Web3Plug (app/acc)

9.4K posts

Web3Plug (app/acc) banner
Web3Plug (app/acc)

Web3Plug (app/acc)

@plugrel

🔌 plug relations pay anyone 💸 @replydotcash pray anywhere 🕌 @praysap fund anything 🫕 @POTLOCK_ prev @NEARFoundation 🕌 @ummahbuild ummaceleration

AMERICA Katılım Mayıs 2023
8.8K Takip Edilen8.1K Takipçiler
Sabitlenmiş Tweet
Web3Plug (app/acc)
Web3Plug (app/acc)@plugrel·
Millions of Muslim struggle waking up for Fajr, while the Quran & Sunnah has the cure to sleep insomnia. This is why we built SunnahSleep the first app thats helps you fall asleep based on Islamic teachings. We are now live in the App store. Free to use, no ads, data stays local + private. Download to start waking up pre-sunrise today! apps.apple.com/app/sunnahslee…
Web3Plug (app/acc) tweet media
English
0
2
7
798
FAN NEAR Family
FAN NEAR Family@Near_Eco·
$NEAR ecosystem priorities are absolutely cooked. 1. Joe (DevHub SMM Lead): $16,000/month 2. Potato (keyboard warrior): $13,000/month 3. Actual developers building products on $NEAR: capped at $10,000/month Proofs 👇
FAN NEAR Family tweet media
English
8
1
23
2.4K
ummah.build
ummah.build@ummahbuild·
Being a #Muslim founder is more common than we know, it just hasn't been mapped yet. This is why we are proud to announce the 1st Muslim #Founder Directory. Over 200+ Muslim founders 💪 Its time we start competing on every vertical. Check it out ⭐️ ummah.build/founders
ummah.build tweet media
English
15
28
272
13K
Web3Plug (app/acc) retweetledi
nader dabit
nader dabit@dabit3·
This is crazy. The hacker installed a dead-man's switch that will wipe your computer if you revoke the GitHub token they stole from you. Revoking the token is what triggers the wipe.
nader dabit tweet media
TANSTACK@tan_stack

SECURITY ADVISORY — TanStack npm packages A supply-chain compromise affecting 42 @tanstack/* packages (84 versions total) was published to npm earlier today at approximately 19:20 and 19:26 UTC. Two malicious versions per package. Status: ACTIVE — packages are deprecated, npm security engaged, publish path being shut down. Severity: HIGH — payload exfiltrates AWS, GCP, Kubernetes, and Vault credentials, GitHub tokens, .npmrc contents, and SSH keys. If you installed any @tanstack/* package between 19:20 and 19:30 UTC today, treat the host as potentially compromised: • Rotate cloud, GitHub, and SSH credentials immediately • Audit cloud audit logs for the last several hours • Pin to a prior known-good version and reinstall from a clean lockfile Detection — the malicious manifest contains: "optionalDependencies": { "@tanstack/setup": "github:tanstack/router#79ac49ee..." } Any version with this entry is compromised. The payload is delivered via a git-resolved optionalDependency whose prepare script runs router_init.js (~2.3 MB, smuggled into each tarball at the package root). Unpublish is blocked by npm policy for most affected packages due to existing third-party dependents. All 84 versions are being deprecated with a SECURITY warning, and npm security has been engaged to pull tarballs at the registry level. Full technical breakdown, complete package and version list, and rolling status updates: github.com/TanStack/route… Credit to the security researcher for responsible disclosure.

English
146
1K
9.6K
1.7M
calle
calle@callebtc·
Non-KYC debit card with tap to pay. Build this and I will give you so much money. You can ask for an insane fee and people will still use it.
English
170
70
2.1K
300.5K
Web3Plug (app/acc)
Web3Plug (app/acc)@plugrel·
The amount of stalking I had to do to make this was insane, but inshallah will pay off once wen muslimfoundermaxxing takes off 🕌🌱
ummah.build@ummahbuild

Being a #Muslim founder is more common than we know, it just hasn't been mapped yet. This is why we are proud to announce the 1st Muslim #Founder Directory. Over 200+ Muslim founders 💪 Its time we start competing on every vertical. Check it out ⭐️ ummah.build/founders

English
1
4
9
460
Web3Plug (app/acc) retweetledi
Unihax0r
Unihax0r@0xUnihax0r·
The current situation: - 2 wallets drained across multiple chains (ETH/Base/BSC) - Both wallets were originally created on SIGMA Telegram - Both imported into GMGN + Rabby - Drain happened manually over ~10 min - No suspicious Telegram sessions - Other wallets on Rabby/Jupiter untouched Which seems to point to: - Wallet generation/import leak - Malware/infostealer on device - Malicious extension/browser compromise - Fake/phishing GMGN workflow
English
120
23
804
317.5K
Web3Plug (app/acc)
Web3Plug (app/acc)@plugrel·
activities over parties. might need to bring back activitiy daos
Jess | CEO @ Blockus@theweb3jess

