Daejun Park Profile
Daejun Park

@daejunpark

Followers
2K
Following
1K
Media
33
Statuses
277

formal methods for appsec @a16zcrypto

Joined August 2009
Don't wanna be here? Send us removal request.
@daejunpark
Daejun Park
5 days
Tweet card summary image
a16zcrypto.com
1
2
11
@daejunpark
Daejun Park
5 days
8/ As DeFi math gets more complex, this line of defense becomes essential. Even if an unforeseen numerical subtlety slips through, the protocol should never enter a state that violates its economic invariants.
1
0
4
@daejunpark
Daejun Park
5 days
7/ If these checks fail, the transaction simply reverts, stopping unexpected numerical behavior before it becomes exploitable. Runtime enforcement, with carefully chosen thresholds and fallback controls, becomes a powerful safety net.
1
0
5
@daejunpark
Daejun Park
5 days
6/ So what’s the missing layer? Runtime enforcement. Two forms matter most: - enforcing precision for critical division operations - enforcing economic invariants (e.g., LP token value must not decrease)
1
0
6
@daejunpark
Daejun Park
5 days
5/ This suggests a broader class of numerical vulnerabilities — ones that traditional defenses only partially address.
1
0
5
@daejunpark
Daejun Park
5 days
4/ yETH followed a different path but echoed the same theme: A numerically tiny error becomes material when an attacker can force the system into fragile regions of its math.
1
0
5
@daejunpark
Daejun Park
5 days
3/ In Balancer’s case, a tiny rounding quirk only became dangerous when liquidity was temporarily collapsed. Batch-swap mechanics effectively enabled an LP-token flashloan, making those edge conditions reachable.
1
0
4
@daejunpark
Daejun Park
5 days
2/ The Balancer exploit alone drained >$120M. What’s striking is that both systems were viewed as “battle-tested.” But adversarial conditions pushed them into precision edge cases no one expected.
1
0
5
@daejunpark
Daejun Park
5 days
1/ Two major exploits — Balancer’s Composable Stable Pools and Yearn’s yETH — landed just weeks apart. Different code paths, but same pattern: subtle numerical behavior turning into real economic vulnerabilities.
1
0
5
@daejunpark
Daejun Park
5 days
Recent Balancer + yETH exploits share a common pattern: tiny numerical edge cases becoming real vulnerabilities. We outline the mechanics and argue for a missing defense: runtime checks on precision + invariants. This needs to be a first-class design requirement in DeFi.👇
14
12
50
@daejunpark
Daejun Park
9 days
The future of DeFi security: Not “did we catch every bug?” but “can the system block unsafe behavior by design?” Core invariants + runtime guardrails = spec is law.
4
4
22
@cdixon
Chris Dixon
2 months
We’re excited to share our 2025 State of Crypto report. This year’s story: the maturation of the crypto industry — with growing institutional adoption, the rise of stablecoins, better infrastructure, new consumer experiences, and long-awaited regulatory clarity. Read the full
412
725
3K
@mg_486662
mattg
5 months
1/ Phishing attacks are evolving — and most people aren't ready. From fake Google alerts to malicious job offers, here are 6 real phishing strategies hackers are using right now… and how to protect yourself.
5
17
61
@0xkarmacoma
karma
5 months
are you old enough to remember the post by @agfviggiano about emulating invariant testing using arrays of symbolic selectors? In halmos v0.3, you can now just write `invariant_` test functions, with no boilerplate and no bounding/clamping
3
6
40
@ihorhanich
Ihor Hanich
5 months
Just finished a detailed in-depth writeup on catching complex vulnerabilities (including reentrancy and DoS) using halmos+halmos-helpers-lib symbolic testing that are tied to a malicious external contract on a real-world example. Details in🧵
1
4
23
@getreconxyz
Recon
5 months
Watch me run Halmos V0.3 in less than 10 seconds with Create Chimera App! The same codebase works with other great tools like Medusa and Foundry. Halmos works with our framework and extension with zero code changes!
56
26
394
@0xkarmacoma
karma
5 months
halmos v0.3.0 release highlights! (quick reminder: halmos is a symbolic testing tool for EVM bytecode which interfaces nicely with foundry projects and supports multiple SMT solvers) 1. we (finally) added support for stateful invariant testing
7
21
145
@daejunpark
Daejun Park
7 months
love this work! 🫡
@zellic_io
Zellic
7 months
The dataset of all contracts and bytecodes can be found here: https://t.co/0yZg8TAcrr All data is up-to-date as of block 21,850,000 (February 15th, 2025).
1
0
6
@daejunpark
Daejun Park
8 months
Plausible liveness => Accountable liveness!
@jneu_net
Joachim Neu
8 months
Excited to share our new paper, "Accountable Liveness", w/ @AndrewLewisPye @Tim_Roughgarden @luca_zanolini. We explore when and how adversarial nodes can be punished if they stall transaction confirmation in blockchains. https://t.co/HYZgklVcNf
0
0
3