DanielSlothx Profile Banner
Daniel Tan Profile
Daniel Tan

@DanielSlothx

Followers
200
Following
1K
Media
96
Statuses
400

Web3 security researcher | Smart contract audit lead | Saved $200K tokens from the Phemex CEX hack | Contributor to audit agent @AgentLISA_ai

Blockchain
Joined February 2010
Don't wanna be here? Send us removal request.
@DanielSlothx
Daniel Tan
1 day
#HackerLostFunds Due to the hacker took his/her own funds(21 $BTC and 152K $XRP) into the attack, after the liquidation, the hacker's $2.7M assets were reduced to zero.
Tweet media one
0
0
1
@DanielSlothx
Daniel Tan
1 day
#VenusRescue The @VenusProtocol team RESCUED $13M stolen funds from the hacker by force liquidating the hacker's collateral that included the hacker's own $2.7M, due to the hacker deposited the stolen assets back to the Venus protocol in the attack. https://t.co/h0jsun5RS4
Tweet media one
Tweet media two
1
0
1
@DanielSlothx
Daniel Tan
27 days
#Monero 51% hashrate experiment. #Qubic announced that they achieved over 51% hashrate dominance, resulting in six blocks being reorganized and sixty blocks orphaned on the Monero chain.
@_Qubic_
Qubic
27 days
Another busy but historic week in Qubic! During the Epoch 173 we have reached over 51% of total Monero hashrate and earned over $240k in mining rewards. Profitability report is in the link below⏬
Tweet media one
0
0
1
@DanielSlothx
Daniel Tan
2 months
3⃣Missing slippage control in tax swap leading to potential loss of funds https://t.co/ub8ok35fmj The corresponding Code4rena Virtuals protocol competition reward result:
0
0
0
@DanielSlothx
Daniel Tan
2 months
All 3 vulnerabilities: 1⃣Unrestricted access to addValidator allows anyone to add validators https://t.co/uDuLvFf5QC 2⃣Burning tokens does not decrease the total supply, leading to incorrect accounting. https://t.co/D18XA7SXkd
1
0
0
@DanielSlothx
Daniel Tan
2 months
Then just wait a few minutes for the #AgentLisa scan results, submit it to #Code4rena and earn rewards $$$ 🤑🤑🤑💸💸💸💵💵💵 https://t.co/mDxa8sCVab
Tweet media one
1
0
2
@DanielSlothx
Daniel Tan
2 months
To re-produce how the audit agent #AgentLISA find the bug, we just need to copy paste the repository of the virtuals protocol audit competion to the LISA chat box, then select the target smart contract(s) https://t.co/T1YNVNVsS6 2/n
Tweet media one
1
0
2
@DanielSlothx
Daniel Tan
2 months
#AgentLisa It is interesting and unbelievable that the audit agent @AgentLISA_ai makes me find 1 high bug and 2 medium bugs on the #Code4rena #Virtuals protocol audit competition and earn a total $39 reward. @code4rena @virtuals_io 1/n https://t.co/mDxa8sCVab
Tweet media one
Tweet media two
Tweet media three
2
0
14
@DanielSlothx
Daniel Tan
2 months
#ArcadiaFi $3.5M hack. I always try to summary a hack into one tweet, but this time it seems hard for this one due to the the hack traverses many contracts. Under the hood, an unchecked malicious `router` address is injected to drain the victims' asset.
Tweet media one
Tweet media two
@SolidityScan
SolidityScan
2 months
🚨 On 15th July 2025, Arcadia Finance (@ArcadiaFi) was exploited for ~3.5M USD due to an unchecked external call in SwapLogic._swapViaRouter(). Read the full hack analysis here: https://t.co/F6qw02OEnL
Tweet media one
0
0
2
@DanielSlothx
Daniel Tan
2 months
#GMX $40M hack. A hacker manipulates the AUM(Assets Under Management) value that determines the GLP value after minting the GLP and before unstaking GLP by reenter the GMX:Vault to get profit.
Tweet media one
Tweet media two
Tweet media three
0
0
1
@DanielSlothx
Daniel Tan
2 months
Product link: https://t.co/pii8g0ScVv Scan 3+ contracts with LISA (free credits: LISAGOLIVE). Use AgentLisa to safeguard your or your clients' smart contract(assets)!
agentlisa.ai
LISA is an LLM-powered Intelligent Security Analyzer for Solidity Smart Contracts
0
0
0
@DanielSlothx
Daniel Tan
2 months
#AgentLISA is an LLM-powered smart contract analyzer that achieves 90% Detection on OWASP Smart Contract Top 10. We’re offering $2,000 in rewards to users who share actionable feedback to help us improve! https://t.co/IIOs7j4O3F
Tweet card summary image
docs.google.com
Welcome to the LISA Feedback Program! We're offering a $2,000 prize pool to reward users who help us improve LISA — the AI-powered smart contract security analyzer. The more detailed and thoughtful...
