Gul Hameed retweetledi
Gul Hameed
356 posts

Gul Hameed
@CyberGul
Security Researcher @block_apex | dApp Auditor @hackenclub | eCPPTv2 | CRTP | CEH (Practical) | DM for Audits/Pentest
Katılım Temmuz 2020
426 Takip Edilen204 Takipçiler

1/ In June 2025, ResupplyFi was exploited for ~$9.56M and the root cause was a classic pattern.
My @xyz_remedy Glider contribution now helps detect: oracle price used as a denominator without a non-zero result check.
Remedy@xyz_remedy
Rare query approved. @cybergul flagged oracle price logic used as a denominator without validating against zero, exposing contracts to potential failure scenarios. Query below:
English

10/ Fixes are simple :
require(exchangeRate > 0) before storing/using it
add upper/lower bounds on oracle inputs/results
avoid inverse pricing (C / price) unless validated at every step
don’t use low-liquidity ERC-4626 pricePerShare as an oracle input without guardrails/thresholds
rekt.news/resupplyfi-rekt
English
Gul Hameed retweetledi

7/ Lockouts are meant to slow attackers. But if recovery is blocked too, the lockout becomes a DoS primitive.
Worth reviewing in any auth system.
#account-lockout" target="_blank" rel="nofollow noopener">cheatsheetseries.owasp.org/cheatsheets/Au…
#CyberSecurity #Pentesting #CEX
English

