Oualidpro Profile
Oualidpro

@oualidpro1

Followers
64
Following
270
Media
5
Statuses
343

Blockchain Security Pro πŸ›‘οΈ | Top 5 @Code4Rena Bot Racer 🏁 | Discovering Smart Contract Secrets 🌐 | Let's Secure Crypto Together πŸš€ | DM for Insights πŸ“©

Joined May 2019
Don't wanna be here? Send us removal request.
@oualidpro1
Oualidpro
2 years
Just got the first place in the bot race for the second time! πŸ₯‡πŸ“· Realy happy with the result of my hard work. @code4rena Let's keep pushing the boundaries of automation and tech excellence! #VulnDetector #code4rena #BotRace #SmartContracts
3
2
9
@oualidpro1
Oualidpro
9 months
Lesson of the day ... do not ever miss the escalation phase.
0
0
0
@00xSEV
Sev
1 year
One way to speed up PoC is to load data from external sources instead of from the chain Here’s an example btw don't forget to allow Foundry to read it in foundry.toml https://t.co/cVszAoXcTq
Tweet media one
0
4
42
@SecurityOak
Oak Security
1 year
For those serious about account abstraction in @ethereum this 4-part series authored by @agfviggiano is a must: πŸ’‘A deep dive into the main components of #ERC4337 Account Abstraction Using Alt Mempool; addressing common questions, misconceptions, and security considerations.
1
7
29
@bytes032
@bytes032.xyz
1 year
Security is 1% finding bugs and 99% understanding how the code works.
8
26
198
@BowTiedDravee
dravee.eth
1 year
Ever tried to deal USDC with Foundry and seeing it revert? Well, 3 weeks ago, the support for USDC was added. Update Foundry frequently everyone! https://t.co/8Rg85vVy8m
Tweet media one
7
5
52
@bytes032
@bytes032.xyz
2 years
rare footage of auditor trying to find a bug
7
8
115
@bytes032
@bytes032.xyz
2 years
USDC has 18 decimals instead of 6 on the following chains: - Oasys - BNB - OKX Chain - Sora - Kucoin Chain - Telos - Conflux - Bitgert
8
16
194
@oualidpro1
Oualidpro
2 years
The chart on theblock website left me stunned. The surge in stolen funds between 2020 and 2023 is alarming, indicating a pressing need for heightened security measures. Employing both manual and automated scans could help mitigate the risks effectively. https://t.co/4meEjbw4yl
Tweet media one
0
0
1
@BowTiedDravee
dravee.eth
2 years
@ddimitrovv22 Even rounding in the right direction could be exploited (stealth donation). I very, very much encourage everyone to read this:
Tweet card summary image
euler.finance
2
4
34
@ShieldifyAnon
Mr Anon
2 years
If you're auditing a protocol that uses Compound V3, you should read these papers! @RareSkills_io 🫑 1. The Architecture of the Compound V3 Smart Contract Link: https://t.co/48SBfX0OQt 2. DeFi Interest Rate Indexes Link: https://t.co/LqqLaz4fZc 3. Understanding Collateral,
1
17
85
@BowTiedDravee
dravee.eth
2 years
Recommended Read 🧐 The following comprehensive article on "Exchange Rate Manipulation in ERC4626 Vaults" from @eulerfinance co-authored with the legendary @alcueca https://t.co/KtLXqxzy6v
Tweet card summary image
euler.finance
1
8
38
@bytes032
@bytes032.xyz
2 years
"There's plenty for everyone." That’s my mantra for sharing everything that worked out for me so far. I didn’t just scale from $0 to +300K by gatekeeping knowledge. I honestly believe none of my success would be here if I hadn't shared my ups and downs. By putting myself in
15
17
177
@pashovkrum
pashov
2 years
3 mandatory checklists to go through before doing a smart contract security audit on your codebase: 1. The Solcurity Standard - https://t.co/RsJx0M5CuA 2. Weird ERC20 tokens list - https://t.co/BH0R6wP6kS 3. Solodit aggregated checklists -
3
56
276
@BowTiedDravee
dravee.eth
2 years
Alpha alert: Speed boost I've been using this for years, and I know some others have their own ways with macros, but lots just copy-paste the tags. This is how I write the audit tags and other things (cmd + a number). Do Cmd+Shift+P, open keyboard shortcuts (JSON), and add those.
Tweet media one
10
15
58
@BowTiedDravee
dravee.eth
2 years
Gotta recommend this extension again: https://t.co/qDKg2NfY9s . With it, you can visually tell which line is fully covered, which line is partially covered, and which line isn't covered at all. Try `forge coverage --report lcov` and then use this extension to see what I mean
Tweet card summary image
marketplace.visualstudio.com
Extension for Visual Studio Code - Display test coverage generated by lcov or xml - works with many languages
1
3
17
@BowTiedDravee
dravee.eth
2 years
"Scenarios", "Flows", "State Transitions", "Stories", "Threats", "Paths", "Levers". The used word doesn't matter: our ultimate ambition should be to identify all weird/edge/unexpected cases in the time we have on a security review. These words are just helpful representations.
4
1
16
@hacker_
Corben Leo
2 years
I've made $500k+ from SSRF vulnerabilities. Here are my tricks:
Tweet media one
84
1K
4K
@oualidpro1
Oualidpro
2 years
πŸ‘₯ Peer reviews in smart contract audits can provide invaluable insights. Different perspectives uncover different issues. #PeerReview #CollaborativeSecurity
0
0
0
@oualidpro1
Oualidpro
2 years
πŸ“Š Gas optimization is important but not at the cost of security. Efficient code should also be secure code. #SmartContractDevelopment #GasOptimization
0
0
0
@oualidpro1
Oualidpro
2 years
Early detection, early peace of mind - automated tools in smart contract security. #EarlyDetection #CryptoSafety
0
0
1