
Joe | Audit Wizard
527 posts

Joe | Audit Wizard
@joe_vanloon
Professional security wizard, building @audit_wizard, making audits great again - previously worked @apple










@lex_node You fucking retard this isn’t a fucking court order this is a fucking lawyer letter trying to claim property that belongs to DPRK. STOLEN MONEY DOESNT BELONG TO DPRK. THEY STOLE IT. Go back to law school fuck.







The root cause was a private key compromise. Keys were stored in a password manager accessible to a small number of people to handle chain maintenance and upgrades, without an additional encryption layer separate from the password manager.


Remember the security firm that Ubuntu hired to audit the (ill-advised, highly buggy) Rust-rewrites of all of the GNU Coreutils? Turns out that security firm is run by @gf_256, who: - Appears to be a man who thinks he's a woman ("trans"). - Uses an anime cartoon of a girl as his avatar. - Appears to have an OnlyFans page. I repeat: Ubuntu hired a "Trans" man, with an anime girl avatar and an OnlyFans page... to audit Rust code. It's hard to get more on-the-nose than that.



If you want to run free AI audit tools on your codebase, check the repository below👇 Most serious developers run multiple AI vulnerability scanners before going into a full audit and they often remove double-digit vulnerabilities from their code. URL: github.com/pashov/ai-web3…

📅 Worst month for DeFi, 25 protocols hacked in past 30 days ($624,000,000 total) KelpDAO — $293,000,000 Drift — $285,000,000 Rhea Lend — $18,400,000 Grinex — $15,000,000 Volo Vault — $3,500,000 Hyperbridge — $2,500,000 BSC TMM/USDT — $1,665,000 Giddy — $1,300,000 Purrlend — $1,500,000 Aftermath Finance — $1,140,000 LML/USDT Staking — $950,000 Aethir — $423,000 Singularity Finance — $413,000 Dango — $410,000 Silo V2 — $392,000 ZetaChain — $300,000 Judao — $228,000 Scallop Lend — $150,000 Zerion Wallet — $100,000 Kipseli — $80,000 MONA — $60,950 SubQuery Network — $60,000 Juicebox V3 — $52,000 Thetanuts Finance — $50,000 Someone needs to stop this 🙏


New Robinhood phishing chain that's kinda beautiful: 1. Attacker creates an RH account using the Gmail dot trick of your email (same inbox, different address) 2. Sets device name to HTML 3. RH's "unrecognized activity" email renders the device name unsanitized (html injection) The result is a real email from noreply@robinhood.com, DKIM pass, SPF pass, DMARC pass, with a phishing CTA Just because it's real, doesn't mean it's safe... $HOOD

do you understand what just happened to Robinhood.. Someone sent a perfect phishing email - real domain, DKIM pass, SPF pass, DMARC pass and Robinhood's own servers delivered it. Here's the chain: → Gmail treats john.doe@ and johndoe@ as the same inbox → Attacker registers a NEW Robinhood account using the dot trick of YOUR email → Sets the device name to raw HTML code → Robinhood's "unrecognized activity" email renders it unsanitized The "Review Activity Now" button? Attacker's phishing site. The email? 100% real.. Sent by Robinhood.. Signed by Robinhood.. Just because it passed every security check doesn't mean it's safe.

Enough is enough. Sherlock is building out an opsec practice to help prevent the next Resolv, Drift and KelpDAO situations. If you have a background in opsec and are knowledgeable about Web3 security, please DM me and mention you're interested in the opsec role.


@ChaseTheLight99 @joe_vanloon @0xKaden @0xzak @tapired @jaczkal @Quantstamp (Richard Ma) @xy9301 @m4rio_eth @dobsec @0xpetern @duha_real Nikola Matić @defisafety @tw_tter @_mixy1 @leekt216 @urruts @tpiliposian @LuckyLuker2 @eduadiez @seth_certora @unsafe_call @Draiakoo @umariomaker


