Bitsec | Bittensor Subnet 60 τ

150 posts

Bitsec | Bittensor Subnet 60 τ banner
Bitsec | Bittensor Subnet 60 τ

Bitsec | Bittensor Subnet 60 τ

@bitsecai

An ecosystem for AI powered code vulnerability detection

Katılım Mayıs 2024
20 Takip Edilen1.8K Takipçiler
Bitsec | Bittensor Subnet 60 τ retweetledi
yubrew
yubrew@yubrew·
bitsec investors, what we do last 30 days? - secured a client, audit report published here github.com/Bitsec-AI/audi… - published ~300k view article, audited OpenClaw, a 300k+ LOC project and outlined 100+ vulnerabilities, grouped them, pushed 27 PRs to batch fix classes of exploits - exposed ~10% Bittensor subnets effectively have no code - incentive mechanism v3 we're 2 devs, 1 marketing guy, and a growing army of ai loops. more coming.
English
7
4
40
1.4K
Bitsec | Bittensor Subnet 60 τ
Hey Miners, Incentive Mechanism v3 update here. We've changed a few things to make the process more deterministic, fair, and fix a few misaligned incentives. First, we're switching the contest to rounds. Roughly a round will be three parts: 1. Miners submit their best agents. It's private, the evaluation set is known, every submission is screened. 2. Evaluation phase starts. All agents that pass screens get evaluated by validators. The winner is the top scoring agent, tie breakers are determined by number of confirmed vulnerabilities found (higher number wins). 3. Feedback and improvement. We look at the data, agent performance, and miner feedback to see what needs to change before the next round. Agents get more capabilities. The inference proxy gets full access to openai api compatible calls. Tool use, multi-turn, reasoning are all fair game and easy to use. Ask us for agent coordination libraries and we'll add them. If you would rather watch / listen than read, here's the youtube link youtu.be/8kDZ-s_7YEc
YouTube video
YouTube
English
1
3
32
2.4K
Bitsec | Bittensor Subnet 60 τ
Logging inference started weighing down db performance. It was important to deal with this before it got problematic.
yubrew@yubrew

quick bitsec update: got an example agent using reasoning models working and moving logs out of the main database. didn't come face to face with so many 502 and service disruption errors with @chutes_ai until using popular models with longer inference times. inference logs are bloating the database, time to clean it up. tomorrow's task is moving inference costs onto miners instead of validators

English
0
1
10
782
Bitsec | Bittensor Subnet 60 τ
Tonight posting video for the miners, explains a bit more on v3, and an exploit detection loop that's been working for me.
English
0
2
21
724
Bitsec | Bittensor Subnet 60 τ retweetledi
yubrew
yubrew@yubrew·
after waiting for months i finally got to try @ridges_ai new product ridgeline code agent and tested it out on a new feature for @bitsecai v3 here's what happened: in the ridges dashboard ux you make a github issue. it didn't seem to have back and forth discussion or feedback mechanism, so i tried to add relevant context to improve the chances of a good result. i wanted agents to get access to tool use and multi-turn, which requires changes to the inference proxy, return types, and agent. github.com/Bitsec-AI/sand… from using agents a lot, outsourcing the thinking is where many ai codegens go wrong. this also seems the case with ridgeline. you need to do the research and planning on what you want to do, then it can implement the plan #diff-6af8c13c28e55afd7771860a517f09acf712df9c0d8191fd9ebe06250c28252e" target="_blank" rel="nofollow noopener">github.com/Bitsec-AI/sand… i got a PR back after 7.5 hours. it's not bad, but it's also not complete. there are no additional tests to verify it does what it should. it touches the right files, modifies them in a POC kind of way. a great thing, the solution ridgeline implements is elegant that does not have the typical code bloat from many models codegen outputs. this is what i did with claude code opus by comparison #diff-6b0070c056b6e750cb42a8895b8cc02e7675baf8c49abe96afe0f4429716eed8" target="_blank" rel="nofollow noopener">github.com/Bitsec-AI/sand… it took ~1.5h vs 7.5h, i'm guessing in the background ridgeline runs multiple agents in parallel, long job queue, and serve the best result which is where the 7.5h comes from. the claude code output is more complete in my opinion, gave a better result because of back and forth dialog at two critical junctures. claude style is worse and more bloated though. verdict: too early to determine, but ridgeline is useful out of the gate and has potential. this is just 1 side by side run, i'll try it a few more times on different feature types. i suspect ridgeline would be really good at front end.
yubrew tweet media
English
12
12
119
14.4K
Bitsec | Bittensor Subnet 60 τ
MegaTao Case Study @bitsecai has its first paying customer. We went deep into the @mega_tao alpha futures codebase, and get into what we found. MegaTao is a perps dex built on top of Bittensor EVM. This uses the best practices from EVM while using the on-chain subnet alpha price for real time price tracking, with a codebase that is large, sophisticated and will be evolving over time. It is advised by Ken from Bitmind, the team is lead by Cahn, also working from Austin. We are working closely with their dev team collecting feedback as they push out new features both to the smart contracts and front end, periodically checking for potential exploits. What they got right: Their codebase is linted, has good test coverage, using modular smart contracts, layered approach to defense, and modern architecture. They took careful consideration for common exploits such as oracle staleness, oracle heartbeat checks, self trading, same block tx attacks, relying on OpenZeppelin smart contracts for access control and reentrancy protection, properly namespaced storage, safe handling of non-standard erc20 tokens, etc. We'll get into our methodology shortly, but when we found bugs, they were quickly addressed. The biggest issue was bad accounting, not including interest accrued from positions for liquidation math, pnl, and margin views. It's the kind of thing even experienced devs forget when it is crunch time and a launch date approaches. Although the chances of a bad outcome are small, they responded quickly and the fix was patched in less than 1 day. Bitsec Methodology Since Bitsec V2, miners generate agents that detect security vulnerabilities according to SCA-Bench (Smart Contract Audit Bench). We use a combination of miner agents and our own in-house agents to detect exploits, scan for potential issues, then triage them to see if it could occur in production, then write POC tests to help developers identify and fix potential exploits. We tackle each vulnerability class in phases of a multi-stage process, scaling security with token spend. As MegaTao increases in balance and requires higher degrees of security, we point more tokens and agents to exhaustively investigate edge cases. As usage increases, leverage increases, and new features get implemented we can continuously monitor and scale security demands without waiting months for traditional security solutions. There were some hiccups with false positive findings (AI overreporting issues that are not possible in production) from Bitsec. Approximately 30-50% of the issues clustered around oracle information, blockchain intricacies like MEV, and design decisions. As far as I am aware, they plan to get a traditional audit and open source the code when it is stable and feature complete.
MegaTAO@mega_tao

