Brainiac5 (@shealtielanz) 's Twitter Profile
Brainiac5

@shealtielanz

Preventing Hacks, Saving users funds & assets on the blockchain from Black hats

ID: 1597365506444500992

calendar_today28-11-2022 23:03:35

3,3K Tweet

1,1K Followers

368 Following

JecikPo (@jecikpo) 's Twitter Profile Photo

Sharing some of my notes on how Sway manages storage of its contracts. If you are planning to join upcoming Sway audits at Immunefi and still storage is a bit of a mystery, have a look! github.com/jecikpo/Audit-…

Brainiac5 (@shealtielanz) 's Twitter Profile Photo

Wrote a simple CTF using a LiquidityPool contract in the Fuel docs it will help anyone out there interested in Sway to understand how bugs can be found in contracts written in Sway and also How to write Tests in Rust for POCs Try it out :) github.com/shealtielanz/S…

Brainiac5 (@shealtielanz) 's Twitter Profile Photo

Huge congrats to JecikPo for being the first to pass my Simply-Sway-CTFs LiquidityPool Challenge. 🔥🎉 Also Thanks to him for giving me adjustment ideas, so the challenge can be easier for anyone who wants to give it a try. ❤️‍🔥

CharlesWang (@0xcharleswang) 's Twitter Profile Photo

Explanation of Algebra DEX Engine V4 @ TOKEN2049 🇸🇬 's Liquidity Pools (Based on Camelot) Algebra’s DEX is a concentrated liquidity DEX. Pools are consisting of two tokens. For example, a pool can be created with USDC and WETH. Below is a breakdown of how to work with these pools, fetch price

Explanation of <a href="/CryptoAlgebra/">Algebra DEX Engine V4 @ TOKEN2049 🇸🇬</a> 's Liquidity Pools (Based on <a href="/CamelotDEX/">Camelot</a>)

Algebra’s DEX is a concentrated liquidity DEX. Pools are consisting of two tokens. 

For example, a pool can be created with USDC and WETH. Below is a breakdown of how to work with these pools, fetch price
JecikPo (@jecikpo) 's Twitter Profile Photo

Check out this awesome brand new CTF for Sway by Brainiac5, if you're seriously thinking about securing your Sway contracts that's your starting point!

WhiteHatMage (@whitehatmage) 's Twitter Profile Photo

Top audit firms still miss Critical bugs. Just set up a bounty program to keep your users safe. Protocols with no rewards for whitehats are destined to get rekt, as good actors are not looking into their codebases. It's also a good metric to check how reliable a project is.

Brainiac5 (@shealtielanz) 's Twitter Profile Photo

There are days where everything seems to work out fine. Appreciate those days So that you’d always remember that your life isn’t starved of grace.

Sev (@00xsev) 's Twitter Profile Photo

This is a lengthy reflection on my experiences and lessons learned during the 15-day active escalation of my issue during the Maker DAO (now Sky) contest. ## Most valuable - Found 1 of 2 findings that were rewarded, so my input was valuable even after so many audits by big

This is a lengthy reflection on my experiences and lessons learned during the 15-day active escalation of my issue during the Maker DAO (now Sky) contest.

## Most valuable
  - Found 1 of 2 findings that were rewarded, so my input was valuable even after so many audits by big
0x73696d616f (@0xsimao) 's Twitter Profile Photo

After having been doing both small private and contest audits for a few months, I can confidently say that longer audits are much more efficient. The overhead involved in small audits is significant, leading to a much lower nsloc / time unit capacity.