security
Discussion on all things web3 security and auditing
DCG 201 pfp

@dcg201

BOOTSTRAP 🥾: SUCCESSFUL DEPENDENCIES 💾: INSTALLED NETWORK 📡 : CONNECTED CONTENT 👨🏾‍💻: █████████████████▒▒▒▒ 89% IMPORTANT & EXCITING #DCG201 ANNOUNCEMENTS LATER TODAY $XMR @tbsocialist @zachxbt @officercia
0 reply
0 recast
3 reactions

Icetoad 🍕 🎩 🐈 pfp

@icetoad.eth

The widespread use of door locks makes it safe for you to not use a door lock lol
1 reply
0 recast
11 reactions

Kamilla pfp

@pianokamilla

Taking care of my cyber security today I suggest you invest time and money to make sure you’re as protected as possible
0 reply
0 recast
8 reactions

DCG 201 pfp

@dcg201

The @ledgerofficial white hat team discovered a flaw in Tangem cards that makes brute force attacks possible by exploiting vulnerabilities in their secure channel implementation leveraging a “tearing” technique. This allows attackers to bypass the card’s security delay mechanism after failed authentication attempts. The vulnerabilities cannot be patched on existing cards because they’re not upgradable. It is important to note that this attack requires physical access to a Tangem card. https://www.ledger.com/blog-brute-force-attack-tangem @officercia
0 reply
1 recast
2 reactions

Josh Ellithorpe pfp

@quest

If you happen to use PureVPN, they have an IPv6 leak. https://anagogistis.com/posts/purevpn-ipv6-leak/
2 replies
0 recast
5 reactions

DCG 201 pfp

@dcg201

On September 2, 2025, the $Bunni V2 protocol suffered a major exploit resulting in the loss of $2.4M on Ethereum and $5.9M on UniChain. The attack targeted flaws in the liquidity accounting mechanisms of BunniHook, specifically exploiting a precision error by performing multiple carefully sized swaps that yielded more tokenOut than intended. https://www.quillaudits.com/blog/hack-analysis/bunni-v2-exploit @uniswap @officercia @zachxbt
0 reply
0 recast
2 reactions

Peter pfp

@silencedogood.eth

When a Valid Critical Goes Nowhere: Lessons from 14 Weeks in ImmuneFi Limbo https://medium.com/@sillencedogood/when-a-valid-critical-goes-nowhere-lessons-from-14-weeks-in-immunefi-limbo-7764039316a2
0 reply
0 recast
1 reaction

Max pfp

@segall

All engineering at Privy is security engineering We architect with zero trust assumptions, design for failure, and build secure-by-default systems that scale How @andrewmohawk and @0xasta lead us in securing billions of assets across hundreds of millions of txns 👇
0 reply
0 recast
7 reactions

Adam pfp

@adamhurwitz.eth

Mullvad and WireGuard are the only VPNs that GrapheneOS recommends. I will compare Mullvad to Proton VPN since I have to frequently toggle Proton VPN on|off on desktop for sites I use on a daily basis. I'm also excited to test @gnosischain's Hopr's distributed product once it's more consumer ready. https://grapheneos.org/faq#vpn-support:~:text=The%20only%20apps%20we%20can%20recommend%20is%20the%20official%20WireGuard%20app%20and%20the%20official%20Mullvad%20app.
3 replies
1 recast
2 reactions

Darryl Yeo 🛠️ pfp

@darrylyeo

https://farcaster.xyz/nickysap/0x7220e9ef
0 reply
0 recast
3 reactions

Adam pfp

@adamhurwitz.eth

For @safe multi factor verification MFV generating the transaction tx hashes with @openzeppelin Safe Utils on both the device|UI where the tx is created and on separate devices|UIs signing the tx is essential. This way the tx hashes created between devices|UIs can be compared. Otherwise using Safe Utils with data from only 1 source would not detect if that source is showing bad info while displaying a correct tx hash. E.g. 1. Create tx on 1st device with Safe UI 2. Create tx hashes with Safe Utils and Safe UI data 3. Sign on 2nd device with software account, E.g. @metamask 4. Create tx hashes with Safe Utils and MetaMask data 5. Compare tx hashes created from both Safe UI and MetaMask to make sure they're the same Thank you to @so for talking through different tx signing scenarios!
0 reply
0 recast
3 reactions

sid pfp

@sidsethi

“Protonmail behaves like a CIA/NSA honeypot”
2 replies
0 recast
3 reactions

Paul Berg pfp

@prberg

How big is the security risk if a VSCode extension gets compromised? And is there anything we can do to mitigate the potential risk?
4 replies
0 recast
14 reactions

Adam pfp

@adamhurwitz.eth

The best way for most users to multi factor verify MFV their @safe transactions txs on multiple devices outside of a device account DA (@ethos and @ledgerofficial) showing full tx details, is to copy the Tenderly simulation link to a 2nd device than where the tx is created. I'm looking forward to full DA readability with Safes later this year. https://ethereum.stackexchange.com/questions/168674/simulate-safe-transaction-tx-with-tenderly-on-a-different-device-than-where-the/168693#168693
2 replies
0 recast
2 reactions

sid pfp

@sidsethi

Hey security folks here, would love your critical feedback on the @earthfast security model 🙏
2 replies
2 recasts
6 reactions