
engn33r
@bl4ckb1rd71
Followers
2K
Following
2K
Media
218
Statuses
1K
building @twynexyz web3 security @electisec @yAuditdao Former top 10 code4rena & Sherlock. https://t.co/tUNv6hwLHD
Joined August 2020
If web2 security continues foreshadowing what web3 security will do, @Xbow is scary for any manual auditors or bug hunters. They've got a strong team of web2 security talent, so perhaps that's the new job for web3 security people - training the tools.
I love being proved wrong, and @Xbow is showing that agent-based systems are already more efficient than I expected a year ago. This is an exciting time for automated bug finding.
1
0
12
I'm excited to see where this goes π.
Introducing Dory! . your Telegram concierge, built with confidential compute ππ. Tame the chaos in your Telegram chats with summaries, access control and helpful nudges. More below. (we're whitelisting early testers + it gives us wings if we see many
1
0
5
@twyne In summary:.- Write happy path tests to achieve >90% test coverage β
.- Write unhappy path tests to catch stop devs from being idiots π.- If you find a bug β write a new unhappy path test πͺ².- Add fuzzing tests to validate support for different assets π§ͺ.
0
0
0
@twyne Of course, getting fuzzing experts to test your code is even better, but Iβm focusing on what mere mortals can easily do themselves.
1
0
1
@twyne When you combine Foundry fixtures with vm.assume, you can lock in your fuzzing tests to a specific set of values. Boom, now your tests cover all on-chain asset combinations. πͺ. If you know a better approach, please tell π.
getfoundry.sh
1
0
0
@twyne Foundry to the rescue!. Foundry has a βfixturesβ feature to test specific values while fuzzing. You can make a fixture with the assets you want to test. Foundry does the hard work testing the permutations of assets.
1
0
0
@twyne After writing the tests, consider any asset edge cases. Fuzzing to the rescue!. But how to fuzz the different token addresses that you want to support in the protocol? π€.
1
0
0
Imagine having tests that check for EVERY possible hack. Those should ALL fail. Unhappy paths are like little audits. Luckily at @twyne we caught this low hanging fruit before the real audit π. The real audit:
1
0
0
RT @twynexyz: Higher liqLTVs = Leverage Multiplier Effect π. At 80% liqLTV, $1 = $5 .At 95%, $1 = $20.At 99%, $1 = $100. Twyne unlocks highβ¦.
0
3
0
Curious about lessons learned shifting from web3 red team to blue team? My #ETHBelgrade talk is now live:
5
2
41
I was lucky to have @savantchat look at the code I wrote at @twynexyz, and as an ex-auditor, I was impressed. It even found a bug that had been in the codebase for weeks that we only *just* fixed in the code <48 hours before.
an ai auditor found a bug from resupply exploit. the protocol was audited by two major audit firms, both of which have missed the issue. i was following this ai auditing endeavor called @savantchat so i was interested if it would catch the root cause. it correctly identified the
3
2
18