Usameen

11.3K posts

Usameen banner
Usameen

Usameen

@uptown_crypto

Trying to do better Learning Smart Contract Development & Security | Solidity & Vyper @CyfrinUpdraft | Documenting my journey in Web3

Kano, Nigeria Katılım Mayıs 2019
203 Takip Edilen385 Takipçiler
Sabitlenmiş Tweet
Usameen
Usameen@uptown_crypto·
I want to pinned this here I promised by this time next year my life will be so much more better as smart contract developer and security researcher.
English
0
0
3
289
Patrick Collins
Patrick Collins@PatrickAlphaC·
Putting this here for no reason
English
20
12
154
4.8K
Usameen
Usameen@uptown_crypto·
@moonpay How about me @moonpay I am learning web3 security my computer got broken saved smoe cash but still short i will buy a good computer and keep working on making Crypto safe.
English
0
0
1
23
MoonPay 🟣
MoonPay 🟣@moonpay·
the giveaway wallet got refilled
MoonPay 🟣 tweet media
English
1.2K
221
2.2K
58.2K
Usameen
Usameen@uptown_crypto·
@Learnernoearner Thanks you for providing free signal and giveaway may God reward you
English
0
0
0
3
UNKNOWN TRADER
UNKNOWN TRADER@Learnernoearner·
200$ giveaway Thank you for being here Comment smth nice will pick winner in couple hours
UNKNOWN TRADER tweet media
English
1.1K
476
988
29.5K
Usameen retweetledi
Nasiru
Nasiru@Nasintech·
Day 32 of becoming a Smart Contract Developer🔥 Just Completed My foundry Course Today🎉. It's been Exciting and Challenging. Today i Learnt: ✅Forked Test Environment ✅Learnt How to Deploy the contract on a testnet Thanks @CyfrinUpdraft #web3 #solidity #Foundry
Nasiru tweet mediaNasiru tweet mediaNasiru tweet media
English
4
2
13
122
Keyword 💙🛠️
Keyword 💙🛠️@xKeywordx·
I, FINALLY, broke the ice. I hoped for at least Medium here, but I'll take this as a first BB win.
Keyword 💙🛠️ tweet media
English
29
1
188
3.1K
0xZulkifilu 💎🥷
0xZulkifilu 💎🥷@0xZulkifilu·
✅ QUIZ #6 ANSWER — C) The transaction reverts Solidity 0.8.0+ reverts on overflow with Panic(0x11). uint8 max = 255. 255 + 1 overflows uint8 → revert. For wrap-around behaviour in 0.8.0+: 👇 Pre-0.8.0: answer was B (silent wraparound). This was the biggest 0.8.0 breaking change — SafeMath libraries are no longer needed.
0xZulkifilu 💎🥷 tweet media
English
2
0
4
55
0xZulkifilu 💎🥷
0xZulkifilu 💎🥷@0xZulkifilu·
SOLIDITY QUIZ #6 What is the value of x after calling increment()? A) 256 B) 0 C) The transaction reverts D) Compiler error Reply + explain why 👇Full answer in 24 hrs in comment section. Solidity quiz will keep coming daily, my goal is to make sure every developer and auditor benefit from it.
0xZulkifilu 💎🥷 tweet media
English
8
1
17
525
Usameen retweetledi
Babawo Top Computer |Usama
Dell latitude 3500 Core i5 8th Gen 256gb SSD 8gbram Light keyboard Excellent battery 15.6 inches Type c charger N200,000 Location farm centre kano No. FFA 4/5 khadijah plaza Call or WhatsApp 08148561809
Babawo Top Computer |Usama tweet mediaBabawo Top Computer |Usama tweet mediaBabawo Top Computer |Usama tweet mediaBabawo Top Computer |Usama tweet media
English
0
1
1
57
Usameen retweetledi
Babawo Top Computer |Usama
Lenovo x280 Core i5 8th Gen 256gb SSD 8gbram Type c charger 12.6 inches Excellent battery life Price 205,000 Location farm centre kano No. FFA 4/5 khadijah plaza Call or WhatsApp 08148561809
Babawo Top Computer |Usama tweet mediaBabawo Top Computer |Usama tweet mediaBabawo Top Computer |Usama tweet mediaBabawo Top Computer |Usama tweet media
English
0
1
3
268
Usameen retweetledi
0xZulkifilu 💎🥷
0xZulkifilu 💎🥷@0xZulkifilu·
🔓 YESTERDAY'S BUG — REVEALED. The vulnerability: integer overflow in increaseLockTime(). function increaseLockTime(uint256 secondsToAdd) external { lockTime[msg.sender] += secondsToAdd; } In Solidity below 0.8.0, uint256 arithmetic wraps silently on overflow. An attacker exploits this to escape their time lock early: Attack sequence: 1. User deposits. lockTime[attacker] = block.timestamp + 1 weeks (roughly: 1,700,000,000 + 604,800 = 1,700,604,800) 2. Attacker calls increaseLockTime with: secondsToAdd = type(uint256).max - lockTime[attacker] + 1 3. lockTime[attacker] overflows and wraps to 0 4. withdraw() checks: block.timestamp > 0 — TRUE 5. Attacker withdraws immediately, before their lock expires This is an Ethernaut Level 15 challenge — it has caught many experienced developers off guard because the function name sounds protective. "Increasing" the lock sounds safe. But the arithmetic has no ceiling. FIXED FUNCTION: 👇 This is why arithmetic boundaries always deserve explicit scrutiny — especially in functions users can call themselves.
0xZulkifilu 💎🥷 tweet media
0xZulkifilu 💎🥷@0xZulkifilu

