CipherShade's profile picture. ๐Œ‚๊Š๐Œ๐Œ”๐Œ‰๐Œ”๐Œ•๐Œ„๐Œ๐Œ‚๐Œ™ ๐ŒŠ๐Œ‰๐Œ‹๐Œ‹๐Œ” ๐Œ‚๐Œ“๐Œ„๐Œ€๐Œ•๐Œ‰แ•“๐Œ‰๐Œ•๐Œ™!

๐Œ‹๐Œ„๊Š

@CipherShade

๐Œ‚๊Š๐Œ๐Œ”๐Œ‰๐Œ”๐Œ•๐Œ„๐Œ๐Œ‚๐Œ™ ๐ŒŠ๐Œ‰๐Œ‹๐Œ‹๐Œ” ๐Œ‚๐Œ“๐Œ„๐Œ€๐Œ•๐Œ‰แ•“๐Œ‰๐Œ•๐Œ™!

Something big is brewing. Eyes on #cantinapectra. ๐Ÿ•ถ๏ธ๐Ÿ–ค

The next chapter of @ethereum security begins ๐Ÿช Today marks the beginning of a new competition: a comprehensive review of Pectra, in partnership with the @ethereumfndn. ๐Ÿ’ฐ $2,000,000 USDC ๐Ÿ“† Live now - March 24th ๐Ÿ”— Below



๐Œ‹๐Œ„๊Š reposted

Level up your cybersecurity knowledge! A compilation of the best Web3 security alpha from our top engineers ๐Ÿงต ๐Ÿ“š Blog Posts 1๏ธโƒฃ Preparing for the Challenges of Smart Contract Audits ๐Ÿ”— zokyo.io/blog/navigatinโ€ฆ Compilation of essential tips for pre-audit preparation 2๏ธโƒฃ Theโ€ฆ


๐Œ‹๐Œ„๊Š reposted

Ether Transfers in Solidity: transfer(), send(), and call() In Solidity, there are three primary ways to transfer Ether between contracts or to external accounts: transfer(), send(), and call(). Each method has different behaviors, including safety mechanisms and gasโ€ฆ

0xCharlesWang's tweet image. Ether Transfers in Solidity: transfer(), send(), and call()

In Solidity, there are three primary ways to transfer Ether between contracts or to external accounts: transfer(), send(), and call(). Each method has different behaviors, including safety mechanisms and gasโ€ฆ
0xCharlesWang's tweet image. Ether Transfers in Solidity: transfer(), send(), and call()

In Solidity, there are three primary ways to transfer Ether between contracts or to external accounts: transfer(), send(), and call(). Each method has different behaviors, including safety mechanisms and gasโ€ฆ
0xCharlesWang's tweet image. Ether Transfers in Solidity: transfer(), send(), and call()

In Solidity, there are three primary ways to transfer Ether between contracts or to external accounts: transfer(), send(), and call(). Each method has different behaviors, including safety mechanisms and gasโ€ฆ

๐Œ‹๐Œ„๊Š reposted

Spot this bug, and you might become a Sherlock Lead Senior Watson (LSW) one day. The winner will be picked in 24 hours. This code is a simplified version of an actual vulnerability found in a Sherlock contest. Hint: Look closely at the disableMaxLock function, consider allโ€ฆ

sherlockdefi's tweet image. Spot this bug, and you might become a Sherlock Lead Senior Watson (LSW) one day.

The winner will be picked in 24 hours. 

This code is a simplified version of an actual vulnerability found in a Sherlock contest.

