ipwning

139 posts

ipwning banner
ipwning

ipwning

@ipwning

Security Researcher | Binary exploit | web3 & 0-day research | M.S. KAIST EE @ hacking lab | prev. President of @CyKorKU

Seoul, Republic of Korea Katılım Mart 2019
480 Takip Edilen853 Takipçiler
Sabitlenmiş Tweet
ipwning
ipwning@ipwning·
I’ve finally made my first contribution to Zellic’s tech blog! That said, this post also reflects the efforts of many teammates who aren’t mentioned by name. Anyway! If you're interested in TON and want to explore its unique security considerations, check it out!
Zellic@zellic_io

How many security considerations are there for non-EVM chains? There's a TON. Developed by Telegram, @ton_blockchain has a very unique approach to both execution and state. In this thread, we'll dive into some security considerations unique to TON. ⬇️ 🧵

English
5
5
35
4.6K
ipwning
ipwning@ipwning·
@Ari_crypt0 Nobody knows 😅 But one thing is certain. In any field, those who posses only the skills of junior will be replaced.
English
0
0
0
25
Ari Crypto
Ari Crypto@Ari_crypt0·
@ipwning you think ai can hack complete and replace hackers?!
English
1
0
0
32
ipwning
ipwning@ipwning·
I love this moment… but honestly a little bit scared that I’ll be jobless 😂 Only those who know how to use AI well and deeply understand AI will survive 😤 Keep hacking happily, friends! 👊
CyKor@CyKorKU

We just posted a new article on our blog! 🚀 "How I Found Open-Source 0-days with an LLM Multi-Agent Workflow" 🔍 Hyunseo Shin (KU, 4th year) shares how an LLM-based multi-agent workflow uncovered real 0-days in open-source projects. Worth a read👇 🔗 blog.cykor.kr/2026/02/How-I-… #Cykor #LLM #ZeroDay

English
2
3
41
5.1K
ipwning retweetledi
OpenAI
OpenAI@OpenAI·
Introducing EVMbench—a new benchmark that measures how well AI agents can detect, exploit, and patch high-severity smart contract vulnerabilities. openai.com/index/introduc…
English
1.2K
1.3K
8.8K
2.5M
Faith 🇧🇩🇦🇺
Faith 🇧🇩🇦🇺@farazsth98·
Flew 22 hours for this, there better not be some ninja patch tonight / tomorrow 😤😤
Wiz@wiz_io

Zeroday.cloud 2025 kicks off TOMORROW! 💻 London, brace yourself - IDEs open. Exploits cooking. 13 zero-days are on the line 💣 Don't miss it. Here's the schedule ahead ⬎

English
6
0
45
5.7K
ipwning
ipwning@ipwning·
👀
kaden.eth@0xKaden

yETH Exploit Deep Dive After spending some time exploring the recent yETH exploit, I quickly realized that it's easily one of the most sophisticated attacks I've ever seen. In fact, it was so complicated that every writeup I read misunderstood at least some part of the attack. This complexity provides for some serious alpha to developers and security researchers who can thoroughly understand the attack, so don't just bookmark this, let's dive in. Hybrid AMM Curve To understand this exploit, we first need to understand the underlying mechanism of the protocol. The yETH pool uses an invariant which is a hybrid between constant product and constant sum. If you're familiar with the inner workings of Uniswap, you should be familiar with the constant product behavior, essentially it just adjusts the price according to the reserves. Whereas constant sum results in a constant price between the tokens, regardless of reserves. The yETH hybrid curve behaves like a constant sum when the token reserves are balanced, keeping the price constant, and behaves like a constant product curve when the reserves are imbalanced. This behavior is valuable for pools of assets which have the same value due to the fact that the price is much less sensitive to reserve changes. Below we have a graph [1] of these different curves. Red: constant product, green: constant sum, blue: hybrid used by the yETH pool. The First Bug: Breaking The Invariant Let's zoom in on the `_calc_supply` function. This function uses an iterative approximation to converge to a new supply and constant product term at each iteration, ending the loop once sufficient precision is achieved. The constant product term (r) is recomputed at each iteration as the current value multiplied by the new supply, divided by the previous supply (`r * sp / s`). Effectively, it scales at the same rate as the supply. The bug: if the decrease in supply of any given iteration of the solver is large enough, the constant product term can round down to zero. There is no revert to handle this case and once it occurs, each following iteration will remain zero since `0 * x / y = 0`. Now that we have a zero constant product term, we no longer have a hybrid constant product/constant sum curve, instead we effectively just have a constant sum curve. To understand why this is a problem we have to go back and look at the curves. In the below graph [2], we have the intended curve (red) and the constant sum curve (purple) which is the result of the zero product term. As we adjust the supply (see desmos graph [2] linked in reply) of these two curves (D), we can see that the reserves increase by the same amount in the middle, where the reserves are balanced, but by different amounts on the outside, where the reserves are imbalanced. This means that as we add/remove liquidity with imbalanced reserves, these two curves will mint/burn a different amount of LP tokens. Understanding this behavior, the attacker systemically switched between these curves by triggering the zero constant product term when adding liquidity with unbalanced reserves to receive more LP tokens than intended. They then resolved the constant product term back to normal during liquidity removal to receive the correct amount of tokens provided for burning the inflated amount of LP tokens they received. This allowed the attacker to withdraw more tokens than they deposited, which they repeated until the pool was drained of its reserves for a profit of about ~$8m. The Second Bug: Unexpected Underflow You thought we were done? Nope, there's yet another bug that the attacker exploited to steal even more funds after already completely draining the pool. Now that the pool is empty, and variables used for accounting are in such an unusual state, there is a significant side effect which occurs when we attempt to deposit certain dust amounts. Again, looking in the `_calc_supply` function, when we iteratively recompute the supply, we compute it with the following line (`(l - s * r) / d`): Since we use unchecked math here and the accounting is in a highly irregular state, it's unexpectedly possible for `s * r > l`, resulting in the computed supply underflowing. The attacker exploits this underflow by depositing the following amounts: `[1, 1, 1, 1, 1, 1, 1, 9]`, resulting in them being minted `~2.6*10^56` yETH LP tokens. The attacker then makes a swap on the curve yETH/WETH pool, draining the pool of its WETH, for a profit of ~$1m. Conclusion Not only did this attack include a highly sophisticated AMM invariant exploit, but it also exploited an underflow which is likely only possible due to the existence of the invariant exploit. This combination of exploits allowed the attacker to not only drain the yETH pool, but also another pool containing the LP token. Both attacks, and even tornado cash deposits were all made in the same transaction, preventing any chance at rescue. In my research, every writeup I came across misunderstood this attack in some way. Clearly, it's extremely rare to understand such a sophisticated exploit, providing for some serious alpha to developers and security researchers to fully wrap their heads around this.