🔴 SPOT THE BUG — This time-lock contract has a flaw that lets users escape early. A user can withdraw before their lock expires. How? This is a real Ethernaut challenge pattern. Drop your answer

English
2
2
11
404
Immunefi
Immunefi@immunefi·
Security researcher @Ehsan1579 just brought home $300,000 from a critical report via Immunefi. He's absolutely on fire in 2026. If you pledge $IMU behind him, you both earn $IMU when he finds more bugs: immunefi.com/pledge/bpop232…
Immunefi tweet media
English
37
26
452
87.8K
Usameen retweetledi
Raiders
Raiders@__Raiders·
$1M+ milestone ✅ just in 90 days, bro is absolute beast & web3sec gem.. he is just getting started ig, 9months left i think $5M+ by the year end?
Immunefi@immunefi

Security researcher @Ehsan1579 just brought home $300,000 from a critical report via Immunefi. He's absolutely on fire in 2026. If you pledge $IMU behind him, you both earn $IMU when he finds more bugs: immunefi.com/pledge/bpop232…

English
5
2
108
6.3K
Usameen retweetledi
Hash
Hash@HashHadir·
I want to share something honestly in my early days, the one and only person I was learning from was @PatrickAlphaC He’s incredibly smart, highly credible, and truly one of the most legit people in the space. If you don’t know him yet, then you’re seriously missing one of the best voices in Web3. If you’re looking for someone solid to learn from, he’s absolutely one of the best, especially if you’re a developer or you want to be.
Hash tweet media
English
7
2
60
3K
Nigeria Stories
Nigeria Stories@NigeriaStories·
BREAKING NEWS: A woman, Hafsatu Yusuf, has given birth to quintuplets at the Murtala Muhammad Specialist Hospital, Kano, with the state government assuming responsibility for their medical care.
Nigeria Stories tweet media
English
78
219
2K
196K
Usameen
Usameen@uptown_crypto·
@hamidonsolo Alhamdulillah may Allah see us through and may Allah bless you for this exceptional help you're doing for free
English
0
0
0
48
Patrickbatman
Patrickbatman@hamidonsolo·
70% of people will scroll past this. 20% will save it and do nothing. 10% will go to the comments and drop a duaa 🤲 or a motivation quote. That 10% gets personally from me: → Free registration link to my hacking course → Early waitlist access — 2,000 spots only This is the exact methodology I used to go from $0 → $15,129 in 7 months. 19 years old. Morocco. No degree. No mentor. Just obsession. I'm not selling anything. I don't want your money. I just want to make the world a little better than I found it. discord.gg/PVaw2dZ5 Free. لله. No fees. No catch. Ever. My full mission 👇 onehacker.space/mission.html Now go to the comments. Type a duaa. Type something that keeps you going. Or stay quiet and don't blame God, don't blame life — look in the mirror. 🔁 RT — someone on your timeline needs this today
Patrickbatman tweet media
English
55
12
72
7.3K
Usameen retweetledi
Patrick Collins
Patrick Collins@PatrickAlphaC·
ETH is a commodity!! Ft. @songadaymann ...But in this video, I'd like to bring your attention to something else.
English
6
21
157
8K