
usmann
1.5K posts

usmann
@usmannk
a bit confused | Head of Protocol @Plasma 🕊️



I'll take a week to perform an interesting and probably stupid experiment: Hunting for live EVM bugs by checking the deployed bytecode. I'm allowing myself to cheat a little bit by checking the verified code to quickly understand what's going on. I'll also use a Yul decompiler for complex contracts and try a disassembler for simpler ones. There are critical contracts out there holding really big bags that are worth the effort. My main goal though is just to understand what's going on under the hood, and maybe get some inspiration for any potential unknown vectors. Also for understanding what's needed to get a clean input for any automated tools to perform further analysis. I don't expect to find any bugs honestly. It will be painful, but fun at the same time. I just love having the freedom to navigate any crazy paths I choose 🧙♂️


I’m searching for a truly excellent burger in SF. has anyone had one? (criteria: not fast food. also I’ve had the one at nopa and like it)





Codex one shoted this analysis of the contract in 2 minutes flat, with simple prompt and skills, without any additional context actively scan your code with latest models and tools available before audits and live code if you dont, blackhats will do it for you









Compromised and revoked TEE machines could pass dstack's attestation verification as perfectly valid, due to missing checks. What's more? This gap has existed since the library's first commit. @PhalaNetwork Cloud and every protocol built on it inherited this behaviour from day one. Their GHSA marks this as Critical and notes that it "bypasses entire remote attestation model". My team at @bluethroat_labs reported this and 5 other vulnerabilities, and this is the response we got: + $2,500 in bounty offered + disclosure timelines framed as "threat" + wiped shared Notion + severities downgraded in a public blog post Here's the full story: 🧵👇🏻









I’ve been getting a lot of questions about how this bug was found, so here are the answers: kritt.ai/technical-revi… This is a technical review of how Claude Code was used to uncover this crazy bounty, and more broadly how AI can be leveraged to find Critical and High-severity issues.











