Wake

6.4K posts

Wake banner
Wake

Wake

@WakeFramework

Complete Solidity security: Wake Framework (open-source) for testing & fuzzing + Wake Arena for AI audits with graph-driven reasoning. By @AckeeBlockchain

EVM Katılım Eylül 2023
141 Takip Edilen2.3K Takipçiler
Sabitlenmiş Tweet
Wake
Wake@WakeFramework·
Four AI auditing tools. Fourteen protocols. The shape tells the story. Wake Arena 3.1's blue area contains the other three on every axis. Where all systems struggle — Burve, Notional — the gap closes. Where the work matters — Lend, Munchables, Virtuals — the edge is visible and consistent. What the chart doesn't show: 49 of the 63 found vulnerabilities were confirmed by more than one Wake Arena agent independently. The shape reflects consensus, not a single model's guess. Learn more ↓
Wake tweet media
English
4
2
11
140
Wake
Wake@WakeFramework·
ERC-4626's composability is also its attack surface. Every protocol that integrates the standard inherits its edge cases. Inflation attacks and rounding errors are not exotic. They appear repeatedly in audits, precisely because the standard is widely adopted and the failure modes are subtle. A rounding error in a vault that feeds into five other protocols is not one bug. It is five. Wake Arena's detectors were built from these audit patterns, not from public databases, but from findings in production code securing $180B+ in TVL. Understanding the standard is the foundation. Detecting where an implementation deviates from correct share accounting behavior is what catches the bugs that understanding alone misses. Fluency in ERC-4626 is necessary. It is not sufficient.
Pandit | Ξ🦇🔊@panditdhamdhere

If you are diving deep into Defi as a Smart contract Engineer. Here are 5 strong reasons you need to master ERC 4626. A direct, practical breakdown, not just "why it's cool" but why not knowing it will actively hold you back. 🧵

English
1
2
6
92
Wake
Wake@WakeFramework·
@zksync "Not comfortable with promises" is the best one-line summary of institutional crypto adoption. Privacy that survives technical diligence is a high bar.
English
0
0
1
83
ZKsync
ZKsync@zksync·
"Banks do deep technical analysis on how blockchains work, what are the underlying assumptions and how is privacy actually preserved. They aren't comfortable with promises." @gluk64 explaining why Prividiums are purpose-built for institutional adoption on @CryptoAmerica_
English
9
19
97
5.6K
Wake
Wake@WakeFramework·
@serverConnectd @qrcoindotfun @0FJAKE Good build, congratulations! If you need any testing here to support. P.S. I dropped you a DM with more info if you're curious.
English
0
0
1
17
sarvad.base.eth 🦇🔊
sarvad.base.eth 🦇🔊@serverConnectd·
.@qrcoindotfun Website is finally live! it's a NOUNs styled daily auction where anyone can bid to control which website the QR points for 24 hours. a cool fun project i got to work on with @0FJAKE
English
11
6
68
9.3K
Wake
Wake@WakeFramework·
@PrayagAgrawal Solid read. The next step is to turn theory into practice. The Wake's VSCode extension can help with that once you start coding, if not already. Also, dropped you a DM with more info if you're curious.
English
0
0
0
8
🦇🔊
🦇🔊@PrayagAgrawal·
Reading the 2nd edition of Mastering Ethereum and exploring BIP-44 HD wallet derivation paths. The way address generation differs between UTXO-based systems and the EVM account model is eye-opening. It finally makes sense what those derivation paths are really encoding #EVM #BTC
English
1
0
1
14
Wake
Wake@WakeFramework·
Four AI auditing tools. Fourteen protocols. The shape tells the story. Wake Arena 3.1's blue area contains the other three on every axis. Where all systems struggle — Burve, Notional — the gap closes. Where the work matters — Lend, Munchables, Virtuals — the edge is visible and consistent. What the chart doesn't show: 49 of the 63 found vulnerabilities were confirmed by more than one Wake Arena agent independently. The shape reflects consensus, not a single model's guess. Learn more ↓
Wake tweet media
English
4
2
11
140
Wake
Wake@WakeFramework·
@Marcus_Rein_ @EthCC See you there, folks from @AckeeBlockchain, and Wake will be there. By the way, I also dropped you a DM with something that may be of interest if you're curious.
English
0
0
0
27
0xMarcus
0xMarcus@Marcus_Rein_·
Made it to my third @EthCC Stablecoins, perps, and more, if you’re chatting defi and tradfi this is the place to be ✌️
English
1
0
5
113
Wake
Wake@WakeFramework·
@EthCC @hagaetc @Dune Static tokenization was chapter one. Plugging real assets into lending and yield loops is a different beast.
English
0
0
0
39
EthCC - Ethereum Community Conference
Happening NOW on the Monroe Stage: @hagaetc, CEO and Co-Founder of @dune, exploring how RWAs are evolving from static tokenized assets into composable DeFi primitives across lending, yield, and liquidity. 📍 Monroe Stage
EthCC - Ethereum Community Conference tweet media
English
3
2
16
2.2K
Wake
Wake@WakeFramework·
@Polkadot @paritytech Love the speed, though they still need a security pass before holding real value. Wake Arena could be a natural next step for these.
English
0
0
0
231
Polkadot
Polkadot@Polkadot·
AI vibe coding. Now available for Polkadot smart contracts? Check RevX (beta) for yourself. The ABCD of smart contract deployment on Polkadot using RevX by @paritytech 👇
English
14
52
297
15.3K
Wake
Wake@WakeFramework·
@miroslava24017 Wake's VS Code extension flags common Solidity issues as you type. Might save some debugging time on that rebellious contract.
English
0
0
0
2
Miroslava Horáková
Miroslava Horáková@miroslava24017·
code by day, pixel by night Currently wrestling with a rebellious smart contract, demanding more free cake than lines of code #gaminganddecentral
Miroslava Horáková tweet media
English
1
0
1
3
Wake
Wake@WakeFramework·
@Roman_Indie Most projects audit their contracts but never their dependency tree. Pinning versions and reviewing diffs on updates should be standard CI practice.
English
0
0
0
8
Roman | Building Scaffly
Roman | Building Scaffly@Roman_Indie·
litellm, trivy, chalk, debug, VS Code extensions, 800+ GitHub repos All compromised recently And most devs don't even check what their deps pull in Ship faster, add more deps, trust more libs Attackers use the same AI to find and exploit weak points
Andrej Karpathy@karpathy