1/ This year’s official @consensus2026 closing party by @CoinDesk was a massive step backward. Hosting the flagship event at E11even — a strip club — wasn't just inappropriate; it was incredibly low-brow for an industry trying to grow up. 2/ Let’s be clear: I’m all for alcohol, music, and a good time. Hire a world-class DJ. Throw a massive rave. Go to Club Space. But choosing a strip club as the official venue for a global conference is a choice that reflects poorly on all of us. 3/ Just because this happened in 2021 doesn't mean it should happen in 2026. Back then, Coinbase, FTX and Binance execs were there, but the industry has evolved. We are supposed to be moving toward institutional maturity, not leaning into "bro-culture" clichés. 4/ I’ve always been an advocate for sex work. I have zero issue with women making $40k–$80k on their own terms. The issue is the context. 5/ When an official event for a top-tier conference — filled with institutional partners and people of all genders and religions — centres on women shaking for dollars, it diminishes women to sexual objects and enforces a stale, exclusionary culture. 6/ It’s honestly boring. I guarantee brands like @MetaMask and CoinDesk will one day look back at their logos plastered on those walls with genuine embarrassment. 7/ We had international attendees flying in from across the globe. Is this really the best US crypto has to offer? Working the pole is a skill, but watching it in a professional context just left most people looking dazed and awkward. 8/ The vibe was off. I ran into my banker and some mid-tier hedge fund guys there. We can talk millions on Wall Street or over steak, but meeting at a strip club is unnecessary. We could’ve hit a polo club, a baseball box, or played padel. 9/ Even the economics were a "bear market" vibe. Most people were just watching with a mix of shock and intrigue. The girls weren't making much. They used to take crypto; now they don't. The floor was dry. No fiat moving. Why were we even there? 10/ Seeing a banker film the stage (until security stepped in) while seeing my bankers logos walk around in a strip club is the peak of industry cognitive dissonance. 11/ This industry is capable of so much more, yet we keep tripping over our own feet. We want to be taken seriously on the world stage, but we’re still acting like we’re in a basement. We must do better. Special shoutout to @SolanaFndn, @amystreet, and @SuperteamUSA. Your Accelerate vibe was immaculate, paired with the best Mario Kart-themed afterparty. 🏎️💨 It was the perfect illustration that "crypto culture" doesn’t have to mean "bro culture." You can have high-energy, high-intelligence fun without… whatever E11even was. Let’s talk economics: A single sponsorship for that E11even event costed roughly $90k. The entire Mario Kart event? Maybe $50k. Using a massive brand budget to alienate half your audience is a spectacular waste of capital. 📣📣📣 Conference organizers and sponsors: we have to do better. If we want to move millions on Wall Street, we need to stop acting like we belong in a basement. ✌️

English
1
0
1
187
Web3Plug (app/acc) retweetledi
CG
CG@cgtwts·
Coinbase’s CEO lays off a ton of employees and says: “Non-technical teams are now pushing code to production with AI” less than 24 hours later: coinbase’s trading engine goes down and somehow even the status page breaks too
Steven@Dogetoshi

Their status page is also down 😭

English
273
1K
14.6K
1.6M
Web3Plug (app/acc)
Web3Plug (app/acc)@plugrel·
@Replit @amasad feedback - need to make clearer when agent is doing something or its building and the progress its making, too subtle in UX - git and external integration sync to hard too find - not clear if source code is public, deployed published link vs replit source confusing - settings for a projects ux needs to improve, directs more to workspace than project
English
0
0
1
154
Web3Plug (app/acc) retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🚨 BREAKING: cPanel and WHM, the control panels behind an estimated 70+ million websites, have a critical security flaw that lets anyone become root admin without a password. CVE-2026-41940 affects every supported version. It’s already being exploited in the wild. watchTowr Labs published the full attack today, after the hosting company KnownHost confirmed the bug was already being used to break into a significant chunk of the internet. If you've never heard of cPanel: it's the dashboard that hosting providers and millions of website owners use to manage their servers, domains, email accounts, databases, and SSL certificates. WHM is the admin version that controls the entire server. If someone gets root access to WHM, they get the keys to the kingdom and to every apartment inside it. How the attack works, in plain English: 🔴 Step 1: The attacker sends a deliberately wrong login. cPanel still creates a temporary "you tried to log in" record on disk and gives the attacker a cookie tied to it. 🔴 Step 2: The attacker tweaks the cookie to disable cPanel's password encryption. Normally cPanel encrypts the password field on disk. With one small change to the cookie, cPanel just stores it as plain text instead. 🔴 Step 3: The attacker sends a fake login attempt where the password field secretly contains hidden line breaks. cPanel does not strip these line breaks out, so they get written straight to the session file. Each line break creates a brand new fake record. The attacker uses this to inject lines that say "this user is root" and "this user already authenticated successfully." 🔴 Step 4: The attacker visits one more random page on the site to nudge cPanel into re-reading the file. cPanel then promotes the injected fake lines into its main session memory. 🔴 Step 5: On the next request, cPanel sees a flag that says "this user already passed the password check." cPanel trusts that flag, skips checking the actual password, and lets the attacker in as root. From start to finish, the attack takes a handful of HTTP requests. If you run cPanel or WHM, the patched versions are: 🔴 cPanel/WHM 110.0.x → 11.110.0.97 🔴 cPanel/WHM 118.0.x → 11.118.0.63 🔴 cPanel/WHM 126.0.x → 11.126.0.54 🔴 cPanel/WHM 132.0.x → 11.132.0.29 🔴 cPanel/WHM 134.0.x → 11.134.0.20 🔴 cPanel/WHM 136.0.x → 11.136.0.5 If your version is older than these, assume someone has already broken in and act accordingly. Patch right now, then rotate every password and key the server touched: root passwords, API tokens, SSL private keys, SSH keys, mail passwords, and database passwords.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
105
791
3.9K
555.4K