Hint: Look closely at the disableMaxLock function, consider allโ€ฆ

๐Œ‹๐Œ„๊Š reposted

Uninitialized Storage Pointers/ Uninitialized State Bugs Explained In Solidity, data storage is categorized into three main types: storage, memory, and calldata, each serving distinct purposes within smart contracts. Storage variables are part of the contract's persistent stateโ€ฆ

0xCharlesWang's tweet image. Uninitialized Storage Pointers/ Uninitialized State Bugs Explained

In Solidity, data storage is categorized into three main types: storage, memory, and calldata, each serving distinct purposes within smart contracts. 
Storage variables are part of the contract's persistent stateโ€ฆ

๐Œ‹๐Œ„๊Š reposted

Inheritance in Smart Contracts This concept, borrowed from object-oriented programming, enables code reusability and modular design. By inheriting from a parent contract, a child contract can access and utilize its state variables, functions, and modifiers. Solidity supportsโ€ฆ

0xCharlesWang's tweet image. Inheritance in Smart Contracts

This concept, borrowed from object-oriented programming, enables code reusability and modular design. By inheriting from a parent contract, a child contract can access and utilize its state variables, functions, and modifiers. Solidity supportsโ€ฆ

๐Œ‹๐Œ„๊Š reposted

No delegatecall: Preventing unwanted delegatecalls When delegatecall is used in a contract, it executes code in the context of another contract. This means the code runs in the context of the calling contract (using its storage, balance, and address), but the actual code toโ€ฆ

0xCharlesWang's tweet image. No delegatecall: Preventing unwanted delegatecalls

When delegatecall is used in a contract, it executes code in the context of another contract. This means the code runs in the context of the calling contract (using its storage, balance, and address), but the actual code toโ€ฆ
0xCharlesWang's tweet image. No delegatecall: Preventing unwanted delegatecalls

When delegatecall is used in a contract, it executes code in the context of another contract. This means the code runs in the context of the calling contract (using its storage, balance, and address), but the actual code toโ€ฆ

๐Œ‹๐Œ„๊Š reposted

One great method that can improve your learning is a feedback form ๐Ÿ“. It helped me WIN my first @code4rena contest back in November ๐Ÿ† And it helped me get a chance to work with @GuardianAudits, auditing some of the biggest names in crypto ๐Ÿ’ผ. This isn't a technique to doโ€ฆ

0x3b33's tweet image. One great method that can improve your learning is a feedback form ๐Ÿ“.

It helped me WIN my first @code4rena contest back in November ๐Ÿ†

And it helped me get a chance to work with @GuardianAudits, auditing some of the biggest names in crypto ๐Ÿ’ผ.

This isn't a technique to doโ€ฆ
0x3b33's tweet image. One great method that can improve your learning is a feedback form ๐Ÿ“.

It helped me WIN my first @code4rena contest back in November ๐Ÿ†

And it helped me get a chance to work with @GuardianAudits, auditing some of the biggest names in crypto ๐Ÿ’ผ.

This isn't a technique to doโ€ฆ

๐Œ‹๐Œ„๊Š reposted

Solana PDAs : Here Is How It Works - Part - 1 Let's explore a main use case for Program Derived Accounts (PDAs). It allows a program to have control over a given account, and pseudo-sign transactions to modify it. We first create a pool, derived from the creator's address, andโ€ฆ

Bount3yHunt3r's tweet image. Solana PDAs : Here Is How It Works - Part - 1

Let's explore a main use case for Program Derived Accounts (PDAs). It allows a program to have control over a given account, and pseudo-sign transactions to modify it.

We first create a pool, derived from the creator's address, andโ€ฆ
Bount3yHunt3r's tweet image. Solana PDAs : Here Is How It Works - Part - 1

Let's explore a main use case for Program Derived Accounts (PDAs). It allows a program to have control over a given account, and pseudo-sign transactions to modify it.

We first create a pool, derived from the creator's address, andโ€ฆ

๐Œ‹๐Œ„๊Š reposted

Understanding Low-Level Call & High-Level Call in Solidity In Solidity, there are two primary ways to invoke functions or interact with other contracts: high-level and low-level calls. These two methods offer different levels of abstraction and control over the interactionโ€ฆ

0xCharlesWang's tweet image. Understanding Low-Level Call & High-Level Call in Solidity

In Solidity, there are two primary ways to invoke functions or interact with other contracts: high-level and low-level calls. These two methods offer different levels of abstraction and control over the interactionโ€ฆ
0xCharlesWang's tweet image. Understanding Low-Level Call & High-Level Call in Solidity

In Solidity, there are two primary ways to invoke functions or interact with other contracts: high-level and low-level calls. These two methods offer different levels of abstraction and control over the interactionโ€ฆ
0xCharlesWang's tweet image. Understanding Low-Level Call & High-Level Call in Solidity

