Mathriel
@mathrielx
Followers
180
Following
1K
Media
11
Statuses
257
Web3 Security Researcher, DM for audits
Joined December 2020
I started from 0 in the Web3 space just 4 months ago. The first 2 months I wasn’t serious — I was watching videos and reading books/articles, but progress was slow and unfocused. I didn’t manage to gain much real knowledge despite spending time on it. Then everything changed.
10
2
110
I won a giveaway from @ValvesSec. Thank you 🫡 Everyone should follow and support them, the same way they support the SRs.
0
0
14
Wowwww!!! That's amazing, I've believed in those guys from the first day. Thank you for the win!!! 🫡
0
0
6
🚨FREE AUDIT + GIVEAWAY🚨 If you're building a Solidity protocol and want to protect your protocol and the users that trust you, you're in the right place. We're exclusively opening 1 slot for a FREE audit. • Your protocol should be solidity-based • The codebase contains
12
27
50
The workload outside of web3 has been crazy this past week - so much on my plate. Still grinding, staying consistent, and learning every single day. Next week we’re coming back with 100% power 💪. I truly believe in the topic I’ve committed to and the results will show soon 🤞
1
0
11
No words!!! Congrats man 👏
Security researcher ily2 has just earned a staggering $3,000,000 from submitting a critical smart contract bug via Immunefi. That's the largest single payout in web3 security in recent memory. In total, he's submitted 3 reports. All 3 were paid. 100% accuracy. His leaderboard
0
0
14
Decided to deep dive into one feature and take it slow - bug bounty really isn’t a sprint, it’s a marathon. It feels way different from Contests. Honestly? I’m enjoying this style more. The only downside is you never know if you’ll find something, but I’m trying to keep the
1
0
15
I believe in those guys and I wish them a great success @Vesko_210 @Merulez99
🚨 Excited to launch Valves Security! 🛡️ Our mission is simple: stop the theft of millions of dollars every year. We’re putting all our effort into protecting protocols, preventing exploits, and losses for innocent users and protocol teams.
1
0
3
In the past couple of days I’ve been digging deeper into blockchain infrastructure. I can’t even begin to imagine how much there is to learn in this field, it’s unbelievable... and so interesting! @0xSimao
1
0
6
Big Alpha Drop from the Magee!!! @WhiteHatMage
I've created a site to share some ideas. My first post is about being a professional whitehat, and how I evaluate potential rewards to decide where to hunt. https://t.co/XcGP8BkHn9
0
0
3
Still reading through a lot of code and haven’t found a bug yet, but learning tons along the way. A few beginner tips that helped me: Focus on one type of flow at a time and study how it works and if there are any pitfalls Take notes and stay organized Read write-ups and reports
1
0
14
Bug bounty feels a lot slower - there’s way more lines of code, flows and contracts to go through than contests. It’s a very interesting approach, but you have to dedicate much more time to see any results. Let’s see where this journey goes @0xSimao
0
0
2
Wow, very interesting finding by @0xSimao
Welcome back to Sherlock’s Vulnerability Spotlight, where we highlight an impactful vulnerability uncovered during a Sherlock audit. This week, we examine a signature malleability vulnerability found by @0xSimao in the @crestalnetwork Contest. This vulnerability has already been
0
0
6
Spent the last couple of days deep-diving into past bounty write-ups and lessons from impactful bugs - starting to really get the program I’m hunting on. It’s super interesting looking for bugs that actually matter in real deployed systems - everything feels so different @0xSimao
1
0
11
Picked an interesting protocol type the last two days and found a target to hunt bugs on - way more confusing than your typical “git clone the repo” contests style. All the forks & stuff made it a real challenge 😅 @0xSimao
0
0
9
First day switching to bug hunting - I researched different types of protocols because a brutally good bug hunter once advised that it’s always good to pick something interesting to you so you don’t get bored. I’ve started compiling a list of promising targets, which I’ll finish
0
0
9
Today I’m finishing the Contest. I didn’t manage to find a solid attack path that I can prove, and time felt a bit tight for me. Starting today, I’m taking on a new bug bounty approach suggested by @WhiteHatMage - I’ll be diving deep into this process and seeing how it goes.
4
0
19
Today all of my leads got invalidated - most turned out to be related to protocol design assumptions rather than real exploitable issues. These leads didn’t hold up under deeper analysis, so I’m closing them and refocusing. Still moving forward - we continue! @0xSimao
1
0
8
Today was a good day of progress - I’ve already identified some promising leads on OpenCover Insured Vaults, and have opened a PT to verify them. I’m now working on validating those findings, and I hope to be able to prove them in the next phase. @0xSimao
0
0
6
Started working on OpenCover Insured Vaults contest today. I’ve focused on a deep dive into the protocol fundamentals to understand its mechanics. Tomorrow I’ll continue with core research, and after that plan to start breaking in the final days. @0xSimao
0
0
10