Neodyme Profile Banner
Neodyme Profile
Neodyme

@Neodyme

Followers
5K
Following
369
Media
80
Statuses
352

We secure software with deep-dive audits, cutting-edge research, and in-depth trainings. Secure your solana program with Riverguard @ https://t.co/VmxVHzx2U2 πŸžοΈπŸ’‚

Germany
Joined August 2021
Don't wanna be here? Send us removal request.
@Neodyme
Neodyme
2 years
Introducing Riverguard πŸžοΈπŸ’‚ A new security tool for Solana program deployers... 🧡 https://t.co/LGgTiXA0lj
13
71
97
@Neodyme
Neodyme
2 days
Heading to @hack_lu? πŸ” Our colleague Felipe will discuss how partial emulation and DFA can be used to study a legacy version of Widevine L3, Google's software-based DRM. ➑️ Dive into the past to strengthen future DRM security. πŸ—“οΈ Oct 23 at 2:15pm https://t.co/5hMljQ8DfE
2025.hack.lu
Agenda - Hack.lu and CTI summit 2025
0
1
2
@Neodyme
Neodyme
18 days
⚑️ Lenovo DCC contained an easy-to-exploit LPE: a weak ACL bug β†’ local privilege escalation β†’ full admin πŸ–₯οΈπŸ‘¨β€πŸ’» We break it down with reverse engineering, process tracing, & two exploit strategies. Read Part 1 of our deep dive: πŸ‘‰
Tweet card summary image
neodyme.io
The Lenovo Display Control Center (DCC), widely deployed in Windows enterprise environments, contained a critical local privilege escalation vulnerability enabling unauthorized elevation to adminis...
1
4
9
@Neodyme
Neodyme
1 month
▢️ We built a proof-of-concept post-quantum FIDO authenticator. It's phishing- AND quantum-resistant. βœ…οΈBonus: it even outperforms Google's prototype. πŸ‘€ Full write-up here:
Tweet card summary image
neodyme.io
We have built our own FIDO2 token based on post-quantum crypto. Here is how.
1
4
12
@Neodyme
Neodyme
1 month
β˜€οΈTeamwork doesn't just happen at the desk. This week, our crew is in Mallorca, building ideas, strengthening bonds, and enjoying some well-deserved sunshine together.🌴 Great collaboration comes from trust, connection, and a shared good vibe✨
1
0
10
@Neodyme
Neodyme
1 month
πŸ”— We're sponsoring the TUM Blockchain Conference 2025! @tbc_munich πŸ—“ Sept 11–12 πŸ“ House of Communication, Munich We're giving away 10 free tickets 🎟️ Want one? πŸ‘‰ Comment why you want to attend Winners will be announced soon. Don't miss it!
2
0
4
@Neodyme
Neodyme
2 months
Very proud to support the TUM Blockchain Conference taking place September 11-12, 2025.
@tbc_munich
TUM Blockchain Club
2 months
Meet our Bronze Sponsors πŸš€ πŸ“’ We’re thrilled to announce @StakingFac, @Neodyme and @ArciumHQ as the bronze sponsors of the TUM Blockchain Conference 2025! Staking Facilities are a leading provider of enterprise-grade Web 3.0 infrastructure and non-custodial staking services
0
0
1
@Neodyme
Neodyme
2 months
Stopping sandwiching requires more than patches, it requires principles.
@MarinadeFinance
Marinade πŸ›‘οΈ
2 months
Sandwiching has been a recurring issue in Solana’s history. The real solution? Accountability and honesty. Patrick Reich from @neodyme breaks down how @MarinadeFinance Select is stopping sandwiching by committing to ethical onchain practices.
0
0
1
@Neodyme
Neodyme
2 months
Note that this isn't just savings in P-Token instructions. It's savings relative to the overall throughput of the blockchain, failed and vote transactions included. IBRL!
4
0
23
@Neodyme
Neodyme
2 months
From 2025-08-03 up to and including all of 2025-08-11, using P-Token would have saved a total of: - 8.90T CUs with logging enabled, - 9.14T CUs with logging disabled. This constitutes an impressive saving of 12.0% and 12.3% of TOTAL used blockspace respectively.
2
4
58
@Neodyme
Neodyme
2 months
Using our infrastructure at https://t.co/LGgTiXzsvL, we executed every mainnet transaction from the past few months twice, once with the original Token Program, and again with P-Token. We checked that the output does not differ, and also measured CU savings:
1
0
21
@Neodyme
Neodyme
2 months
We've concluded our audit of P-Token, Solana's new token program build with Pinocchio. It promises impressive savings in Compute Unit (CU) usage. But what exactly does this mean in practice? We've investigated πŸ‘‡οΈ
15
25
145
@Neodyme
Neodyme
2 months
Back from @BlackHatEvents & @defcon! πŸŽ‰ Our colleagues delivered insightful trainings on crypto hacking and binary exploitation and got amazing feedback from the crowd πŸ™Œ Missed it? We offer tailored security trainings for companies too. Just reach out.
1
3
27
@Neodyme
Neodyme
3 months
We reported a vulnerability in Parallels Client via @thezdi last year. πŸ”₯ The issue (CVE-2025-6812) - now fixed: A privileged service searched for an OpenSSL config file in an unsecured location, enabling LPE. ➑️ Advisory here: https://t.co/snjiUw8gLt β˜‚οΈ Patch your systems!
neodyme.io
The AppServer service installed with Parallel Client searches for an OpenSSL config file in an unsecured location, which allowed low privileged users to escalate their privileges.
0
8
23
@Neodyme
Neodyme
3 months
πŸ”§βœ¨ On our company retreat this week, we're diving into hardware and protocol hacking: fingerprint sensors, smart locks, drones and Bluetooth speakers. A great mix of hands-on research, creative exploration, and team bonding over board games!🎲
0
2
9
@Neodyme
Neodyme
3 months
We now have all the puzzle pieces to understand how the exploit worked. In GMX's contract structure, the normal flow of a position increase is as follows: The Position Manager is called by the keeper and triggers the position increase in the orderbook and vault. It then updates
0
0
1
@Neodyme
Neodyme
3 months
3. Complicated cache design: Another component in GMX, the GlpManager, is responsible for minting or burning pool shares in the form of GLP tokens. To accurately price these tokens, it has to track profits from shorts which the protocol has generated but not yet realized. This
1
0
1
@Neodyme
Neodyme
3 months
2. Loose access restriction: The vault's increasePosition instruction, which allows an increase in short positions, is only allowed when "leverage is enabled". This is a global flag that the Position Manager sets to true before calling the vault, and back to false after
1
0
1
@Neodyme
Neodyme
3 months
Let's start with 1, the control flow hijack: Users can register the intent to decrease their position with GMX. The actual execution of this is done by a "keeper", an off-chain bot that is the only one that can directly modify positions. In this case, the attacker caused the
1
0
3