In Solidity, there are two primary ways to invoke functions or interact with other contracts: high-level and low-level calls. These two methods offer different levels of abstraction and control over the interactionโ€ฆ

๐Œ‹๐Œ„๊Š reposted

Insecure randomness Explained Generating random numbers has found various applications in the Web3 space. For example, a gaming, gambling/bet DApp finds this useful in determining pool winners. However, doing this can create an in-way for attacks. Insecure randomness refers toโ€ฆ

0xCharlesWang's tweet image. Insecure randomness Explained

Generating random numbers has found various applications in the Web3 space. For example, a gaming, gambling/bet DApp finds this useful in determining pool winners. However, doing this can create an in-way for attacks.

Insecure randomness refers toโ€ฆ
0xCharlesWang's tweet image. Insecure randomness Explained

Generating random numbers has found various applications in the Web3 space. For example, a gaming, gambling/bet DApp finds this useful in determining pool winners. However, doing this can create an in-way for attacks.

Insecure randomness refers toโ€ฆ

๐Œ‹๐Œ„๊Š reposted

~2 years ago I got into web3 security, ~6 months later I went all-in on it - best decision ever. Ever since I jumped in that rabbit hole, it's been 24/7/365 non-stop researching, auditing, organising reviews. If I was starting today from scratch I'd 100% do it all over again.


๐Œ‹๐Œ„๊Š reposted

How Call Functions Work in Solidity The โ€œcallโ€ function in Solidity is a low-level function that enables contract-to-contract communication by invoking functions or sending Ether to a specified contract address. It operates by taking calldata and executing it on the intendedโ€ฆ

0xCharlesWang's tweet image. How Call Functions Work in Solidity

The โ€œcallโ€ function in Solidity is a low-level function that enables contract-to-contract communication by invoking functions or sending Ether to a specified contract address. It operates by taking calldata and executing it on the intendedโ€ฆ
0xCharlesWang's tweet image. How Call Functions Work in Solidity

The โ€œcallโ€ function in Solidity is a low-level function that enables contract-to-contract communication by invoking functions or sending Ether to a specified contract address. It operates by taking calldata and executing it on the intendedโ€ฆ

๐Œ‹๐Œ„๊Š reposted

Come become an auditor and forget all of this bullshit forever

a few weeks ago i did interviews, coding puzzles, all the silly bullshit, all to get a "junior engineer" offer from smg/consensys for half the pay and double the hours i quoted. they even cited the fact that i don't have degree companies that demand degrees are not worth yourโ€ฆ



๐Œ‹๐Œ„๊Š reposted

Algebra's Reserve Logic - A Competitive Advantage Did you know that @CryptoAlgebra developed a unique reserve logic, which allows them to redistribute tokens which are transferred directly to the pair / rebase tokens, as a fee to the liquidity providers in the current activeโ€ฆ

0xCharlesWang's tweet image. Algebra's Reserve Logic - A Competitive Advantage

Did you know that @CryptoAlgebra  developed a unique reserve logic, which allows them to redistribute tokens which are transferred directly to the pair / rebase tokens, as a fee to the liquidity providers in the current activeโ€ฆ

๐Œ‹๐Œ„๊Š reposted

How to detect Honeypot Tokens as non-technical user Detecting honeypot tokens as a non-technical user can be challenging, but with a few steps, you can significantly reduce your risk when considering investing in new tokens on blockchain platforms. Hereโ€™s a practical approachโ€ฆ

0xCharlesWang's tweet image. How to detect Honeypot Tokens as non-technical user

Detecting honeypot tokens as a non-technical user can be challenging, but with a few steps, you can significantly reduce your risk when considering investing in new tokens on blockchain platforms. 

Hereโ€™s a practical approachโ€ฆ
0xCharlesWang's tweet image. How to detect Honeypot Tokens as non-technical user

Detecting honeypot tokens as a non-technical user can be challenging, but with a few steps, you can significantly reduce your risk when considering investing in new tokens on blockchain platforms. 

