BlockSec

2.2K posts

BlockSec banner
BlockSec

BlockSec

@BlockSecTeam

Smart Contract Audit | Security Monitoring | AML/CFT (KYA/KYT) | Crypto Investigation | @Phalcon_xyz @MetaSleuth @MetaDockTeam 👉TG: https://t.co/owokTLanv5

เข้าร่วม Aralık 2020
150 กำลังติดตาม27.2K ผู้ติดตาม
ทวีตที่ปักหมุด
BlockSec
BlockSec@BlockSecTeam·
THE BREACH: 2025 Complete $1.9B+ stolen across 10 incidents. Audits passed. Bugs shipped. Exploits executed. BlockSec protects what matters via @Phalcon_xyz. The next breach is brewing. Thank you for following #TheBreach! 🧵 Full series 👇
BlockSec tweet media
English
4
0
10
8.6K
BlockSec
BlockSec@BlockSecTeam·
Excited to deepen our collaboration with @Cobo_Global on cross-border payment infrastructure. By integrating BlockSec's KYT risk engines with Cobo's Payment API, we're delivering an all-in-one solution covering payments, risk control, and compliance for global platforms. We look forward to empowering more payment businesses to scale securely and compliantly worldwide. 🙌 #WaaS #MPC #Cobo #AML
Cobo@Cobo_Global

Cobo 与 @BlockSecTeam 达成深度合作,共同打造更安全、更高效、更合规的全球跨境支付基础设施。 通过整合 Cobo Payment API 与 BlockSec KYT 风控能力,我们将为跨境支付平台提供覆盖支付、风控与合规的一站式解决方案,助力企业加速全球业务拓展。 了解更多: cobo.com/zh/post/cobo-b…

English
1
0
0
1.1K
BlockSec รีทวีตแล้ว
BlockSec Phalcon
BlockSec Phalcon@Phalcon_xyz·
.@DriftProtocol on #Solana was exploited several hours ago. According to its public statement, this incident was not caused by a bug in its programs or smart contracts, and there is no evidence of compromised seed phrases. The attacker appears to have tricked multisig signers into approving durable-nonce pre-signatures, enabling admin takeover and parameter abuse. Specifically, the attacker obtained approvals through phishing or misleading signing flows and prepared malicious admin-transfer transactions in advance. At execution, the attacker sent a transaction beginning with AdvanceNonceAccount, which advanced the durable nonce and enabled delayed execution of the pre-signed flow on-chain, rather than expiring like a standard recent-blockhash transaction. The flow then proceeded through proposalApprove and vaultTransactionExecute, triggered UpdateAdmin, and completed the admin takeover. After that, the attacker: 1. created a malicious or illiquid collateral market, identified on-chain as CVT, with permissive risk parameters; 2. switched to an attacker-controlled oracle and inflated CVT pricing; 3. raised or removed withdrawal guardrails across major real-asset markets. The attacker then posted large amounts of CVT as collateral, borrowed against the inflated value, and withdrew real assets including USDC, wETH, dSOL, JLP, and cbBTC. Based on currently traceable on-chain activity, this was the primary value-extraction path. The current loss estimate is $285,279,417. Admin transfer transaction: solscan.io/tx/4BKBmAJn6Td… Loss-tracking reference: #transfers" target="_blank" rel="nofollow noopener">solscan.io/account/HkGz4K…
BlockSec Phalcon tweet media
Drift@DriftProtocol

Earlier today, a malicious actor gained unauthorized access to Drift Protocol through a novel attack involving durable nonces, resulting in a rapid takeover of Drift’s Security Council administrative powers. This was a highly sophisticated operation that appears to have involved multi-week preparation and staged execution, including the use of durable nonce accounts to pre-sign transactions that delayed execution.

