strukt

125 posts

strukt

strukt

@strukt93

LSR @Spearbit - Triage @Hacker0x01 | ex-@Quantstamp | ex-@HalbornSecurity

Katılım Mayıs 2024
135 Takip Edilen68 Takipçiler
strukt
strukt@strukt93·
@Al_Qa_qa Yep, generally dynamic vs. static types
English
0
0
1
20
Al-Qa'qa'
Al-Qa'qa'@Al_Qa_qa·
Solidity Tips and Tricks! Downcasting bytes goes from the leftmost bytes, while downcasting uints goes from the rightmost bytes.
Al-Qa'qa' tweet media
English
1
2
23
810
strukt retweetledi
0xFrankCastle🦀
0xFrankCastle🦀@0xcastle_chain·
Announcing the Solana Audit Arena ⚔️ A free, weekly security competition for Solana security researchers. Every Monday I drop a new Anchor program, built using the safe-solana-builder tool and real-world DeFi implementation. Why? → Junior researchers have no clear path to prove themselves → No practice ground with realistic Solana programs → AI is raising the floor; you need to be above it github.com/Frankcastleaud…
0xFrankCastle🦀 tweet media
English
29
39
243
12.6K
strukt retweetledi
f4lc0n
f4lc0n@al_f4lc0n·
I Saved Injective's $500M. They Pay Me $50K. I like hunting bugs on @immunefi . I'm decent at it. - #1 — Attackathon | Stacks - #2 — Attackathon | Stacks II - #1 — Attackathon | XRPL Lending Protocol - 1 Critical and 1 High from bug bounties (not counting this one) Life was good. Then I found a Critical vulnerability in @injective . This vulnerability allowed any user to directly drain any account on the chain. No special permissions needed. Over $500M in on-chain assets were at risk. I reported it through Immunefi. The next day, a mainnet upgrade to fix the bug went to governance vote. The Injective team clearly understood the severity. Then — silence. For 3 months. No follow up. No technical discussion. Nothing. A few days ago, they notified me of their decision: $50K. The maximum payout for a Critical vulnerability in their bug bounty program is $500K. I disputed it. Silence again. No explanation for the reduced payout. No explanation for the 3 month ghost. No conversation at all. To be clear: the $50K has not been paid either. I've seen others share bad experiences with bug bounty payouts recently. I never thought it would happen to me. I can't force them to do the right thing. But I won't let this be forgotten. I will dedicate 10% of all my future bug bounty earnings to making sure this story stays visible — until Injective pays what I deserve. Full Technical Report: github.com/injective-wall…
English
522
520
4.6K
1.8M
strukt retweetledi
kaden.eth
kaden.eth@0xKaden·
✨Introducing evmresearch✨✨ A knowledge graph of nearly everything I've learned about the EVM in the past six years The graph structure emulates the brain, exponentiating research speeds for both humans and agents evmresearch.io
English
45
88
761
58.6K
strukt retweetledi
0xFrankCastle🦀
0xFrankCastle🦀@0xcastle_chain·
I audited an OTC escrow protocol on @solana 3 Criticals + 4 Highs Every single critical came from a different root cause But they all shared the same origin: the program made assumptions about accounts it never actually enforced
English
6
3
54
3.1K
strukt retweetledi
PeckShieldAlert
PeckShieldAlert@PeckShieldAlert·
#PeckShieldAlert The IoTeX[.]io Bridge @iotex_io has been hacked for over $8M worth of crypto due to a compromised private key. The hacker has swapped the stolen funds to $ETH and has started bridging them to #BTC via #Thorchain.
PeckShieldAlert tweet mediaPeckShieldAlert tweet media
English
20
33
160
40.8K
Valeriy
Valeriy@Krevetk0Valeriy·
You can buy a subscription to any AI service. But you can't buy experience or become a "senior security engineer". And yes, this is a report by a "security researcher" who couldn't even properly copy from LLM🤦‍♂️ And I feel sorry for managers who are forced to spend time on this.
Valeriy tweet media
English
19
11
215
25K
strukt retweetledi
Lil Endian
Lil Endian@lil_endian·
Published a writeup about a password reset flow using HMAC. An attacker could create valid tokens for other accounts by manipulating the values around the boundaries when the values got concatenated. asdf.foo/2026/02/13/usi…
English
0
6
49
2K
strukt retweetledi
webrainsec
webrainsec@webrainsec·
One line of Move code that trips up every Solidity auditor: let val = (amount as u64); In Solidity, this silently truncates. In Move, this aborts the entire transaction. Same syntax. Opposite behaviour. Here's why it matters for audits:
webrainsec tweet media
English
3
2
13
1.8K
strukt retweetledi
watchTowr
watchTowr@watchtowrcyber·
2026, the year of the AI-driven attacker that could do back flips, they said. Meanwhile, there's a magic number that allows Auth Bypass against Ivanti EPM (CVE-2026-1603) something about a pledge 🙄
watchTowr tweet media
English
6
65
357
30.4K
Hari
Hari@hrkrshnn·
I did a side-by-side comparison of Claude, Codex, and gemini-cli for the same long-horizon task. gemini-cli has fallen so far behind that it has become unusable.
English
6
0
25
2.5K
m4rio
m4rio@m4rio_eth·
the race right now is the good guys finding all the 0days in the OSS before the bad guys.
English
2
0
5
952
strukt retweetledi
Cantina 🪐
Cantina 🪐@cantinasecurity·
AI bots like @openclaw's Clawdbot surface 1000s of vulnerabilities every day. So we had to act. 🦞 Introducing ClawdStrike.ai: a free terminal skill to analyze any ClawdBot build, derived from our AI security expertise protecting the most complex production systems. See how it works:
English
52
86
721
181.2K
strukt retweetledi
Cantina 🪐
Cantina 🪐@cantinasecurity·
Cantina's AI Code Analyzer just found a high-severity bug in @provenancefdn. We discovered that a single transaction could trigger a panic in the EndBlocker and halt the entire chain, which their team promptly fixed.
Cantina 🪐 tweet media
English
3
11
31
2.9K