cergyk
@cergyk1337
Followers
3K
Following
4K
Media
41
Statuses
831
Gerber image security researcher | Creator of https://t.co/pVs04C2qW9 | LSR @ Spearbit, Sherlock | https://t.co/hS6ELCXyjg
On the block
Joined May 2022
Sadly, I was part of that big layoff as well. I really enjoyed my time there, but market reality can hit hard. On the positive side, I'll have more time to cook now 🔥
I was part of the recent layoff wave at Immunefi. I’m grateful for what I learned and for the people I worked with. But I’m now excited to explore new opportunities 👀
4
8
45
I was part of the recent layoff wave at Immunefi. I’m grateful for what I learned and for the people I worked with. But I’m now excited to explore new opportunities 👀
5
15
96
A Security Auditor’s Guide to reviewing @SuccinctLabs's SP1 programs. Practical audit patterns, input validation checklist, 32‑bit pitfalls, third‑party deps, overflow checks. For security engineers reviewing SP1/Risc0 guest code. https://t.co/bUjCZb5CEx
blog.sigmaprime.io
Practical security checklist and auditing guide for engineers reviewing SP1/RISC-V guest programs (also useful for Risc0). Covers input...
4
17
101
Proud to have contributed to the security of the Brevis zk coprocessor! The report contains a few very interesting findings at the intersection of Ethereum and ZK 👀
🛡️ Security first, always. ✅We've completed another security audit for the Brevis ZK Data Coprocessor with @sherlockdefi—every issue found, fixed, and signed off. Dive into the full report 👇 🔗 https://t.co/Eshol41Xg1
3
1
40
Getting @getreconxyz pilled 👀. No excuse to skip stateful fuzzing now, wp @GalloDaSballo
2
1
31
New alpha on the cork attack dropped: https://t.co/cx5wn7jErB "It's time to drop a really big bombshell. Sherlock didn't miss it. All the companies that wrote analyses on this issue before the official autopsy failed to detect the real problem. Dedaub, Three Sigma, Halborn,
etherscan.io
Call 0x4f6e2061 Method By Cork Protocol Exploiter 1 on Cork Protocol Exploiter 1 | Success | Jun-19-2025 01:31:11 PM (UTC)
2
3
17
So stoked to finally reach the LSR level at Spearbit and excited to continue securing protocols with such a cracked team! 🥂
We're pleased to announce that @cergyk1337 has been promoted to Lead Security Researcher at Spearbit. This promotion follows his consistently high-signal reviews demonstrating both technical fluency and deep architectural intuition. Full story below.
38
2
232
What would you do with $16,000,000? Today, @usualmoney is announcing the largest bug bounty in the history of the world: A $16,000,000 reward for discovering a single critical vulnerability in @usualmoney's codebase. Hosted on Sherlock, in partnership with @NexusMutual.
35
89
471
Security’s about to get pumped up. The biggest Solana competition in history has landed in the Cantina 🪐 @pumpdotfun just dropped a massive $2,010,000 prize pool to help secure PumpSwap, their new DEX. 💰 $2,010,000 USDC 📅 Live now - April 4th 🔗 Below
69
38
200
To demonstrate @burraSec's expertise, we’re offering a free full-day security review/consultation for projects integrating with LayerZero or Arbitrum—whether you’re already deployed or still in development. We’ll thoroughly review: LayerZero: Configuration (DVNs, Executor, and
💡I’ve been asked numerous times to provide a checklist for auditing a LayerZero integration. ⚡️You asked, so here it is: https://t.co/bAdgQSpjlm 🧠 I’ve dumped everything I could think of that can go wrong and more. @g_vladika spent years building and breaking the core
4
136
196
Introducing AIR-ICICLE❄️ Plonky3 meets ICICLE—write AIR circuits in Plonky3, generate traces in ICICLE, and build custom STARK provers with GPU acceleration. A major breakthrough from @Karthik_Inb & @BagadSuyash, enabling Plonky3 users to leverage ICICLE for high-speed proving.
2
18
41
You’ve heard about Binius by @IrreducibleHW but all this talk about “small fields”, “field extensions” and “binary fields” makes no sense? Let me break it down and explain how these concepts accelerate zk-SNARKs 🚀
1
20
59
When we say crypto takes security seriously, this is what we mean 🪐 @Eigenlayer is relentlessly pursuing the pinnacle of security standards with the largest-ever, $2,500,000 code review competition starting in February. More info coming soon.
18
64
467
Introducing Willow, our new state-of-the-art quantum computing chip with a breakthrough that can reduce errors exponentially as we scale up using more qubits, cracking a 30-year challenge in the field. In benchmark tests, Willow solved a standard computation in <5 mins that would
3K
12K
77K
Happy to come out 1st out of this highly disputed competition! Thanks @cantinaxyz @Uniswap !
Here they are: the @Uniswap competition results! 🪐 Your top 3 ranked researchers are: 🥇 @cergyk1337: $56,734.22 🥈 @alexfilippov314: $50,888.23 🥉 @cmichelio: $29,757.18 While no critical bugs were found, v4 has been fortified thanks to you all. Full leaderboard below.
32
3
241
This morning I didn't even know of @0xKorok. Now it's the afternoon and I just finished meeting him in person and talking to him for a couple of hours. Among other things he wants to: - fix the impartiality problems of bug bounty platforms - extend bug bounties to be infinite
3
1
40
For fuck's sake, if you are a 'trusted' security account, you need to absolutely make sure to never do this
40
30
600
Thanks for the awesome shoutout @cantinaxyz ! Can't wait for contest season to resume 😋
6
1
72