1
0
1
@DanielSlothx
Daniel Tan
3 months
#Bankroll expoit. An reward calculation error in the `distribute` function resulted in a total loss of $65K, which is detected by an AI Audit platform @AgentLISA_ai ( https://t.co/pii8g0ScVv). #AI is unbelievable. #LISA #AIAudit
Tweet media one
@AgentLISA_ai
LISA
3 months
🔍 #LISA detects the critical vulnerability behind @Bankroll_Status' $65K loss. The flaw lies in the `distribute` function: profit calculations weren't capped to the available `dividendBalance_`, leading to inflated rewards and reserve drainage (e.g., `elephantReserve_`). 💡
Tweet media one
0
0
0
@DanielSlothx
Daniel Tan
4 months
Another analysis from @neeksec https://t.co/FJYKXP82zN
Tweet media one
@neeksec
n33k
4 months
After investigating the Cetus exploit transaction, I believe I have identified the root cause of the bug. The issue stems from a type casting from u256 to u64 within the get_amount_by_liquidity function.
0
0
2
@DanielSlothx
Daniel Tan
4 months
#Cetus $223M exploit. Under the hood, an arithmetic overflow issue in the `checked_shlw` function was exploited by the hacker to gain extra liquidity when adding the liquidity, which results in $233M loss($162M of them has been frozen)
Tweet media one
@realvisual
Lei Wu
4 months
.@CetusProtocol was reported to have suffered a security incident resulting in a loss of ~$223M: $162M worth of funds has been frozen on the #Sui, while $60M has already been transferred to #Ethereum. Due to the lack of advanced forensic tools comparable to Phalcon Explorer
Tweet media one
1
0
3
@DanielSlothx
Daniel Tan
5 months
#KiloEx $7.4M exploit. A hack exploited the `MinimalForwarder` contract, using a forged signature to impersonate trusted roles, due to the critical access control flaw in the contract, and gained unauthorized access to the `KiloPriceFeed::setPrices()` function & manipuated prices
Tweet media one
@KiloEx_perp
KiloEx
5 months
🚨 Security Incident Announcement: KiloEx Vault Exploit Dear KiloEx Community, We regret to inform you that the KiloEx Vault has been exploited. The attacker’s wallet address is: 0x00fac92881556a90fdb19eae9f23640b95b4bcbd We urge all partner protocols and platforms to
0
0
4
@DanielSlothx
Daniel Tan
5 months
#SIR exploit. A hacker manipulated the value stored on the #transientstorage to by-pass the caller check, due to the check condition loads value from the transient storage, which was manipulated by the hacker due to the contract does not clear the transient storage at right point
Tweet media one
@leveragesir
SIR (🦍^🎩)
6 months
So we go the worst news a protocol could received and got hacked for our entire TVL ($355k). I (@Xatarrer) would like to not throw the towel here as I truly believe in SIR. If you also believe in the core protocol and have any idea on how to proceed forward, please DM.
0
0
0
@DanielSlothx
Daniel Tan
7 months
Some thought: Have to thanks to #Bybit's transparent, otherwise we will still ignore the potential issue on the #Safe{Wallet} infrastructure, though there are already some hacks, the #Radiant hack and the #WazirX hack, related to Safe{Wallet} before.
0
0
2
@DanielSlothx
Daniel Tan
7 months
#Bybit exploit. On February 21, 2025, a hacker compromised Bybit's Safe multi-sig wallet frontend, resulted in $1.4B asset loss The #Sygnia report indicates its root cause was malicious code from #Safe{Wallet}'s infrastructure. No compromise was detected within Bybit's systems
Tweet media one
@benbybit
Ben Zhou
7 months
Bybit Hack Forensics Report As promised, here are the preliminary reports of the hack conducted by @sygnia_labs and @Verichains Screenshotted the conclusion and here is the link to the full report: https://t.co/3hcqkXLN5U
Tweet media one
Tweet media two
1
0
0
@DanielSlothx
Daniel Tan
8 months
#Phemex attack. We saved $200K worth tokens from the Phemex hacker by quickyly blacklisting the hacker before the hacker dumping the tokens.
Tweet media one
Tweet media two
@Agent_Layer
AgentLayer | $AGENT Listed
8 months
AGENT Token Security Update Our team has successfully blacklisted hacker's wallet addresses to prevent further transfers and attacks. We've implemented robust security measures to protect the onchain assets, ensuring that AGENT token remains secured. https://t.co/SpYyjdvxLE
4
1
11