English
4
3
15
3.9K
BlockSec รีทวีตแล้ว
BlockSec Phalcon
BlockSec Phalcon@Phalcon_xyz·
ALERT! Our system detected a suspicious exploit targeting an unknown contract, reportedly the LML/USDT staking protocol, on #BSC hours ago, resulting in an estimated loss of ~$950K. While the victim contract is not open-source, our analysis suggests a likely pricing-design flaw: claimable rewards appear to have been calculated using a TWAP/snapshot-based price, while the attacker was able to sell the rewarded tokens at a manipulated spot price. This inconsistency may have enabled the attacker to extract profit through price manipulation and reverse swaps. Specifically, the attacker first used swaps, including a path with receiver = address(0), to push up the LML price in the pool. They then invoked claim through attacker-controlled addresses that had deposited earlier, making them eligible to claim directly during the attack. Example deposit TX: app.blocksec.com/phalcon/explor… Attack TX: app.blocksec.com/phalcon/explor… 🟦 Found by #PhalconSecurity, 🟦 Analyzed via #PhalconExplorer.
BlockSec Phalcon tweet media
English
4
12
46
5.7K
BlockSec รีทวีตแล้ว
BlockSec Phalcon
BlockSec Phalcon@Phalcon_xyz·
Weekly Web3 Security Incident Roundup | Mar 16 – Mar 22, 2026 During the past week, BlockSec detected and analyzed seven attack incidents, with total estimated losses of ~$82.7M. 🟦 Detected by #PhalconSecurity, 📷 Analyzed via #PhalconExplorer.
BlockSec Phalcon tweet media
English
2
6
21
2.6K
BlockSec
BlockSec@BlockSecTeam·
One surprise from our data: GLM-5 from @Zai_org ranked 25th on @OpenAI's EVMbench (20.8%) but jumped to 7th on real-world incidents (42.9%), outperforming Gemini 3.1 Pro. Model rankings shift dramatically across datasets.
BlockSec tweet media
BlockSec@BlockSecTeam

Are AI agents ready for detecting and exploiting smart contract vulnerabilities? We re-evaluated @OpenAI's EVMbench with a contamination-free dataset of real-world hacks. Our data shows different results. 🧵 Paper: arxiv.org/abs/2603.10795

English
1
0
11
2.8K
BlockSec
BlockSec@BlockSecTeam·
Yet AI adds real value when guided by humans. With human context, exploit scores jump from 65% to 95.7% (EVMbench's own data). We @BlockSecTeam have built LLM-powered detectors and static analyzers since 2023. The future of smart contract security is human-in-the-loop.
English
0
0
7
725
BlockSec
BlockSec@BlockSecTeam·
Rankings are also fragile. Swapping the scaffold alone shifts scores by up to 5 percentage points, enough to move a model several positions. EVMbench does not control for this variable, so some "model differences" may just be tooling differences.
BlockSec tweet media
English
1
0
4
1K
Rekt News
Rekt News@RektHQ·
Speaker announcement: @yajinzhou CEO & Co-Founder, BlockSec 70+ papers in top security venues, 10,000+ citations, recognized as one of the Most Influential Scholars in security research for three consecutive years. Now building Web3 security infrastructure at @BlockSecTeam.
Rekt News@RektHQ

Next speaker: @MitchellAmador Founder & CEO @immunefi Running the largest Web3 bug bounty platform, Mitchell has been pushing for proper bounty economics while watching the industry repeatedly ignore the warning signs.

English
3
2
18
10.5K
BlockSec
BlockSec@BlockSecTeam·
"Audit and pray" is not a security strategy. @yajinzhou will be at REKT Security Summit to talk about what real-time incident response actually looks like through @Phalcon_xyz. See you there. @RektHQ 🤝
Rekt News@RektHQ

Speaker announcement: @yajinzhou CEO & Co-Founder, BlockSec 70+ papers in top security venues, 10,000+ citations, recognized as one of the Most Influential Scholars in security research for three consecutive years. Now building Web3 security infrastructure at @BlockSecTeam.

English
1
0
4
1.8K
BlockSec
BlockSec@BlockSecTeam·
Excited to announce @BlockSecTeam has joined the @MorphNetwork Payment Accelerator as an official audit partner! Security is the foundation of every great payment product. Payment Accelerator projects now can get access to our audit services. 👉 blocksec.com/audit
BlockSec tweet media
English
2
0
4
1.2K
BlockSec
BlockSec@BlockSecTeam·
Our Transaction Simulation API now supports Story. See exactly what a transaction will do before it's signed: Full on-chain simulation with USD-denominated balance changes. Story joins: Ethereum · BNB Smart Chain · Base · Optimism · Polygon 👇bit.ly/3P2HNnG
English
0
0
2
736
BlockSec
BlockSec@BlockSecTeam·
Story @StoryProtocol is now live on Phalcon Explorer @Phalcon_xyz ! And with full Pro features unlocked 🎉 Dive into any Story transaction with State Changes, Simulator, and Advanced Debugger. Try this tx example👇 bit.ly/4ll4L5p
BlockSec tweet media
English
14
4
32
6.2K