Caducus

1K posts

Caducus banner
Caducus

Caducus

@chain_linkd

Optimizing Automated Cross-Chain Yield @Judge_Finance Blockchain Evangelist Security Researcher OG Link Marine

Moon Katılım Ocak 2018
729 Takip Edilen361 Takipçiler
Sabitlenmiş Tweet
Caducus
Caducus@chain_linkd·
Working with the chainlink stack to build something real and meaningful. Dream come true. @chainlink More to come.
Charles Holmes@CHolmeseth

What can we build with @chainlink's CRE? @Judge_Finance is building YieldCoin as our first offering with CRE at its core. YieldCoin (Chromion Winner) is the stablecoin money market fund the industry has been praying for. One token. One job: Continuously route your stables to the highest risk adjusted real yield across @aave @compoundfinance @Dolomite_io @FolksFinance @0xfluid All APY's shown as net of our streaming fee. No deposit/withdrawal fees. No hidden fees.

English
0
1
15
1.4K
Caducus
Caducus@chain_linkd·
@octane_security Pure bliss to have amazing security researchers build an amazing security AI tool
English
1
0
1
22
Octane Security
Octane Security@octane_security·
How ARE works: Phase 0: We work with the client to define the context of their codebase: architecture, threat model, economic assumptions, etc. Phase 1: AI explores at scale. It maps the codebase, traces execution paths, and explores the long tail of edge cases humans can’t exhaust on their own. Phase 2: Human researchers evaluate the AI’s signals. They cut down the noise, note the serious attack paths, prune hypotheses, and refine the overall context. Phase 3: Repeat. Each pass goes deeper along the paths that matter, until meaningful attack vectors have been covered.
Octane Security tweet media
English
3
0
9
225
Caducus retweetledi
0x15.eth
0x15.eth@0x15_eth·
Condolences to Balancer, but the deeper issue is this... You can’t build a safer ecosystem by assuming people will choose the moral path. In practice, the default path is often the immoral one, because doing harm is easier than doing good. You can’t control human nature. You can control incentives. And as long as the incentive to be a blackhat is greater than the incentive to be a whitehat, hacks like this will keep happening. Protocols need to do more than say “do the right thing.” They need to make doing the "right thing" easier We need faster triage, faster payouts, faster and clearer communication, and a better experience overall for whitehats. Imho security is more of incentive design.
bbl4de@bbl4de_xyz

This is why, as a moral human being, you should NEVER even CONSIDER exploiting a live bug you have found. You don't just take magical money from magical protocol. You make users lose money, investors lose money, protocol lose reputation and money, protocol employees lose jobs and all that for your own personal gain. forum.balancer.fi/t/on-the-futur…

English
5
5
30
2.2K
Caducus retweetledi
Octane Security
Octane Security@octane_security·
Octane brings continuous coverage to @capmoney_’s multi-layer security stack. Every pull request gets AI-native security analysis right at the source.
cap@capmoney_

Security at Cap runs deep. Along with 6 completed audits, our layered, proactive approach includes: 🔒 Quarterly Audits (upcoming one from @cantinaxyz) 🕵️ @sherlockdefi bug bounty program 🛡️ @octane_security ai-native code analysis 🔍 @HypernativeLabs on-chain threat detection

English
0
3
21
2.3K
Plamen Tsanev
Plamen Tsanev@p_tsanev·
So by now it has been established that *everybody* uses AI tools in web3, either internal or public (or both). It would be interesting which are the favorite platforms of choice (they may seem obvious, but not so much), so please let me know so I can serve you a treat 😈+ 🤖:
English
3
6
26
2.4K
Caducus retweetledi
Octane Security
Octane Security@octane_security·
We responsibly disclosed it, MUX fixed it, and no pool was drained. This is the future: continuous, automated, adversarial security that catches and patches bugs before attackers can exploit them. At the end of the day, the best security incident is the one that never happens.
English
1
2
14
1.3K
YAM 🌱
YAM 🌱@yieldsandmore·
@roschamomile incredible how easy it's to recognise you fully wrote this with AI
English
3
0
59
1.2K
vm 🌹🍵
vm 🌹🍵@roschamomile·
What confuses me isn’t the $50M loss. It’s the execution. If you’re moving that kind of size: •Why swap directly through a UI? •Why not use a trading desk or OTC? •Why not check liquidity depth and LP distribution first? At that scale, slippage isn’t a minor detail. And everyone in DeFi knows MEV and sandwich bots exist specifically to exploit large swaps. Normally whales buying size like this would: •split the order •use RFQ / OTC desks •or route liquidity manually across multiple pools So the real question isn’t just “why was the routing bad?” It’s Why was a $50M order executed like a retail swap?
YAM 🌱@yieldsandmore

0x98b...7ac8 just lost $50m in an attempt to buy AAVE using USDT through @CoWSwap. This swap was very likely executed through AAVE's UI using the collateral swap feature, as it swaps from aEthUSDT to aEthAAVE, which represent deposits of USDT and AAVE into the AAVE protocol. The cause is mostly bad routing done by most aggregators. Below is a screenshot from @matchametaxyz and @CoWSwap, showing that all aggregators struggle with this. It doesn't seem to us that @CoWSwap misrepresents the price of aEthAAVE. Transaction: etherscan.io/tx/0x9fa9feab3…

