junorouse Profile Banner
Juno | ChainLight Profile
Juno | ChainLight

@junorouse

Followers
2K
Following
4K
Media
219
Statuses
1K

@chainlight_io intern, team lead. Building an essential risk management platform for Web3.

Seoul
Joined April 2019
Don't wanna be here? Send us removal request.
@junorouse
Juno | ChainLight
3 years
gg.
@theori_io
Theori
3 years
This effectively makes # of unsolved challenges to be 0 for The Duck :) It was a fun weekend activity that allowed Theori researchers to show off their deep knowledge and strong skills in Web3 security. Thanks to @paradigm_ctf for hosting the CTF!
Tweet media one
1
1
13
@junorouse
Juno | ChainLight
2 months
Go go go go.
@AbstractChain
Abstract
2 months
The ultimate K-pop experience is coming to Abstract. Abstract is partnering with @triplescosmos, the winner of Best New Female Artist at the MAMA Awards, to bring the K-pop experience on-chain. More information below.
0
0
7
@junorouse
Juno | ChainLight
3 months
RT @theori_io: 🚨 19 critical flaws found in South Korea’s mandatory financial security software. Research by Theori, KAIST, and partners re….
0
11
0
@junorouse
Juno | ChainLight
4 months
RT @theori_io: šŸ¤ New partnership: Theori x @okta .We’re bringing red-team firepower + automated pentesting as Okta’….
0
7
0
@junorouse
Juno | ChainLight
5 months
RT @ChainLight_io: Thank you for reading. To stay up-to-date with the latest report and research from our award-winning security researche….
Tweet card summary image
discord.com
Discord is great for playing games and chilling with friends, or even building a worldwide community. Customize your own space to talk, play, and hang out.
0
1
0
@junorouse
Juno | ChainLight
5 months
RT @LindellYehuda: I am excited to announce that @Coinbase has just released its MPC engine as open source The lib….
Tweet card summary image
github.com
Coinbase MPC Library. Contribute to coinbase/cb-mpc development by creating an account on GitHub.
0
133
0
@junorouse
Juno | ChainLight
6 months
1. Had spent a day for Pectra cantina this weekend. 2. Reported false positive as (A) I didn’t spend much time to read C# code w/o IDE, (B) it was really impossible to make PoC because every e2e testing guide does not work with multiple EL clients (found a silly bug on their.
4
0
27
@junorouse
Juno | ChainLight
6 months
Btw the cantina character looks like the creeper of Mickey 17’s so cute.
@_hrkrshnn
Hari
6 months
Cantina will have the highest quality security findings in the world. We're using LLMs to give security researchers early feedback on their findings and helpful hints on what they may be missing.
Tweet media one
2
0
9
@junorouse
Juno | ChainLight
6 months
what’s happening šŸ¤–
Tweet media one
1
0
7
@junorouse
Juno | ChainLight
6 months
RT @SiwonHuh: @Bybit_Official "only" losing $1.4B returns to be an optimistic outcome for crypto. This attack could have nearly erased the….
0
4
0
@junorouse
Juno | ChainLight
6 months
@benbybit
Ben Zhou
6 months
Bybit Hack Forensics Report.As promised, here are the preliminary reports of the hack conducted by @sygnia_labs and @Verichains .Screenshotted the conclusion and here is the link to the full report:
Tweet media one
Tweet media two
0
0
0
@junorouse
Juno | ChainLight
6 months
It's little bit far from the root cause of the @Bybit_Official hack, but yeah @safe was exploited šŸ˜‡ see?.
@junorouse
Juno | ChainLight
7 months
One hypothesis that blew my mind regarding the recent @Bybit_Official hack:.The hacker may have created a malicious proposal within @safe backend (somehow a bug on the SAFE side, or they hacked one of the signers), and FE failed to show the correct info about it.
2
0
10
@junorouse
Juno | ChainLight
6 months
Abstract LFG.
@ChainLight_io
ChainLight
6 months
5ļøāƒ£ @cardex_space Users Lose $400K. • We at ChainLight assisted in identifying the signer key exposure and facilitated further actions. • While it is not the vulnerability of AGW itself, Abstract team promised the integration of Blockaid's tx simulating tool to AGW. (7/10).
1
0
9
@junorouse
Juno | ChainLight
6 months
RT @ChainLight_io: Which rug pulls, exploits, and security breaches happened this week?. Read this 2-minute weekly summary to stay in the l….
0
3
0
@junorouse
Juno | ChainLight
7 months
anyway, if it is not a bug on the safe's backend, I can say one of the signers was hacked :(.it will be the hard time to do an IR the whole system to find out any backdoors.
0
0
2
@junorouse
Juno | ChainLight
7 months
I tested some scenarios, but safe validates when proposing the tx:.- it requires the sig of at least one of the signers.- if I remove the signature field, the server returns ok, but it doesn't put it in the queue.- **it shows the warning if the tx works with the delegatecall**
Tweet media one
1
0
1
@junorouse
Juno | ChainLight
7 months
One hypothesis that blew my mind regarding the recent @Bybit_Official hack:.The hacker may have created a malicious proposal within @safe backend (somehow a bug on the SAFE side, or they hacked one of the signers), and FE failed to show the correct info about it.
2
0
14
@junorouse
Juno | ChainLight
7 months
RT @0xCygaar:
0
65
0
@junorouse
Juno | ChainLight
7 months
because as Kaia, previously known as Klaytn has a contract code on 0x0 address, which returns the team image. cast code --rpc-url 0x0000000000000000000000000000000000000000 > /tmp/out && ls -al /tmp/out
Tweet media one
0
0
3
@junorouse
Juno | ChainLight
7 months
I sometimes found a ownership check/signature verification bypass when their validator module is not set. such as:. require(module.check(msg.sender), "not authorized");. I always recommend them adding a extra initialization check as defense-in-depth perspective,.
1
0
1
@junorouse
Juno | ChainLight
7 months
Quite interesting exploit method to bypass the signature verification and the return value validations.
@ChainLight_io
ChainLight
7 months
2ļøāƒ£ @odosprotocol Loses $50K. • A flawed verification mechanism for user signatures resulted in an arbitrary call vulnerability. • The exploiter used a precompile (0x4) to bypass the signature verification. • The team mentioned that the victim contract had been audited. (4/5).
2
0
24