NethermindSec Profile Banner
Nethermind Security Profile
Nethermind Security

@NethermindSec

Followers
1K
Following
237
Media
124
Statuses
553

Comprehensive security from @Nethermind, from audits to formal verification. Book now: https://t.co/dBDIYbokwP

Joined September 2024
Don't wanna be here? Send us removal request.
@NethermindSec
Nethermind Security
15 hours
Zero-knowledge circuits fail when constraints are incomplete. Under-constraining lets attackers generate “valid” proofs for invalid statements. This flaw has broken real systems. Here is how it happens and how to prevent it. https://t.co/1M6aRPIk6C
@NethermindSec
Nethermind Security
15 hours
0
0
0
@NethermindSec
Nethermind Security
15 hours
0
0
1
@NethermindSec
Nethermind Security
2 days
Not sure if your smart contract is prone to randomness vulnerability? Our team at NethermindSecurity can help you with smart contract audits and real-time monitoring. Book a consultation and let’s discuss your security needs:
Tweet card summary image
nethermind.io
We encompass all of Nethermind's blockchain expertise, zeroed in on security solutions for Ethereum and Starknet builders.
0
0
0
@NethermindSec
Nethermind Security
2 days
How can we solve weak randomness? The typical solution is to use an oracle network. You can use trusted oracles like the Chainlink VRF to get verifiable random numbers.
1
0
0
@NethermindSec
Nethermind Security
2 days
Take the case of the Ethernaut coin flip contract. If the contract uses blockhash(block.number - 1) to generate a random outcome, an attacker can simply see that hash, compute the result in advance, and always “guess” correctly.
1
0
0
@NethermindSec
Nethermind Security
2 days
The problem with these parameters is that blockchain data like block hashes and timestamps are deterministic. This means they can be known in advance. And for any system that relies on true randomness, predictability is the enemy.
1
0
0
@NethermindSec
Nethermind Security
2 days
What can cause weak randomness? - Using blockhash for randomness - Using block timestamp for randomness - Using block number for randomness - Using parameters like block difficulty or gas
1
0
0
@NethermindSec
Nethermind Security
2 days
Weak randomness becomes a problem when developers assume that using public blockchain data like blockhash or timestamp is sufficient for randomness. It’s easy, right? But here’s the catch: it’s also easy for an attacker to predict. Once they know your “random” value, they
1
0
0
@NethermindSec
Nethermind Security
2 days
What happens if the randomness in your smart contract isn’t so…random? In blockchain, randomness is essential for outcomes that need to be unpredictable like minting NFTs from a new collection or guessing a bet. Let’s talk about weak randomness and how it can leave your smart
1
0
1
@CryptoLarBrasil
CryptoLar
3 days
TYPED was insane. Thanks to everyone who made it happen. 💥
2
2
14
@NethermindSec
Nethermind Security
4 days
1
17
46
@pradeep_rvsingh
Pradeep RV Singh
10 days
Excited to have this partnership
@NethermindSec
Nethermind Security
11 days
Security is the foundation of every reliable system. We've partnered with @gateway_eth to bring our full-stack audits and formal verification directly into Gateway Apps - the same services used across leading rollups, ZK systems, and L1/L2 protocols. Learn more 👇
0
1
3
@NethermindSec
Nethermind Security
10 days
We are proud to support Origin Protocol and $OETH through security services 🔥
@OriginProtocol
Origin Protocol
10 days
The $OETH staking upgrade is here — delivering major improvements in security, efficiency, and reliability. The upgrade removes oracle dependencies and modernizes validator operations. Here's why it matters 🧵
0
0
1
@NethermindSec
Nethermind Security
11 days
Security is the foundation of every reliable system. We've partnered with @gateway_eth to bring our full-stack audits and formal verification directly into Gateway Apps - the same services used across leading rollups, ZK systems, and L1/L2 protocols. Learn more 👇
@gateway_eth
Gateway FM
14 days
https://t.co/tiXT1vMnJb is partnering with @NethermindSec to bring advanced audits and formal verification services directly into Gateway Apps. Nethermind Security covers smart contracts, rollups, ZK systems, and the full off-chain stack (relayers, oracles, sequencers, provers)
0
4
12
@M25Marek
Marek Moraczyński
12 days
🌟 @Nethermind has just passed the RPC compatibility tests! We’re happy to help if you’re considering Nethermind for RPC. Shortly after Fusaka, we’re planning a bigger release for RPC. Regarding the remaining three tests, we believe our responses are correct, and it seems the
@SCBuergel
Sebastian Bürgel
2 months
Since I last checked 2 weeks ago, several clients improved significantly! Number of passing RPC compatibility Hive tests as of today: 👏 @HyperledgerBesu 90 (up from 82) 👏👏👏 @ErigonEth 170 (up from 113) 👏 @ethrex_client 40 (up from 38) 🌟 @go_ethereum 190 (was 190, which is
5
17
84
@gateway_eth
Gateway FM
14 days
https://t.co/tiXT1vMnJb is partnering with @NethermindSec to bring advanced audits and formal verification services directly into Gateway Apps. Nethermind Security covers smart contracts, rollups, ZK systems, and the full off-chain stack (relayers, oracles, sequencers, provers)
5
30
125
@Syndika_co
Syndika
15 days
DevConnect 🇦🇷 wrapped last week, and Buenos Aires absolutely delivered. Infra by day. Side-events by night. Ideas everywhere. Coffee never enough ☕️ 💥Huge shout-out to the friends, partners, and absolute legends we crossed paths withb at @EFDevcon: @SmarDex @ethereum
5
16
28
@NethermindSec
Nethermind Security
21 days
At ZKConnect, @JulekSU spoke about why formally verified zkVMs will be critical as L1 proving secures more of Ethereum. Around the event our team met with many zkVM projects to dig into correctness. If you want to talk formal verification after Devconnect, get in touch.
1
2
14
@0xErmes
Philip
22 days
Thanks for the invite @HypernativeLabs @NethermindSec. Very relevant topics, and one clear takeaway: smart contracts and on-chain protocols are getting safer with on-chain proactive monitoring, bug bounties and multi-round audits, but most hacks still hit the infra around them.
@NethermindSec
Nethermind Security
22 days
Many people joined us this morning for Security Connect, co-hosted with @HypernativeLabs and supported by @zksync. Strong discussions, good questions, and real interest in how onchain systems can be secured in real time.
0
6
8