cvhessert Profile Banner
cvh Profile
cvh

@cvhessert

Followers
660
Following
1K
Media
32
Statuses
591

build, automate, secure, validate, advise, invest & repeat | VP, Security & Smart Contracts @0xPolygonLabs | Re/Tweets are my own | ๐Ÿ‡ฆ๐Ÿ‡ท

Amsterdam, The Netherlands
Joined December 2008
Don't wanna be here? Send us removal request.
@cvhessert
cvh
2 years
Security shouldn't be hard nor expensive, you just need to know what's important... Hopefully this helps prevent future loses in this ecosystem in some way... https://t.co/eL2WlgkUkS
Tweet card summary image
hackmd.io
This guide assumes you are:
2
2
16
@cvhessert
cvh
1 day
AppSec in the AI era will be less about reviewing code and more about operating systems that: Attack. Triage. Improve. Repeat. AI swarms finding and exploiting weaknesses. AI triage validating impact, killing noise, scoring real risk. Even opening the PR. Continuous.
0
0
1
@cvhessert
cvh
2 days
Everyone wants an AI red team swarm constantly breaking their own code But thatโ€™s not the hard part The real bottleneck is triage If your system generates 500 findings a day and you canโ€™t automatically validate exploitability, dedupe noise, score real business impact, and
0
0
4
@cvhessert
cvh
2 days
About time! Thanks ๐Ÿ™
@bcherny
Boris Cherny
3 days
Introducing: built-in git worktree support for Claude Code Now, agents can run in parallel without interfering with one other. Each agent gets its own worktree and can work independently. The Claude Code Desktop app has had built-in support for worktrees for a while, and now
0
0
1
@dguido
Dan Guido
12 days
New: I'm sharing the @trailofbits Claude Code defaults. This is how we setup, configure, and use claude code: https://t.co/aEIXdpCztt
44
157
1K
@fr0gger_
Thomas Roccia ๐Ÿค˜
17 days
48
145
979
@cvhessert
cvh
17 days
Thank you for 1M context window!
0
0
0
@kelvinfichter
smartcontracts.eth
26 days
Sleep is just context compaction
5
12
79
@cvhessert
cvh
1 month
I need a MCP for @TenderlyApp please ๐Ÿ™
0
0
0
@cvhessert
cvh
2 months
Whoโ€™s building a https://t.co/nEJBr1jTCT & https://t.co/DmDqCJmn07 marketplace? Seems like a no brainerโ€ฆ
0
0
0
@cvhessert
cvh
2 months
๐Ÿ‘๐Ÿ™
@jbaylina
Jordi Baylina - baylina.eth
2 months
Fully agree. This is exactly what keeps me in this space. Ethereum is not about winning the finance game on financeโ€™s own terms โ€” that race makes no sense, and we would lose it anyway. The real game is resilience: permissionless access, censorship resistance, and the ability to
0
0
3
@zachxbt
ZachXBT
2 months
Community alert: Ledger had another data breach via payment processor Global-e leaking the personal data of customers (name & other contact information). Earlier today customers received the email below.
1K
1K
6K
@cvhessert
cvh
2 months
๐Ÿ˜‚
@intern
intern
2 months
My son asked for an iPad for Christmas I said no โ€œSon, tablets are closed-source walled gardens controlled by centralized corporationsโ€ Instead I gave him a Ledger He opened it with visible disgust Then something utterly shocking happened My wifeโ€™s CrossFit trainer Luca got
0
0
2
@arsen_bt
Arsen
2 months
Top-5 complex attack you must learn ๐Ÿด Kyberswap bounty ๐Ÿ”— https://t.co/RWvPhiBjs4 ๐Ÿด 1inch exploit ๐Ÿ”— https://t.co/mjmtvY3HNS ๐Ÿด GMX $41M Hack ๐Ÿ”— https://t.co/OWi2i5ZHMa ๐Ÿด VTHO accrual bug ๐Ÿ”— https://t.co/BSZejkhU9E ๐Ÿด Euler Finance hack ๐Ÿ”—
Tweet card summary image
cyfrin.io
Euler Finance was hacked for ~$200M due to a missing check on the liquidity status. We explore a step by step of how this attack happened, including a proof of concept.
4
48
319
@wavey0x
wavey
3 months
... after three long days with claude code, i have this to share: โ†’ https://t.co/XuhC7uarbl a human readable web ui for evm storage visualization (supports Solidity + Vyper) โ†’ Blog post documenting my learnings:
Tweet card summary image
wavey.info
Techniques for mapping EVM storage slots back to variable names and decoding transaction traces
6
12
87
@cvhessert
cvh
2 months
Basically every CIO out thereโ€ฆ
@gothburz
Peter Girnus ๐Ÿฆ…
2 months
Last quarter I rolled out Microsoft Copilot to 4,000 employees. $30 per seat per month. $1.4 million annually. I called it "digital transformation." The board loved that phrase. They approved it in eleven minutes. No one asked what it would actually do. Including me. I
0
0
0
@cvhessert
cvh
3 months
@samczsun Nice article, to add a bit on the re-audit aspect. The way I plan and think of this is dividing your budget and yearly plans on GROW and MAINTAIN line items. GROW is what most projects normally do, bigger budget for new products, features, etc. They all get audited/pen-tested,
0
1
9
@samczsun
samczsun
3 months
i wrote some thoughts on bug bounties payouts and how we should think about crypto security going forward https://t.co/kV1C6OCS8A
Tweet card summary image
samczsun.com
Bug bounties are passive, but security is an active process
21
36
236
@Montyly
Josselin Feist
3 months
The good news? A lot of companies are hiring for their internal security: - Web3 Security Specialist at @binance (+ they have a lot of similar positions) - https://t.co/oPLZUztBUK - Security Analyst at @Figment_io - https://t.co/KsAM0gEuEX - Senior Security Engineer at
Tweet card summary image
job-boards.greenhouse.io
@Montyly
Josselin Feist
3 months
Most protocols spend a lot on audits and bug bounties but have zero internal security Launching https://t.co/c3v75lXHdD to highlight the ones that do Having an internal security team should be in every protocol's New Year's resolutions for 2026
5
4
63
@Montyly
Josselin Feist
3 months
@0xKaden ๐Ÿ’ฏ Imho we have used exploit and vulnerability interchangeably for blockchain, because the exploits were somewhat simple so far ( https://t.co/3XPtomWpJU) But if you look at modern software exploitation outside of blockchain, there is a huge gap between finding a vulnerability
@Montyly
Josselin Feist
4 months
My main takeaway from the recent rounding hacks is that every incorrect rounding needs to be considered a bug Most of them are not exploitable, or not even vulnerabilities, but they are still bugs Think of it as: bug โ†’ vulnerability โ†’ exploit. Every exploit starts from a
1
2
36