fuzz755

15.8K posts

fuzz755 banner
fuzz755

fuzz755

@fuzz755

ad augusta per angusta

เข้าร่วม Eylül 2020
567 กำลังติดตาม333 ผู้ติดตาม
fuzz755
fuzz755@fuzz755·
@mamoud___ Faudrait que je commence je me fais peut être une fausse impression
Français
0
0
1
25
Le vieux
Le vieux@mamoud___·
@fuzz755 La syntaxe elle est ok je trouve je trouve pas du tout repoussant
Français
1
0
0
22
Le vieux
Le vieux@mamoud___·
Jme sens trop heureux ajd j'aime pas trop ca. Jvais ecrire quelque ligne de rust et laisser le compilateur me crier dessus parce que chui un bon a rien ca me remettra les idées en place tiens
Français
3
0
7
342
fuzz755
fuzz755@fuzz755·
@mamoud___ T’es chaud, j’aimerais bien m’y mettre mais ça donne pas envie quand je vois la syntaxe sans comprendre
Français
1
0
0
31
Le vieux
Le vieux@mamoud___·
@fuzz755 Rien de bien special j'ai pas de besoin actuel qui requiert du Rust. Mais vue que j'aime beaucoup le langage jme fais des ptits challenges neetcode quand jme fais chier ( 100% usless mais ca me fait passer mon ennui)
Français
1
0
1
39
fuzz755
fuzz755@fuzz755·
Y’a des sénégalais qui peuvent me dire s’ils connaissent cette école ? itd-hub.com J’arrive pas à savoir si c’est une vraie ou un faux site
Français
0
0
0
61
Cyfrin CodeHawks
Cyfrin CodeHawks@CodeHawks·
Announcing First Flight #58: NFT Dealers! Thank you to @ZhivkoNiko40281 for this submission and their commitment to Web3 Security 🙏 nSLOC: 253 Start date: March 12, 2026 Noon UTC Duration: 1 Week Get real auditing experience! Check it out! 👇 (1/2)
Cyfrin CodeHawks tweet media
English
4
2
25
1.4K
fuzz755
fuzz755@fuzz755·
wtf is my problem i was 16
English
0
0
0
40
fuzz755
fuzz755@fuzz755·
my oldest transaction on Ethereum... 🥲
fuzz755 tweet media
English
1
0
1
100
fuzz755 รีทวีตแล้ว
Ali Grids
Ali Grids@AliGrids·
just in case… obviously
Ali Grids tweet media
English
57
574
8.8K
229.6K
fuzz755 รีทวีตแล้ว
f4lc0n
f4lc0n@al_f4lc0n·
I Saved Injective's $500M. They Pay Me $50K. I like hunting bugs on @immunefi . I'm decent at it. - #1 — Attackathon | Stacks - #2 — Attackathon | Stacks II - #1 — Attackathon | XRPL Lending Protocol - 1 Critical and 1 High from bug bounties (not counting this one) Life was good. Then I found a Critical vulnerability in @injective . This vulnerability allowed any user to directly drain any account on the chain. No special permissions needed. Over $500M in on-chain assets were at risk. I reported it through Immunefi. The next day, a mainnet upgrade to fix the bug went to governance vote. The Injective team clearly understood the severity. Then — silence. For 3 months. No follow up. No technical discussion. Nothing. A few days ago, they notified me of their decision: $50K. The maximum payout for a Critical vulnerability in their bug bounty program is $500K. I disputed it. Silence again. No explanation for the reduced payout. No explanation for the 3 month ghost. No conversation at all. To be clear: the $50K has not been paid either. I've seen others share bad experiences with bug bounty payouts recently. I never thought it would happen to me. I can't force them to do the right thing. But I won't let this be forgotten. I will dedicate 10% of all my future bug bounty earnings to making sure this story stays visible — until Injective pays what I deserve. Full Technical Report: github.com/injective-wall…
English
520
526
4.6K
1.8M
pashov
pashov@pashov·
@fuzz755 Why do you think some tools are not positioning to be part of CI/CD at this stage
English
1
0
0
27
pashov
pashov@pashov·
How much do you think an AI audit scan should cost? Only honest answers, comment below.
English
54
2
86
13.6K
fuzz755
fuzz755@fuzz755·
@0xsadikbaba It will never overflow it’s EVM. There is not enough ETH in the world to make it overflow
English
0
0
1
92
Sadik
Sadik@0xsadikbaba·
Two major issues in this contract Unchecked deposit can overflow The deposit function uses unchecked when increasing the user balance. This removes Soliditys overflow protection and could cause the balance to wrap if extreme values are used. Broken balance logic the increaseBalance function lets anyone increase their balance without sending ETH. This means a user can artificially inflate their balance in the contract state without actually depositing funds. Contract accounting becomes unreliable Users can create fake balances The system’s business logic breaks Always ensure balance updates are tied to real value transfers and avoid unnecessary unchecked blocks.
Sadik@0xsadikbaba

WHO CAN SPOT THE BUG ?

English
2
2
7
461
fuzz755
fuzz755@fuzz755·
my first submission for NFT Dealers on @CodeHawks
fuzz755 tweet media
English
0
0
1
64
fuzz755
fuzz755@fuzz755·
@pashov Of course, it should be part of CI/CD
English
1
0
1
21
pashov
pashov@pashov·
@fuzz755 True. Would you do it always before pushing to repo sir?
English
1
0
0
28
fuzz755
fuzz755@fuzz755·
@pashov It’s a bit awkward if an auditor has to scan code with AI, any protocol’s dev should be able to do it before pushing the code to the repo
English
1
0
1
21
pashov
pashov@pashov·
@fuzz755 Are you okay with doing these "scans" yourself?
English
1
0
0
27
fuzz755
fuzz755@fuzz755·
@pashov I only considered API costs, but they may be additional costs for service/servers/…
English
1
0
1
23