
Oak Security
@SecurityOak
Followers
2K
Following
7K
Media
68
Statuses
1K
Securing the decentralized, trustless future.
Joined July 2021
We’re building StylusPort, a framework + CLI to make migrating Rust/C++ Solana programs to @arbitrum Stylus easier. Got 3 mins? Share your input → [ https://t.co/rJE0F0lgfI] Your feedback shapes our upcoming migration handbook & AI assistant!
form.typeform.com
Turn data collection into an experience with Typeform. Create beautiful online forms, surveys, quizzes, and so much more. Try it for FREE.
3
2
12
In our latest episode,@MarinaMarkezic from the @EuCInitiative discusses how stablecoin regulation is influenced by traditional finance. In Europe, only e-money institutions and banks can issue stablecoins, while in the US, it's non-banks and bank subsidiaries. This
0
1
3
Biggest worry about AI in cyber attacks? It scales threats exponentially. 1. Near-zero cost targeted attacks 2. Fake audits & impersonations 3. Mass-personalized phishing Traditional defenses can’t keep up.
0
1
4
State actors love supply chain attacks. They can be laser-targeted, yet pulled off with minimal resources. The perfect mix of low effort, high impact.
0
1
2
Containment speed is everything. ⏱️ Rapid detection + swift mitigation = limited damage. In Web3 security, every minute counts.
0
1
2
JavaScript npm supply chain attack! A simple phishing email led to compromised maintainer credentials, showing that OpSec basics fail first even before complex engineering. Immutable builds, locked dependencies, MFA, and monitoring are your first defense.
0
1
4
I would strongly recommend not signing any crypto transactions right now. There is a huge supply chain attack on popular NPM packages that may have compromised various crypto websites (frontend, not the actual contracts). It changes the destination address of transactions and
424
877
3K
AI is scaling cyber attacks to near-zero cost: fake audit reports, hyper-personalized phishing, and automated malware. At Oak Security, we fight back with human-reviewed AI in secure, isolated environments.
0
0
2
If your private keys live on a device connected to the internet, consider them gone. 1.Use hardware wallets 2.Air-gap critical keys 3.Separate dev/test keys from production Attackers target humans first, don’t make it easy.
0
2
5
Phishing is evolving, don’t get caught off guard! Red flags to watch for: ❗️Unrequested messages or links ❗️Time pressure or urgent requests ❗️Too-good-to-be-true opportunities ❗️Unusual tools or platforms Always verify before you click.
0
0
5
We’re excited to join EUCI Insights this week! Our Managing Director, @JphFritsche, will be live with @MarinaMarkezic & @AnjaBlaj to discuss how the EU Data Act will shape smart contract design in the EU.
The Data Act will become applicable on September 12. At this week’s EUCI insights, we will share more on how it will affect smart contract design in the EU! EUCI's @MarinaMarkezic and @AnjaBlaj, with special guest @JphFritsche from @SecurityOak, are going LIVE to discuss the
0
1
3
The Data Act will become applicable on September 12. At this week’s EUCI insights, we will share more on how it will affect smart contract design in the EU! EUCI's @MarinaMarkezic and @AnjaBlaj, with special guest @JphFritsche from @SecurityOak, are going LIVE to discuss the
0
2
4
Company-issued devices are a start, but not enough. In Web3, no single user should ever have unilateral control.. fail-safes are non-negotiable.
0
0
4
Authentication Gold Standard 🔐 ✅ Passkeys > passwords ✅ Strong, unique creds (no reuse) ✅ Password manager (secured) ✅ MFA everywhere (hardware keys, 3 copies) 🚫 No SMS, no password sharing, no storing photos of creds
0
0
4
In TradFi, you need a keycard just to check your inbox. In Web3, a single compromised laptop can sink a protocol. Time to catch up.
0
0
2
Web3 needs a cultural shift: stop assuming devices are clean, start assuming they’re compromised. Build security with that mindset or attackers will do it for you.
0
0
4
Web3 often obsesses over smart contract bugs, but most hacks don’t start in the code. They start with people. OPSEC failures, phishing, and compromised devices remain the weakest link, and attackers know it.
1
0
4
Security hygiene isn’t optional Too many Web3 teams, especially smaller ones, ignore it and just hope for the best... until it’s too late
0
0
4
Most DAOs still run dev + Discord from the same personal laptop. That’s not quirky startup culture... it’s an open door for nation-state attackers!
0
0
4