WatchPug_ Profile Banner
WATCHPUG Profile
WATCHPUG

@WatchPug_

Followers
2K
Following
29
Media
12
Statuses
53

WATCHPUG is a security team that offers in-depth auditing for Solidity smart contracts.

EVM
Joined May 2021
Don't wanna be here? Send us removal request.
@WatchPug_
WATCHPUG
3 years
The E in Solidity stands for easy.
6
68
83
@WatchPug_
WATCHPUG
3 years
Dear @paraswap, could you please display the full address in the warning box? So that 0xWho can reverse resolve the address to a readable name, which I rely on it to confirm the address.
Tweet media one
2
4
8
@grok
Grok
7 days
Join millions who have switched to Grok.
261
523
4K
@WatchPug_
WATCHPUG
3 years
a frontend hijacking attack on Convex. this is exactly why the wallet should display a human-readable ENS name for the smart contract address they are interacting with;. and the reason I added this feature to @TallyCash 3 months ago:
Tweet media one
@ConvexFinance
Convex Finance
3 years
Please review approvals while we evaluate a potential front end issue.
2
10
32
@WatchPug_
WATCHPUG
3 years
0xWho is an open-sourced Chrome extension:
Tweet card summary image
github.com
Sorry, 0x who? Contribute to jack-the-pug/0xwho development by creating an account on GitHub.
@WatchPug_
WATCHPUG
3 years
i know it can be hard to wrap your head around the txs, I use 0xWho to label the addresses:
Tweet media one
1
2
9
@WatchPug_
WATCHPUG
3 years
RT @CurveFinance: This happened in the problem was them rolling a vulnerable LP token price oracle (sers, we have….
Tweet card summary image
etherscan.io
Flash Loan 27,000 WBTC From Aave Protocol V2 | Success | Jun-16-2022 08:47:58 AM (UTC)
0
20
0
@WatchPug_
WATCHPUG
3 years
the attacker then sold the DOLA tokens for usdt and then sold usdt for wbtc and repaid the flashloan, netted ~$1.3m of profit. btw, Curve also earned ~$3m fees out of these large vol trades.
1
0
2
@WatchPug_
WATCHPUG
3 years
.@InverseFinance now believes the crv3c is worth much more than it's actual value, so the attacker can borrow out 10m DOLA with only $4.7m worth of collateral. that's ~$5m of bad debt to the protocol.
1
0
3
@WatchPug_
WATCHPUG
3 years
root cause: using balanceOf(CRV3C) for price oracle. the attacker exploited it by taking a half-billion wbtc flashloan and swapping thru CRV3C, deliberately took a huge slippage!. the pool got $0.5b of wbtc with only $75m usdt, pool lp token price go up!.
Tweet media one
1
0
0
@WatchPug_
WATCHPUG
3 years
i know it can be hard to wrap your head around the txs, I use 0xWho to label the addresses:
Tweet media one
2
3
6
@WatchPug_
WATCHPUG
3 years
It's a classic flashloan-aided oracle manipulation attack: btw, flashloans can be quite expensive, Aave earned $0.5M interest on this one tx alone.
1
0
1
@WatchPug_
WATCHPUG
3 years
. @InverseFinance was exploited ~1.3hrs ago on a new cToken (anYvCrv3Crypto) they deployed and added to the comptroller 22 days ago. It's never been touched until this exploit. so this new cToken appears to be a pre-launch product.
1
1
1
@WatchPug_
WATCHPUG
3 years
oracle manipulation is easy when you are using balanceOf.
1
8
34
@WatchPug_
WATCHPUG
3 years
currently building a chrome ext which will show you a tooltip with a human readable name (from your address book) whenever you select an address. it supports ENS reverse resolution; tells if it's a contract or EOA, + the ether balance. this chrome ext is gonna be called: 0xWho?
Tweet media one
3
0
9
@WatchPug_
WATCHPUG
4 years
RT @insuredao: We are honored to introduce the new ReportingDAO member, .@WatchPug_, a team of web3 security professionals!. In combination….
Tweet card summary image
link.medium.com
Hi, InsureDAO community!
0
8
0
@WatchPug_
WATCHPUG
4 years
Here is my submission to the @gelatonetwork Vernissage:.
Tweet media one
3
0
17
@WatchPug_
WATCHPUG
4 years
⚠️ Oct 20, 9 AM UTC, an attacker exploited PancakeHunny and stole 2.3M. The root cause: inappropriate usage of a low liquidity pool makes it vulnerable to price manipulation to create artificial profits. Read more:
Tweet card summary image
watchpug.medium.com
The Exploit
1
2
7
@WatchPug_
WATCHPUG
4 years
WATCHPUG is proud to have received a quarter million ($250K) bug bounty award from @PancakeBunnyFin for a critical bug in the Zap function. Thank you! @PancakeBunnyFin @immunefi
Tweet media one
@PancakeBunnyFin
pancakebunny.finance
4 years
Hi Bunny Fam! 🐰🚀. We would like to announce that we have just awarded a critical Immunefi bounty. The award was in relation to a bug in polyBUNNY zap function. The related contracts are now upgraded and the issues are resolved.
4
5
21
@WatchPug_
WATCHPUG
4 years
The Poly Network hack explained.
0
0
6
@WatchPug_
WATCHPUG
4 years
At 2 AM UTC on Aug 4, @Wault_Finance‘s WUSD on BSC was exploited and drained $800k (370 ETH) out of the WUSD/BUSD LP. WUSD is a stable coin backed by USDT and WEX. We believe it's an economic attack rooted in the design of WUSD. Read our analysis:
Tweet card summary image
watchpug.medium.com
An economic attack rooted in the design of WUSD
0
2
5
@WatchPug_
WATCHPUG
4 years
RT @immunefi: Today, we want to share with you couple repos that will help you master blockchain pentesting and smart contract dev. https….
Tweet card summary image
github.com
⟠ A curated list of awesome Solidity resources, libraries, tools and more - bkrem/awesome-solidity
0
55
0