Software horror: litellm PyPI supply chain attack. Simple `pip install litellm` was enough to exfiltrate SSH keys, AWS/GCP/Azure creds, Kubernetes configs, git credentials, env vars (all your API keys), shell history, crypto wallets, SSL private keys, CI/CD secrets, database passwords. LiteLLM itself has 97 million downloads per month which is already terrible, but much worse, the contagion spreads to any project that depends on litellm. For example, if you did `pip install dspy` (which depended on litellm>=1.64.0), you'd also be pwnd. Same for any other large project that depended on litellm. Afaict the poisoned version was up for only less than ~1 hour. The attack had a bug which led to its discovery - Callum McMahon was using an MCP plugin inside Cursor that pulled in litellm as a transitive dependency. When litellm 1.82.8 installed, their machine ran out of RAM and crashed. So if the attacker didn't vibe code this attack it could have been undetected for many days or weeks. Supply chain attacks like this are basically the scariest thing imaginable in modern software. Every time you install any depedency you could be pulling in a poisoned package anywhere deep inside its entire depedency tree. This is especially risky with large projects that might have lots and lots of dependencies. The credentials that do get stolen in each attack can then be used to take over more accounts and compromise more packages. Classical software engineering would have you believe that dependencies are good (we're building pyramids from bricks), but imo this has to be re-evaluated, and it's why I've been so growingly averse to them, preferring to use LLMs to "yoink" functionality when it's simple enough and possible.

