this is not just a database breach. users' signer uuids get stored in the db, but in order to use those and cast on the user's behalf you need the neynar api key associated with those signers. and the api key doesn't usually get stored in the db.
how did the api key get compromised?
there's more to this story
3
7
29
HexMaze ⬢
moe-hexmaze.web.val.run
you can randomize in frame
code open source: www.val.town/v/moe/hexmaze
inspired by @thepapercrane
3
1
6
Over the past couple of weeks, I’ve been rebuilding @buttrfly from scratch as an expo/next app to bring it to web while sharing the same code/ui as the mobile app.
buttrfly.app
The alpha version of the web app is now ready! It’s very basic and missing lots of features, but wanted to get this out early to get ...
8
12
32
porting more of my p5js projects to valtown.
moe-mosaiclipse.web.val.run
all open source: www.val.town/v/moe/mosaic...
2
9
6





