
Neodyme
@Neodyme
Followers
5K
Following
369
Media
80
Statuses
352
We secure software with deep-dive audits, cutting-edge research, and in-depth trainings. Secure your solana program with Riverguard @ https://t.co/VmxVHzx2U2 ποΈπ
Germany
Joined August 2021
Introducing Riverguard ποΈπ A new security tool for Solana program deployers... π§΅ https://t.co/LGgTiXA0lj
13
71
97
Heading to @hack_lu? π Our colleague Felipe will discuss how partial emulation and DFA can be used to study a legacy version of Widevine L3, Google's software-based DRM. β‘οΈ Dive into the past to strengthen future DRM security. ποΈ Oct 23 at 2:15pm https://t.co/5hMljQ8DfE
2025.hack.lu
Agenda - Hack.lu and CTI summit 2025
0
3
3
β‘οΈ Lenovo DCC contained an easy-to-exploit LPE: a weak ACL bug β local privilege escalation β full admin π₯οΈπ¨βπ» We break it down with reverse engineering, process tracing, & two exploit strategies. Read Part 1 of our deep dive: π
neodyme.io
The Lenovo Display Control Center (DCC), widely deployed in Windows enterprise environments, contained a critical local privilege escalation vulnerability enabling unauthorized elevation to adminis...
1
4
9
βΆοΈ We built a proof-of-concept post-quantum FIDO authenticator. It's phishing- AND quantum-resistant. β
οΈBonus: it even outperforms Google's prototype. π Full write-up here:
neodyme.io
We have built our own FIDO2 token based on post-quantum crypto. Here is how.
1
4
12
βοΈTeamwork doesn't just happen at the desk. This week, our crew is in Mallorca, building ideas, strengthening bonds, and enjoying some well-deserved sunshine together.π΄ Great collaboration comes from trust, connection, and a shared good vibeβ¨
1
0
10
π We're sponsoring the TUM Blockchain Conference 2025! @tbc_munich π Sept 11β12 π House of Communication, Munich We're giving away 10 free tickets ποΈ Want one? π Comment why you want to attend Winners will be announced soon. Don't miss it!
2
0
4
Very proud to support the TUM Blockchain Conference taking place September 11-12, 2025.
Meet our Bronze Sponsors π π’ Weβre thrilled to announce @StakingFac, @Neodyme and @ArciumHQ as the bronze sponsors of the TUM Blockchain Conference 2025! Staking Facilities are a leading provider of enterprise-grade Web 3.0 infrastructure and non-custodial staking services
0
0
1
Stopping sandwiching requires more than patches, it requires principles.
Sandwiching has been a recurring issue in Solanaβs history. The real solution? Accountability and honesty. Patrick Reich from @neodyme breaks down how @MarinadeFinance Select is stopping sandwiching by committing to ethical onchain practices.
0
0
1
Note that this isn't just savings in P-Token instructions. It's savings relative to the overall throughput of the blockchain, failed and vote transactions included. IBRL!
4
0
23
From 2025-08-03 up to and including all of 2025-08-11, using P-Token would have saved a total of: - 8.90T CUs with logging enabled, - 9.14T CUs with logging disabled. This constitutes an impressive saving of 12.0% and 12.3% of TOTAL used blockspace respectively.
2
4
58
Using our infrastructure at https://t.co/LGgTiXzsvL, we executed every mainnet transaction from the past few months twice, once with the original Token Program, and again with P-Token. We checked that the output does not differ, and also measured CU savings:
1
0
21
We've concluded our audit of P-Token, Solana's new token program build with Pinocchio. It promises impressive savings in Compute Unit (CU) usage. But what exactly does this mean in practice? We've investigated ποΈ
15
25
145
Back from @BlackHatEvents & @defcon! π Our colleagues delivered insightful trainings on crypto hacking and binary exploitation and got amazing feedback from the crowd π Missed it? We offer tailored security trainings for companies too. Just reach out.
1
3
27
We reported a vulnerability in Parallels Client via @thezdi last year. π₯ The issue (CVE-2025-6812) - now fixed: A privileged service searched for an OpenSSL config file in an unsecured location, enabling LPE. β‘οΈ Advisory here: https://t.co/snjiUw8gLt βοΈ Patch your systems!
neodyme.io
The AppServer service installed with Parallel Client searches for an OpenSSL config file in an unsecured location, which allowed low privileged users to escalate their privileges.
0
8
23
π§β¨ On our company retreat this week, we're diving into hardware and protocol hacking: fingerprint sensors, smart locks, drones and Bluetooth speakers. A great mix of hands-on research, creative exploration, and team bonding over board games!π²
0
2
9
We now have all the puzzle pieces to understand how the exploit worked. In GMX's contract structure, the normal flow of a position increase is as follows: The Position Manager is called by the keeper and triggers the position increase in the orderbook and vault. It then updates
0
0
1
3. Complicated cache design: Another component in GMX, the GlpManager, is responsible for minting or burning pool shares in the form of GLP tokens. To accurately price these tokens, it has to track profits from shorts which the protocol has generated but not yet realized. This
1
0
1
2. Loose access restriction: The vault's increasePosition instruction, which allows an increase in short positions, is only allowed when "leverage is enabled". This is a global flag that the Position Manager sets to true before calling the vault, and back to false after
1
0
1
Let's start with 1, the control flow hijack: Users can register the intent to decrease their position with GMX. The actual execution of this is done by a "keeper", an off-chain bot that is the only one that can directly modify positions. In this case, the attacker caused the
1
0
3