deth

1.5K posts

deth banner
deth

deth

@dethSCA

Delivering elite smart contract audits.

📅 Book an audit 👉 Katılım Aralık 2022
390 Takip Edilen2.2K Takipçiler
Sabitlenmiş Tweet
deth
deth@dethSCA·
Announcing @EgisSec. @nmirchev8 and I are combining our strengths to provide better security services than we could ever do alone. We have just finished our first private engagement with @TrotelCoin and will post the report very soon. 👀
deth tweet media
English
6
9
85
20.3K
deth
deth@dethSCA·
Vibe coding is like a drug and I can’t get enough
English
0
0
8
397
deth
deth@dethSCA·
Contests are (g)old
Immunefi@immunefi

Most security firms are quietly moving away from audit competitions. This is one of the biggest mistakes happening in crypto security right now. There is a simple way to think about audit value: what does it cost to find a critical vulnerability? We looked at the actual data on what it costs to find critical bugs in crypto, and the numbers are not surprising. Finding a critical vulnerability in an audit competition costs $6,548 on average. The exact same severity bug through a bug bounty program costs $114,000. That is 17x more expensive for the same result. Now look at the traditional audit model. Some top firms charge $100 per line of code. Others charge as high as $25,000 per auditor per week. A single engagement can easily run $200k to $500k+, and you are getting maybe 2 to 4 people looking at your code. But cost per critical is not even the most interesting part. The interesting part is the structure of who is looking at your code. When you hire a firm, you get 2 to 4 auditors. Maybe they are great. Maybe one of them is having a bad week. You are making a concentrated bet on a small number of people. An audit competition attracts hundreds of security researchers. These are some of the best hackers, people who have found real vulnerabilities in major protocols. These hundreds of researchers are now armed with AI tools. They understand codebases faster. They write PoCs faster. They find bugs that would have taken DAYS in just hours. Think about what that means. You are not just getting hundreds of humans. You are getting hundreds of AI-augmented humans, each running their own workflow, each with their own intuition about where bugs hide. The scaling dynamics are extraordinary. The firms moving away from competitions are optimizing for predictable revenue, not for their clients’ best outcomes. That is understandable from a business perspective. But if you are a project choosing where to spend your security budget, you should optimize for bugs found per dollar spent. Audit competitions now also have scaling pots. The prize pool grows with the scope of the codebase. This aligns incentives in a way that fixed-fee engagements never can. But what about AI spam, low-quality submissions, and the time it takes to triage all of those submissions? Immunefi is addressing these with mechanisms like pay-to-submit, managed triage, and AI triaging agents, which are already showing very strong promise. The best security strategy is not either or. But if you have a limited budget and you want the most eyes, the most diverse skill sets, and the best cost per finding ratio, audit competitions are still the obvious choice.

English
1
1
19
1.5K
deth
deth@dethSCA·
@n4nika_ Gotta get with the times
English
0
0
3
84
deth
deth@dethSCA·
Another one
Defimon Alerts@DefimonAlerts

🚨 @giddydefi - Loss $1.3M (2026-04-23) Type: Incomplete Signature Coverage / Arbitrary Aggregator Call GiddyVaultV3's _validateAuthorization() uses EIP-712 signatures that only cover the data bytes of each SwapInfo struct, but NOT the aggregator, fromToken, toToken, or amount fields. The attacker exploited this by replaying a valid signature with modified SwapInfo: - fromToken was set to the strategy's staked LP tokens - aggregator was set to the attacker's contract - toToken to a fake token created by the attacker - amount - MAX_UINT256 TX: etherscan.io/tx/0x5edb66a4c…

English
0
0
2
251
Silvermist
Silvermist@0xSilvermist·
My biggest contest win since the start of my web3 journey. Let this be proof that perseverance always wins! #2 place on the largest paid out pot of this year with 1009 participants All this could not have happened without the collaboration with @asen_sec, thank you very much🔥
Silvermist tweet media
English
55
5
350
10.1K
deth retweetledi
Plamen Tsanev
Plamen Tsanev@p_tsanev·
😱A FREE Open-Source AI Auditor just delivered the same output as a $47,000 audit contest! Plamen ran twice on the same DODO contest as other tools and achieved 90+% coverage both times! Check the entire process below and integrate Plamen in your development workflow now
Plamen Tsanev tweet media
English
18
6
134
7.8K
deth retweetledi
nmirchev8
nmirchev8@nmirchev8·
Tempo chain just went live, so here are 3 things devs and auditors should watch for 👇
English
2
4
22
2.6K
deth retweetledi
Plamen Tsanev
Plamen Tsanev@p_tsanev·
🚀Dear builders and auditors, your Claude Code sub just became a 100x audit team. Up to 95 specialized AI security agents running in one orchestrated autonomous pipeline. Fully open-source. "Plamen" is live 🔥🐉
Plamen Tsanev tweet media
English
46
33
341
67.8K
deth
deth@dethSCA·
@p_tsanev My man, great stuff brother
English
1
0
2
848
Plamen Tsanev
Plamen Tsanev@p_tsanev·
Every AI auditor now does the same boring thing. So I went and fused the 4 security pillars into a singular pipeline: - Static analysis - RAG vulnerability search - Recursive depth analysis - Fuzzing and testing Fully autonomous 🤖 Fully open-source 🔓 Going live tomorrow 🚨
Plamen Tsanev tweet media
English
27
50
517
26.9K