English
1
0
1
38
Wake
Wake@WakeFramework·
@dokes999 Account abstraction differences across chains catch even experienced devs off guard. Testing against both environments reveals subtle gaps fast.
English
0
0
1
5
Tom
Tom@dokes999·
Day 65 Working with smart contract wallets on zkSync. Understanding how they differ from Ethereum, especially around system contracts and the built-in functions zkSync provides. Getting a better feel for how account abstraction is handled across different environments.
English
1
0
2
23
Wake
Wake@WakeFramework·
@0xdmanwalking On-chain and off-chain security are converging. Protocols need engineers who think about the full attack surface, not just the contract layer. By the way, I also dropped you a DM with some more info if you are curious.
English
0
0
0
1
deadmanwalking
deadmanwalking@0xdmanwalking·
The recent Resolv hack highlighted a clear need for off-chain infra auditing and security. The good thing is that unlike smart contract sec, this has been around for a while. The clearest path seems to be the rise of the security engineer (on and off chain) for every protocol. Curious to see how it develops.
English
1
0
1
75
Wake
Wake@WakeFramework·
@bounty50657 CEI violations still top the charts in audit findings. Wake flags reentrancy patterns like this in real time if you want an extra safety net.
English
0
0
0
7
Bug Bounty
Bug Bounty@bounty50657·
Just completed the @BattleChain Starter Demo! 🎯 Successfully executed a reentrancy exploit on the VulnerableVault via a CEI violation & token transfer hook. 10% bounty claimed, 90% safely returned to the protocol under Safe Harbor terms. 🤝🔒 #BugBounty #Web3Security #Whitehat
Bug Bounty tweet media
English
3
0
9
145
Wake
Wake@WakeFramework·
@blesschidiebube The contract is often the most audited layer. Keys, frontends, and dependencies get far less scrutiny despite carrying equal risk. P.S. I also sent you a DM with some relevant info if you're curious.
English
0
0
0
7
Blessing Chidiebube
Blessing Chidiebube@blesschidiebube·
Most post-mortems say "smart contract exploit." Read deeper and you'll find: - Compromised admin key - Phished frontend developer - Malicious dependency injection The contract was fine. Everything around it wasn't.
English
4
0
2
46
Wake
Wake@WakeFramework·
@__Raiders Dormant extensions with high install counts are prime hijack targets. Publisher verification and update recency should be the first check. Wake's extension is Microsoft verified for this reason. And by the way, I also dropped you a DM with more info if you're curious.
English
0
0
1
14
Raiders
Raiders@__Raiders·
🚨 3 VSCode extensions by IoliteLabs (solidity-macos, solidity-windows, solidity-linux) just got hijacked after sitting dormant since 2018. 27,500 installs. 8 years of trust capital gone in one version bump. The attacker compromised the publisher account, pushed v0.1.8 with a multi-stage backdoor hidden inside a tampered pako dependency. not even in the extension entry point. the GitHub repo has zero new commits. update went straight to the Marketplace. no diff possible. no source to review. on every VSCode startup it silently downloads platform-specific payloads. DLL disguised as a Chrome updater on Windows, persistent binaries on macOS with Gatekeeper bypass. Linux is ironically untouched. SAME playbook. hijack a dormant trusted package, inherit credibility, ship malware under a version bump nobody questions. your install count and publish date mean nothing. your extension marketplace is not a security boundary. if you write solidity and have any of these installed. remove, rotate, audit. we track and break down these supply chain issues at digibastion (dot) com and for DNS/domain/frontend supply chain monitoring, been building something to solve for exactly this.
English
3
2
10
860
Wake
Wake@WakeFramework·
@FB6917511963698 Good direction starting with security early. Once you're writing Solidity, Wake's VS Code extension flags common mistakes in real time. Worth bookmarking.
English
0
0
1
8
Wake
Wake@WakeFramework·
@0xOrion0x Web2 pentest skills transfer well here. Wake's detectors catch reentrancy patterns like this automatically, could complement your manual approach.
English
1
0
1
23
0xOrion
0xOrion@0xOrion0x·
Just drained a smart contract dry. Legally. 😈 Ethernaut CTF Level 1 — OWNED ✅ → Seized full contract ownership → Drained 100% of funds → Total cost: 0.001 ETH The "security barrier" was 1000 ETH in contributions I bypassed it with 0.001 ETH through a backdoor in receive() Web2 pentester brain + Web3 = dangerous combo 🎯 Full writeup on my portfolio 👇 pentest-research.lovable.app/writeups/ether… @OpenZeppelin @CyfrinAudits #Web3Security #Ethernaut #CTF #SmartContractSecurity #Solidity #BlockchainSecurity #Cyfrin #OpenZeppelin
English
1
0
1
31
Wake
Wake@WakeFramework·
@Wallflower1x0 Next step is manually guided fuzzing, steering inputs toward specific attack paths. Wake does this in Python with familiar pytest syntax. Might be worth comparing. By the way, I also sent you a DM with more info if you're curious.
English
0
0
0
3
Wallflower 🌼
Wallflower 🌼@Wallflower1x0·
Day 76 of my #Blockchain journey! 🔥 Today’s progress: ✅ How fuzz and invariant testing work in Foundry. ✅ Why fuzzing/invariants are necessary for catching edge cases in our smart contracts. ✅ How invariant tests verify key smart contract properties.
Wallflower 🌼 tweet mediaWallflower 🌼 tweet media
English
1
0
17
94
Wake
Wake@WakeFramework·
@ConorSvensson Security tooling is underfunded relative to the TVL it protects. More grants here benefit everyone, building on EVM. P.S. I also dropped you a DM with a bit more info on open source security tooling if you're curious.
English
0
0
0
3