Dajma

345 posts

Dajma banner
Dajma

Dajma

@khimcdmy

Ethereum Security Researcher & Static Analysis Developer

Katılım Şubat 2022
216 Takip Edilen42 Takipçiler
Dajma
Dajma@khimcdmy·
@WakeFramework Alpha validated, consensus strong, edge sustained onchain
English
0
0
0
4
Wake
Wake@WakeFramework·
Four AI auditing tools. Fourteen protocols. The shape tells the story. Wake Arena 3.1's blue area contains the other three on every axis. Where all systems struggle — Burve, Notional — the gap closes. Where the work matters — Lend, Munchables, Virtuals — the edge is visible and consistent. What the chart doesn't show: 49 of the 63 found vulnerabilities were confirmed by more than one Wake Arena agent independently. The shape reflects consensus, not a single model's guess. Learn more ↓
Wake tweet media
English
4
2
10
103
Dajma retweetledi
Josef Gattermayer | Ackee
Josef Gattermayer | Ackee@jgattermayer·
110-year-old turkish grandma shares her secret to a long life: "i never used foundry"
Josef Gattermayer | Ackee tweet media
GIF
English
2
1
16
661
Wake
Wake@WakeFramework·
Most teams use one tool for tests and another for deployment scripts. Wake collapses both into the same Python workflow. Here's what that unification looks like in practice: Thread↓
Wake tweet media
English
3
3
5
133
Trident
Trident@TridentSolana·
You upgraded your program. Tests still pass. But did the upgrade silently change the behavior of a flow you never explicitly tested? Regression testing with Trident catches what "tests pass" misses. Thread ↓
Trident tweet media
English
3
3
8
361
Trident
Trident@TridentSolana·
Your Solana program lives in a GitHub repo. Trident Arena turns it into a security report with severity ratings, affected code, and remediation guidance. No audit slot. No weeks of waiting. Thread ↓
GIF
English
5
4
15
557
Dajma
Dajma@khimcdmy·
@WakeFramework This is exactly why debugging smart contracts is painful. One function → 6 internal calls → 3 contracts → hidden side effects Wake’s call flow visualization lets you see the entire execution path directly in VS Code — before running anything, before adding logs before deploy
English
0
0
1
6
Wake
Wake@WakeFramework·
A function that looks simple calls 6 others across 3 contracts. Wake's call flow visualization shows the complete code execution in VS Code — before you add a single console.log. Thread ↓
Wake tweet media
English
3
2
6
221
Trident
Trident@TridentSolana·
Why did we build the Solana VS Code extension? CLI tools require a manual run. Most developers skip them. The Solana VS Code extension detects vulnerabilities on every save. 70-80% of audit findings are low/medium issues caught during development. Get it now ↓
English
3
3
16
712
Trident
Trident@TridentSolana·
Passing sysvars as instruction accounts is a deprecated Solana pattern. It's also exploitable — an attacker can pass a spoofed account address. The VS Code extension flags this automatically. Thread ↓
GIF
English
3
3
13
851
Wake
Wake@WakeFramework·
When your toughest competition is your previous version, you're doing something right. Wake Arena 3.1 vs 3.0, same 94 vulnerabilities, same 14 protocols: Lend: 13/28 → 20/28 Virtuals: 4/6 → 6/6 Burve: 2/9 → 4/9 Phi: 4/7 → 6/7 Total: 43 → 63 +47% in a single version The four protocols already at 100% in v3.0: still at 100% in v3.1. Learn more ↓
Wake tweet media
English
6
1
16
657
Trident
Trident@TridentSolana·
Security is only as strong as the weakest link. You can have great fuzzing and still lose funds to: • weak access control • unsafe dependencies • missing monitoring/response • social engineering in ops Treat security as a system: code quality + testing + fuzzing + audits.
English
4
5
17
619
Dajma
Dajma@khimcdmy·
@WakeFramework exactly! it is how you make difference against others - you create your own tooling
English
0
0
2
6
Wake
Wake@WakeFramework·
Every team has a bug they fixed, documented, and watched a new developer re-introduce six months later. Wake's static analysis framework lets you write custom detectors so the fix becomes a permanent CI gate: Thread ↓
Wake tweet media
English
4
1
8
191
Trident
Trident@TridentSolana·
Your tests pass. But which code paths were actually executed? The Solana VS Code extension shows which lines your Trident tests covered. And which they missed. Thread ↓
GIF
English
4
3
6
810
Dajma
Dajma@khimcdmy·
@WakeFramework easy navigation - easier codebase understanding
English
0
0
1
6
Wake
Wake@WakeFramework·
Large Solidity codebases have 50+ contracts. No developer holds the full inheritance chain in their head. Wake's inheritance graphs visualize contract relationships so you can navigate (not memorize): Thread ↓
GIF
English
3
1
7
450
Trident
Trident@TridentSolana·
“Audit the program” is not the full job. Good audits: • understand the system (on-chain + off-chain) • review architecture + dependencies • go from shallow scan to deep manual review • rate issues by impact + likelihood • check patch quality and incident response readiness
English
3
3
9
424
Dajma
Dajma@khimcdmy·
@WakeFramework exactly! DDG and CFGs is the wild combo-wobmo (also for debugging detectors with them😅)
English
0
0
1
44
Wake
Wake@WakeFramework·
Data Dependency Graphs trace where values go. Control Flow Graphs trace how execution moves. Wake Arena uses both. Here's why one graph type isn't enough to catch protocol-specific bugs: Thread ↓
Wake tweet media
English
4
2
9
493
Trident
Trident@TridentSolana·
You can prompt Claude or GPT to review your Solana code. Or you can ask Trident Arena. One catches ~33% of critical/high vulnerabilities. The other 70%. Same code. Same task. Very different outcomes. Thread ↓
Trident tweet media
English
3
6
19
2.4K