Hereโ€™s a practical approachโ€ฆ
0xCharlesWang's tweet image. How to detect Honeypot Tokens as non-technical user

Detecting honeypot tokens as a non-technical user can be challenging, but with a few steps, you can significantly reduce your risk when considering investing in new tokens on blockchain platforms. 

Hereโ€™s a practical approachโ€ฆ
0xCharlesWang's tweet image. How to detect Honeypot Tokens as non-technical user

Detecting honeypot tokens as a non-technical user can be challenging, but with a few steps, you can significantly reduce your risk when considering investing in new tokens on blockchain platforms. 

Hereโ€™s a practical approachโ€ฆ

๐Œ‹๐Œ„๊Š reposted

How can @Tether_to freeze USDT? USDT is the biggest stablecoin with a circulating supply of over 110 billion USD. Centralized stablecoins always come with the same risk: Centralized control Tether's ability to freeze USDT revolves around the inclusion of administrativeโ€ฆ

0xCharlesWang's tweet image. How can @Tether_to freeze USDT?

USDT is the biggest stablecoin with a circulating supply of over 110 billion USD.

Centralized stablecoins always come with the same risk: Centralized control

Tether's ability to freeze USDT revolves around the inclusion of administrativeโ€ฆ
0xCharlesWang's tweet image. How can @Tether_to freeze USDT?

USDT is the biggest stablecoin with a circulating supply of over 110 billion USD.

Centralized stablecoins always come with the same risk: Centralized control

Tether's ability to freeze USDT revolves around the inclusion of administrativeโ€ฆ
0xCharlesWang's tweet image. How can @Tether_to freeze USDT?

USDT is the biggest stablecoin with a circulating supply of over 110 billion USD.

Centralized stablecoins always come with the same risk: Centralized control

Tether's ability to freeze USDT revolves around the inclusion of administrativeโ€ฆ
0xCharlesWang's tweet image. How can @Tether_to freeze USDT?

USDT is the biggest stablecoin with a circulating supply of over 110 billion USD.

Centralized stablecoins always come with the same risk: Centralized control

Tether's ability to freeze USDT revolves around the inclusion of administrativeโ€ฆ

๐Œ‹๐Œ„๊Š reposted

How ERC777's hook receiver feature could be used as an attack vector: - The attack vector in short - ERC777 and its hooks - The attack vector with arbitrary calls mixbytes.io/blog/one-more-โ€ฆ


๐Œ‹๐Œ„๊Š reposted

UniswapV2: _mintFee explained Within the UniswapV2Pair, the _mintFee function seems to be one of the slightly more complicated concepts. Today, I will dissect this mechanism. The _mintFee function is particularly notable for its role in managing lp fees within the protocol.โ€ฆ

0xCharlesWang's tweet image. UniswapV2: _mintFee explained

Within the UniswapV2Pair, the _mintFee function seems to be one of the slightly more complicated concepts. 

Today, I will dissect this mechanism.

The _mintFee function is particularly notable for its role in managing lp fees within the protocol.โ€ฆ

๐Œ‹๐Œ„๊Š reposted

UniswapV2 Router Flaw: Double Taxation The UniswapV2 router exposes two distinct functions for removing liquidity with transfer-tax token pairs: a) removeLiquidity b) removeLiquidityETHSupportingFeeOnTransferTokens The Standard Liquidity Removal: removeLiquidity Theโ€ฆ

0xCharlesWang's tweet image. UniswapV2 Router Flaw: Double Taxation

The UniswapV2 router exposes two distinct functions for removing liquidity with transfer-tax token pairs:

a)  removeLiquidity

b) removeLiquidityETHSupportingFeeOnTransferTokens

The Standard Liquidity Removal: removeLiquidity

Theโ€ฆ
0xCharlesWang's tweet image. UniswapV2 Router Flaw: Double Taxation

The UniswapV2 router exposes two distinct functions for removing liquidity with transfer-tax token pairs:

a)  removeLiquidity

b) removeLiquidityETHSupportingFeeOnTransferTokens

The Standard Liquidity Removal: removeLiquidity

Theโ€ฆ

Loading...

Something went wrong.


Something went wrong.