English
15
2
51
15K
Caducus retweetledi
deadmanwalking
deadmanwalking@0xdmanwalking·
In times where AI dominates and intelligence is being replaced by .md fikes it is finally time to get a voice and develop deep and meaningful human connections. The era of the nerd is over.
English
0
2
4
183
Caducus
Caducus@chain_linkd·
@dionyziz @MetaMask Really sorry to hear this Dionisi, but what the FFffuck are those replies in this post man. Crazy
English
1
0
1
151
Dionysis Zindros
Dionysis Zindros@dionyziz·
@MetaMask Can't make this go away, all the money I had in this browser is lost. Your AI-based support doesn't work...
Dionysis Zindros tweet media
English
162
0
8
1.4K
Caducus
Caducus@chain_linkd·
@Jeyffre Congrats, you just described every megacorpo dystopian future ever written and ended with "deal with it". You are so edgy and cool, I'm falling already
English
0
0
4
131
Jeffrey Scholz
Jeffrey Scholz@Jeyffre·
Not only will pay-to-submit-bugs become the norm to prevent spam... Pay-to-work as a junior developer will also become the norm. Nobody will spend time mentoring a junior when that time is more effectively spent talking to an AI. Junior engineers (even intermediate ones) cannot get work, but they desperately need experience to be able to secure those $100,000 / yr jobs. It's only a matter of time before companies charge $10,000+ per year for an apprenticeship that touches real production systems. And the ROI would still be better than college. College (and AI) cannot teach you how to handle the jagged edges of reality. What we used to call "junior engineers" was really "apprenticeships" with a different name. The only way to quickly learn to handle the chaos of the real world is to watch an experienced person up close and in action. The new world will be like this: 1. Skip college. Maybe even skip high school. 2. Pass certain exams that show you have a reasonable level of technical and communication skills. 3. Pay an employer for an apprenticeship. 4. Earn six figures per year because you have experience. Deal with it. The world is changing.
Hari@hrkrshnn

I'll tell you something that people don't want to talk about. Crowdsourced security is at a breaking point. There are no winners here; the security researchers hate it, the customers hate it, and the platforms at the crossroads also hate it. I spoke to someone last week who described it as a necessary evil. Why is that? - The security researchers hate it because no matter how you do it, a portion of security researchers will always disagree with the outcomes. Because the severity of a bug is ultimately subjective, you can almost always make an argument to upgrade or downgrade your finding. This is the ugly truth: the people that make a lot of money are particularly good at arguing about the findings. And they know it too; some of them are the nicest people you've met in your life, but when it comes to arguing why something is a critical bug, they morph into ruthless lawyers. - The customers hate it. Imagine you're Monad here; you just spent half a million dollars (!!) to secure your software before even launching to production, and you see posts like this. It's natural to leave a bad taste. It's also not just anyone who wrote this critique, but someone who got #4 and a $32K reward for a 4-week security competition. - The platforms that host it (us included) end up in the crossfire. No matter what you do, you end up in a lose-lose scenario. It takes up a lot of mental space, and in this case, CodeArena hosted this for free! They probably even lost money judging the competition. There's also a fourth actor that's adding fuel to the fire, which is AI: - LLM-powered reports started as complete slop that you could ignore, but now it's not that obvious anymore. It's starting to be genuinely useful at finding bugs. - The only sustainable long-term solution to crowdsourced competitions and bounties is a pay-per-bug or staking model where invalid submissions get a cash penalty. This is controversial, but it's the only way to scale. - AI is also a glimmer of the future: a future where... P.S. I don't mean to call anyone out in particular; in fact, Dontonka, Monad, and Code4rena are all doing their best here. It's just that the golden age of crowdsourced security is probably over. It was necessary, just like how it was necessary for humans to write open-source code so that the machine god could be built.

English
12
7
100
12K
Caducus retweetledi
bbl4de
bbl4de@bbl4de_xyz·
Vibe-coding smart contracts is terrible, but what if the vibe coder is an auditor with knowledge on how to design a secure project and the resulting code is manually reviewed by them before following-up with external audits/tooling/FV etc. Seems like a great opportunity and productivity boost, no?
English
4
1
17
1.5K
Caducus
Caducus@chain_linkd·
@Raacfi Monitoring THIS situation👀👀👀👀
English
0
0
1
116
Caducus retweetledi
Tenderly
Tenderly@TenderlyApp·
Aave is also the first team to run cross-chain tests using the CCIP bridge integration on Virtual TestNets built in collaboration with @chainlink. This is the first time cross-chain testing with native CCIP bridging is available directly in a development environment.
Tenderly tweet media
English
1
6
16
568
Caducus
Caducus@chain_linkd·
@contractlevel For that there's a final so... Ah fuck it, $50 min deposit it is
English
0
0
0
13
Contract Level
Contract Level@contractlevel·
@chain_linkd The old purchasing third world credentials to increase deposit time by 10 hours trick
English
1
0
0
18
Contract Level
Contract Level@contractlevel·
Time-of-check to time-of-use (TOCTOU) is a race condition vulnerability when state that is read could change before it is used. This is useful to think about in crosschain systems that requires state on one chain in order to execute something on another chain.
English
1
0
2
179
Caducus
Caducus@chain_linkd·
@contractlevel Taking the ordered route, indeed. Grief needs to be stopped with early checks or at the source(CoMplIaNt griefers?) Flawless failure handling needs to be implemented regardless.
English
1
0
0
18
Contract Level
Contract Level@contractlevel·
@chain_linkd CCIP tx times + ordered execution sounds like a recipe for grief attacks non-ordered execution sounds like a recipe for manipulation
English
1
0
0
29