a_murathe Profile Banner
0xvagabond.base.eth(base/eth) Profile
0xvagabond.base.eth(base/eth)

@a_murathe

Followers
734
Following
2K
Media
465
Statuses
6K

Python | learning @KodeKloudHQ | Crypto bounty hunter Hire me.

Mars
Joined February 2021
Don't wanna be here? Send us removal request.
@a_murathe
0xvagabond.base.eth(base/eth)
2 months
🚨🚨🚨 I really didn’t want to believe it. Kinda sucks seeing @eulerfinance claw back around 248k tokens from the airdrop pool that was announced over 2.5 years ago. there was no prior announcement, no visible claim deadline, and nothing was said when the airdrop finally
@a_murathe
0xvagabond.base.eth(base/eth)
6 months
🚨🚨 $7.2M in OP Tokens Just Vanished Back to the Treasury! Optimism Airdrop 4 was meant for NFT deployers on Superchains but a massive chunk of those tokens went unclaimed and were clawed back. I tried. I really did. Over 1,000 DMs sent—on Twitter, Etherscan, TikTok, email…
1
0
5
@a_murathe
0xvagabond.base.eth(base/eth)
9 hours
Trust wallet has been compromised, refund or recovery processes may require users to prove ownership by signing messages from their original(hacked) addresses and submitting a new “safe” address for reimbursement. However, if attackers have gained access to the seed phrases(now
@TrustWallet
Trust Wallet
9 hours
We’ve identified a security incident affecting Trust Wallet Browser Extension version 2.68 only. Users with Browser Extension 2.68 should disable and upgrade to 2.69. Please refer to the official Chrome Webstore link here: https://t.co/V3vMq31TKb Please note: Mobile-only users
0
0
0
@TrustWallet
Trust Wallet
9 hours
We’ve identified a security incident affecting Trust Wallet Browser Extension version 2.68 only. Users with Browser Extension 2.68 should disable and upgrade to 2.69. Please refer to the official Chrome Webstore link here: https://t.co/V3vMq31TKb Please note: Mobile-only users
Tweet card summary image
chromewebstore.google.com
Secure crypto wallet to access your digital assets across multiple networks.
577
582
2K
@crypt0kol
cryptokol
10 hours
UPDATE : In the Trust Wallet browser extension code 4482.js a recent update added hidden code that silently sends wallet data outside It pretends to be analytics, but it tracks wallet activity and triggers when a seed phrase is imported The data was sent to
12
6
17
@a_murathe
0xvagabond.base.eth(base/eth)
11 hours
We are about to slide back to the error where we cared less of an an app update no matter how big a big the patch was. A time when an update comes with the risk of giving the attacker access to your wallets/apps - @TrustWallet is that you?
0
0
0
@a_murathe
0xvagabond.base.eth(base/eth)
2 days
Do you want an insta block (cell) without parole? Just mention the this in the dms: "Hey am reaching out because you have an airdrop that you never claimed...." BlOcKeD.
0
0
0
@a_murathe
0xvagabond.base.eth(base/eth)
2 days
Hey @grok can I borrow your credibility for a moment? You’ve seen my work around unclaimed funds, would you mind vouching for me to @ChampagneMan before someone else reaches out?
0
0
0
@a_murathe
0xvagabond.base.eth(base/eth)
2 days
we need to see the spaceship up above the skys, the only hope to mankind/life being to multi-planetary.
0
0
0
@0xPEPO
PEPO
3 days
Hey @nkennethk , what happened to the 5M UNI that were under "restricted UNI" during Q2?
@0xPEPO
PEPO
2 months
Seems like @UniswapFND got liquidated during last week’s crash From mid September: “Another 5M UNI was held externally as collateral, with a $29M loan to the Foundation against the collateral.” https://t.co/51E7rVh9gY
4
3
75
@a_murathe
0xvagabond.base.eth(base/eth)
4 days
Hey @0xYakumo am in your dms with an issue you might want to know about - you have a minute?
0
0
0
@a_murathe
0xvagabond.base.eth(base/eth)
4 days
Service providers need to stop truncating addresses, ens needs be marketed like never before.
@newmichwill
Michael Egorov
5 days
@storming0x You don't need an undo. You need good wallet software
0
0
0
@a_murathe
0xvagabond.base.eth(base/eth)
5 days
I just completed DNS in Detail room on TryHackMe. Learn how DNS works and how it helps you access internet services. https://t.co/66tKyPf7YT #tryhackme via @tryhackme
Tweet card summary image
tryhackme.com
Learn how DNS works and how it helps you access internet services.
0
0
1
@keonne
Keonne Rodriguez
7 days
Tonight is the last time I will sleep in my own bed next to my loving wife. For the next 5 years I will be housed in a federal prison at taxpayer expense for a "crime" without a victim. Just one of many victims of lawfare perpetrated by a weaponized Biden DOJ where truth and
476
2K
7K
@zachxbt
ZachXBT
6 days
Update: USG made a press release today formally announcing Ronald has been charged.
33
10
444
@0xngmi
0xngmi is hiring
7 days
@koeppelmann @rsquare @Marczeller @aave you could use our price api, it would count all aave positions and the value of all LP tokens so the right values appear on the tokens tab and it would handle debt tokens as well (they have a negative price)
1
1
7
@SpecterAnalyst
Specter
9 days
A victim’s private key may have been compromised, resulting in a loss of $38 million. What makes this interesting: The victim created a multisig wallet (1/1) and moved funds into it on 04-11-2025 at 07:48:11. At 08:23:23, the main wallet, which was also the signer wallet,
29
35
281
@ribbonfinance
Aevo (fka Ribbon Finance)
10 days
We are issuing an important correction to our previous announcement regarding the Ribbon DOVs exploit. Our initial analysis was fundamentally flawed, and we owe our community both an apology and an explanation. In our urgency to respond to the exploit, we failed to properly
1
1
10
@ma1fan
Nolan | Exvul
10 days
I have post my yETH @yearnfi exploit analysis part 1, check it in here: https://t.co/Lm9cfbyv5T
exvulsec.github.io
By nolan, founder of ExVul
4
9
72
@lzhou1110
Liyi Zhou
10 days
This was executed by a famous MEV bot, https://t.co/aXj0NexfI3 In fact, this is likely a newly deployed MEV strategy, and this may be the first time it was triggered. (see the Etherscan screenshot, after filtering based on the 4bytes)
@Zyy_0530
Wesley Wang
10 days
A quick analysis with : @lzhou1110 @HatforceSec @KaihuaQIN The root cause is that the reply() function parameter configuration is incorrect, setting the requireSuccess of the relay() function to false, which causes the _multicall() execution to fail without rollback
4
3
50