ART
0
0
4
587
ENKI WhiteHat
ENKI WhiteHat@ENKI_official_X·
[엔키화이트햇 X 2025 ACDC 현장 이벤트] 🚩 세상에서 가장 쉬운 행운의 CTF 🚩 🏹 Capture Your FLAG — SNS Mission Challenge! ✅ 참여 방법: 1. 엔키화이트햇 X ‘팔로우’ 하기 2. 이벤트 게시물에 ‘AI 해킹 관련 엔키 응원 댓글’ 남기기 (#AI해킹, #화이트해커, #AI해커) ex. “#AI 해킹 엔키화이팅!” “ AI시대 최고의 #화이트해커 엔키” “#AI해커 선두주자 엔키화이트햇” 3. 부스 운영진 확인 후 바로 FLAG 티켓 지급 4. 티켓 긁고 리워드를 받아가세요! [ 유의사항 ] - 본 이벤트는 2025 ACDC(AI Cyber Defense Contest) 엔키화이트햇 부스에서 진행되는 오프라인 이벤트입니다. - 1인당 1티켓이 지급됩니다. #이벤트 #ACDC #AI #엔키 #엔키화이트햇 #오펜시브 #화이트해커
ENKI WhiteHat tweet media
한국어
9
0
4
743
ipwning
ipwning@ipwning·
So excited to announce my challenge on the world stage 🫨🫨
CyKor@CyKorKU

📢 CyKor CTF (@cykorctf) Announcement CyKor is pleased to host the upcoming CyKor CTF with great prizes! • 1st Place: $ 3,000 • 2nd Place: $ 1,500 • 3rd Place: $ 500 The event will be held for 24 hours, from 2025.12.06 01:00 (UTC+0) ! 🔗 CTF Link: ctf.cykor.kr

English
0
0
25
3.5K
ipwning retweetledi
Zellic
Zellic@zellic_io·
Bad auditors miss obvious bugs. We built an AI tool that finds them. Introducing V12: the only autonomous Solidity auditor that actually finds Highs and Criticals. We'll be releasing it for free. V12 finds Crits in Zellic audits, High/Mediums in Cantina, and a bug in Pendle.
Zellic tweet media
English
78
134
729
256.7K
ipwning retweetledi
Super Guesser
Super Guesser@SuperGuesser·
Yeaaaay! We made it to 3rd place this year’s DEF CON! We enjoyed with @dicegangctf and CodeRed 😎
Super Guesser tweet media
English
0
10
47
6.4K
ipwning retweetledi
Zellic
Zellic@zellic_io·
BLS signatures are everywhere, from Ethereum’s consensus to EigenLayer. But it’s easy to use them wrong. What are BLS signatures? Let’s talk about the right way and the wrong way to use them:
Zellic tweet media
English
5
50
331
54.1K
ipwning retweetledi
Crowdfense
Crowdfense@crowdfense·
Read our newest blog-post on CVE-2024-11477, a buffer overflow vulnerability in 7-Zip's ZSTD decompression algorithm; explore the technical details: crowdfense.com/cve-2024-11477…
English
0
23
67
10.4K
ipwning
ipwning@ipwning·
I’ve finally made my first contribution to Zellic’s tech blog! That said, this post also reflects the efforts of many teammates who aren’t mentioned by name. Anyway! If you're interested in TON and want to explore its unique security considerations, check it out!
Zellic@zellic_io

How many security considerations are there for non-EVM chains? There's a TON. Developed by Telegram, @ton_blockchain has a very unique approach to both execution and state. In this thread, we'll dive into some security considerations unique to TON. ⬇️ 🧵

English
5
5
35
4.6K