HackenProof

6K posts

HackenProof banner
HackenProof

HackenProof

@HackenProof

Expert web3 bug bounty and crowdsourced audit platform with 220 programs and over 20 million in bounty DS: https://t.co/yl9Srpuzbb

Start bug bounty journey → เข้าร่วม Mayıs 2018
2.2K กำลังติดตาม37.7K ผู้ติดตาม
ทวีตที่ปักหมุด
HackenProof
HackenProof@HackenProof·
We built AI Powered Triage Assiatant 👇
HackenProof tweet media
English
6
8
65
8.2K
HackenProof
HackenProof@HackenProof·
Most “needs more info” comes from missing start state👇
HackenProof tweet media
English
0
3
15
676
HackenProof
HackenProof@HackenProof·
Think Move fixed all of Solidity’s bugs? Think again. Real exploits prove otherwise. Let’s break it down 👇 🚀 The Ultimate Guide to Move Smart Contract Security A new series on how Move protocols actually get exploited and what auditors should look for.
HackenProof tweet media
English
3
4
19
1.2K
HackenProof รีทวีตแล้ว
V
V@kxrd36·
i found chain halting bug on a network carrying $120M in stablecoins and $1.85B in market value. anyway, good morning! @HackenProof #HackenProof
V tweet media
English
31
17
416
11.9K
✨Alpha_Prime
✨Alpha_Prime@byte_altar·
@HackenProof deposit missing a "payable" plus what everyone is saying concerning using what contract receives in updating shares like what webrainsec says
English
2
0
3
261
HackenProof
HackenProof@HackenProof·
Spot the Bug 🧠 ERC20 deposit accounting What’s the issue in this code?👇
HackenProof tweet media
English
12
2
60
4K
Canvie
Canvie@0xCanvie·
@HackenProof If it's a deflationary token, then require will revert every time.
English
1
0
1
173
Baki
Baki@bakii0094·
@HackenProof uint256 before_ = token.balanceOf(address(this)); token.transferFrom(msg.sender, address(this), amt); uint256 received = token.balanceOf(address(this)) - before_; shares[msg.sender] += received; Developer Lesson: 👉 Never trust amt, always calculate received.
English
1
0
1
208
HackenProof
HackenProof@HackenProof·
@0xSafer Right idea — shares should track actual received
English
0
0
0
25
Safer
Safer@0xSafer·
@HackenProof The transferFrom function credits shares based on the requested amount, instead of the actual amount therein, therefore an attacker can deposit malicious or fake tokens and then go ahead to dilute the contract's balance.
English
1
0
1
236
nooz
nooz@nooz0x·
This is an accounting bug, not just a token edge case. The contract implicitly trusts amt as the deposited value, while the only safe value is the actual balance delta. For fee-on-transfer / deflationary tokens, shares must be minted from balanceAfter - balanceBefore, not from user input.
English
2
0
2
200
HackenProof
HackenProof@HackenProof·
What would the “Bug Bounty” flavor taste like?
HackenProof tweet media
English
4
0
19
913
HackenProof
HackenProof@HackenProof·
📢 Big news from @suidevelopers and @SuiNetwork! A new bounty target is live: Bella Ciao — next-generation Sui VM execution layer rewrite with enhanced performance and new Move capabilities — offers a wide range of bounties: Critical: $100,000 - $1,000,000 High: $10,000 - $50,000 Medium: $5,000 - $10,000 Low: $2,500 - $5,000 Start the #bugbounty hunt right now: hackenproof.com/programs/sui-p…
HackenProof tweet media
English
0
8
79
3.4K
HackenProof
HackenProof@HackenProof·
✅ [New bug bounty challenge] Earn up to $250,000 with @flipcash Flipcash is offering up to $250,000 to the first researcher who successfully exploits Reserve — its autonomous on-chain smart contract on Solana. A $50,000 referral bonus is also available. Read the full details and join here: hackenproof.com/programs/the-f…
HackenProof tweet media
English
3
8
92
6.4K
b4dg0d
b4dg0d@0xb4dg0d·
@HackenProof I found an IMO high-severity bug in your web app, but I only have 82 rep points instead of the >99 required. Is there any way to submit the bug bounty report before farming rep points on other BBPs first?
English
1
0
0
51