jinmo123

166 posts

jinmo123

jinmo123

@jinmo123

Pro problem definer, intern @QED_Audit

Katılım Temmuz 2020
11 Takip Edilen1.4K Takipçiler
jinmo123 retweetledi
Dedaub
Dedaub@dedaub·
AI Reconstruction of decompiled smart contracts on app.dedaub.com ... Most smart contracts on-chain still don’t have verified source code. The Dedaub EVM Bytecode Decompiler has become one of the most widely used tools in Web3 security — with over 10K users and 30M+ smart contracts decompiled. We’ve now added AI-based source reconstruction based on our leading decompiler technology, on select contracts without verified source. The AI-reconstructed source greatly improves readability for all your investigations. See the feature live on select contracts: app.dedaub.com/ethereum/addre… app.dedaub.com/ethereum/addre…
Dedaub tweet media
English
2
3
40
6.9K
jinmo123 retweetledi
ainta
ainta@kaizero_ainta·
I've spent the last few months building Web3 security agents at @QED_Audit. Coming from a pure Cryptography & Competitive Programming background, I was a complete Web3 newbie. Since I started with AI-based bug hunting from day one, I literally learned the field by observing how our agents reason; in the process, the agent's output became my intuition. To refine the agent, I had to push it to deliver deliverables so clear that even a newcomer (like me) could understand the bug. This required the agent to reason over complex invariants and break down its logic step-by-step. This iterative process didn't just build my intuition: it made the agent's reasoning sharp enough to uncover what humans missed. I'm excited to share that our tools flagged a 6-year-old CometBFT bug that stayed hidden through years of manual audits. We uncovered a logic inconsistency that enabled a $600M+ time-warp attack (and got $50K). Proof that using AI correctly can uncover what's hiding in plain sight. Excited for what's next in autonomous Web3 security.
QED Audit@QED_Audit

x.com/i/article/2014…

English
0
2
9
1.1K
c4lvin
c4lvin@c4lvin·
This is the craziest vulnerability report I've read this year. > CometBFT could be compromised by ONE malicious validator > The bug was due to the discrepancy of identifying validator between signature verification logic & block time computation > Any validator could manipulate timestamp of the ENTIRE NETWORK > If you increase timestamp to 9999-12-31, chain stops permanently as CometBFT's time moves monotonically > If a chain emits staking rewards via block timestamp, this can lead to massive inflation of native token & token goes 0 What a crazy bug. Fortunately the whitehats reported this bug to @_SEAL_Org and got it patched last week. Great thanks and shoutout to @QED_Audit who saved the world. Their member includes well-known world-class hackers, such as @jinmo123 and @pr0cf51. Must be worth taking a look at their next step!
QED Audit@QED_Audit

x.com/i/article/2014…

English
4
7
76
15.2K
jinmo123
jinmo123@jinmo123·
@c4lvin Really appreciate the shoutout, thanks🙏🫡
English
1
0
2
469
Dev 🧪
Dev 🧪@zkDragon·
Any CTF's w/ good challenges for exploiting ZKP circuit vulns? Would double as great circuit framework onboarding
English
5
0
22
1.5K
itszn
itszn@itszn13·
A big change of pace for my security research: I'm now working @OpenAI to build on and improve GPT's ability to detect and remediate complex vulnerabilities @daveaitel and a lot of other brilliant people Excited to see where this goes, lots of ideas to try...
English
25
7
290
18K
jinmo123
jinmo123@jinmo123·
@defendtheworld I usually just run ida-pro-mcp with Claude Code, but for CTF challenges I also drop the full C decompilation next to the binary; then it cross-checks against the disassembly and pulls extra data from the binary. I've seen it unwrap a 3-level nested VM...😀
English
0
0
1
184
jinmo123
jinmo123@jinmo123·
It's wild how casual reverse-engineering has become these days. It used to feel like a beer/2am activity - now it's more of a coffee/2pm thing, chatting with Claude code. I enjoy it.
English
3
0
36
3.7K
jinmo123
jinmo123@jinmo123·
@lolzareverser Yeah… almost all the RE challenge points got cut in half across every CTF 😂
English
0
0
3
286
SLooo7e
SLooo7e@lolzareverser·
@jinmo123 it's really funny that reversing is the easiest thing AI can solve nowadays in CTFs while its still struggle on pwn and web
English
2
0
2
325
jinmo123
jinmo123@jinmo123·
(fossil moment)
Italiano
0
0
2
949
Josselin Feist
Josselin Feist@Montyly·
@hrkrshnn Not sure it's such a good advice tbh It can give a false sense of security and have the dev teams focussing on the wrong things (e.g. "we are close source so we are secure")
English
1
0
20
489
Hari
Hari@hrkrshnn·
This is a very niche bug. If you have open source code that is not bulletproof, please be paranoid for the next 12 months. Blackhat hackers' ability to find critical bugs have gone up exponentially with AI.
Flow.com@flow_blockchain