Something big is coming to Bittensor... so big, it’s Mega. Introducing MegaTAO, an onchain perps protocol that lets you long, short, and hedge TAO and alpha risk directly onchain. * TAO-only collateral * Support for the top alphas today * CEX-style UI built for traders * Built on the Bittensor EVM Start trading in beta 👉 megatao.com Read the docs 👉 docs.megatao.com Join the conversation 👉 discord.com/invite/KQYpAaY…

English
5
8
72
13.3K
Bitsec | Bittensor Subnet 60 τ
Quick UX fixes for bitsec.ai/leaderboard - crown icon for the current winner, getting 100% emissions - disqualified agents are default hidden, but you can reveal them by editing the filter - IM V2.2 still going strong, from 35% last week to 70% this week planning to switch to a new problem set next week.
Bitsec | Bittensor Subnet 60 τ tweet media
English
2
2
25
5.8K
Bitsec | Bittensor Subnet 60 τ retweetledi
Yuma
Yuma@YumaGroup·
Meet the subnets powered by Yuma: Numinous (SN6) Gopher (SN42) Score (SN44) Bitsec (SN60) RedTeam (SN61) Vericore (SN70) FLock OFF (SN96) StreetVision (SN72) Yanez MIID (SN54) Babelbit (SN59) Trishool (SN23) Loosh (SN78) Hermes (SN82) NIOME (SN55) Follow the teams to learn more: @numinous_ai @gopher_ai @webuildscore @bitsecai @_redteam_ @Vericore_S70 @flock_off_sn96 @NATIXNetwork @yanez__ai @babelbit @trishoolai @Loosh_ai @HermesSubnet @GenomesDAO
English
3
17
138
25.1K
Bitsec | Bittensor Subnet 60 τ retweetledi
Chain of Thought
Chain of Thought@cot_research·
AI is writing code faster than humans can audit. This creates a critical security gap. @bitsecai agents flagged 50+ critical and high-severity vulnerabilities in OpenClaw in a single triage run. This highlights the urgent demand for autonomous security. OpenClaw, with 500k+ lines and daily commits, shows the new reality. Bitsec, a Bittensor subnet, uses competitive AI agents to audit at commit speed. This model is vital for scaling trust in the machine economy, where AI agents will control real-world permissions. Annual losses of $2.5B to exploits confirm this market need. Can human audits keep pace with AI-generated code, or is autonomous security the only viable path?
Chain of Thought tweet media
English
2
4
12
843
Mark Jeffrey
Mark Jeffrey@markjeffrey·
Be careful with OpenClaw (especially LOCAL): " ... @bitsecai scanned the entire (OpenClaw) repo and flagged 50+ critical vulnerabilities in a single run. It's a Bittensor subnet where AI security agents compete to find exploits."
Teng Yan · Chain of Thought AI@tengyanAI

3/ AI is writing code faster than humans can audit it. OpenClaw has 500k+ lines, 300+ commits a day, and real permissions (filesystem, terminal, messaging) @bitsecai scanned the entire repo and flagged 50+ critical vulnerabilities in a single run. it's a @opentensor subnet where AI security agents compete to find exploits

English
5
3
60
4.5K