assume automated vulnerability discovery is happening at scale. Radar helps you scan at scale more efficiently than AI to defend your contracts.
English
1
0
3
321
Auditware
Auditware@audit_wizard·
Test your organization's operational security with Sentry 👁️‍🗨️ Free and open to everyone: sentry.auditware.io
English
0
0
4
171
Auditware
Auditware@audit_wizard·
At an @EthereumDenver side event, an employee of a security firm left their laptop unlocked at a table for 10 minutes. That's enough time to grab SSH keys, install malware, exfiltrate documents, etc Anyone can fail at OpSec. Use things like screen locks so you stay secure.
English
1
0
9
353