Flow Network Exploit Post-mortem
 On December 27, 2025, an attacker exploited a vulnerability in the Flow network to counterfeit tokens, extracting approximately $3.9 million USD across bridges. No existing user balances were accessed or compromised. The attack duplicated assets but did not touch legitimate holdings, with the vast majority of counterfeit assets being contained onchain or frozen by exchange partners before they could be liquidated. Network validators have ratified a decentralized governance action authorizing the permanent destruction of 100% of counterfeit assets. The network resumed operations on December 29th and is operating as expected​ with full transaction history preserved. Attack Vector The attack demonstrated significant technical sophistication. The attacker deployed over 40 malicious smart contracts in a coordinated sequence, exploiting a three-part attack chain:  1) Attachment import validation bypass 2) Circumvention of defensive checks on built-in types 3) Exploitation of contract initializer semantics.  The root cause was a type confusion vulnerability in the Cadence runtime (v1.8.8), now patched (v1.8.9 and later). The flaw allowed the attacker to disguise a protected asset (which should be non-copyable) as a standard data structure (which can be copied), bypassing the runtime's safety checks and enabling token counterfeiting. Remediation Beyond bridging assets out of Flow, the attacker attempted to deposit counterfeit FLOW across several CEX, with many exchange partners freezing the deposits upon receipt due to the abnormal size and internal AML protocols. Approximately 50% of those counterfeit FLOW deposits have already been returned by cooperative exchange partners (OKX, Gate, MEXC) and destroyed, and the Foundation is actively coordinating with remaining exchanges. The network was restored on December 29, 2025, via an Isolated Recovery Plan that preserves all legitimate transaction history. This approach was selected following ecosystem-wide consultation with exchanges, bridge operators, and infrastructure partners. The Isolated Recovery Plan was chosen specifically to avoid reconciliation risk for off-chain custodial systems and cross-chain protocols maintaining independent state. The Foundation is cooperating with blockchain forensic partners including zeroShadow and Find Labs and relevant law-enforcement authorities to support ongoing investigations. Full technical details of the vulnerability, exploit mechanism, forensic analysis, and remediation architecture are linked in the comment.

English
7
4
60
11.2K
ABDul Rehman | Immunefi
ABDul Rehman | Immunefi@TheTradMod·
Hi whitehats! If any of you have ever faced an issue where a BBP project has rejected your finding by saying that the mentioned in-scope asset is no longer used or is outdated, or any other specific issue you have faced with in-scope assets in a submission, pls DM me. Thanks!
English
15
4
55
3.7K
jinmo123 retweetledi
tylerni7
tylerni7@tylerni7·
All the bugs used for winning this were found with @theori_io 's fully automated security analysis tools (just upload code and get bugs!). For interested folks, check out code.xint.io 🤖💪
Wiz@wiz_io

Final day at zeroday.cloud was W1LD.🧑‍💻 Today’s successful exploits >> RCEs in Redis (x2), PostgreSQL, and MariaDB - all demonstrated live on stage. Congrats to XINT Code for being the zeroday.cloud CHAMPIONS!

English
6
22
143
29.2K
jinmo123
jinmo123@jinmo123·
If there're Web3 SRs in my timeline, give @QED_Audit a follow - we have like 2~3 research pieces on the way worth a look
English
2
0
7
979