
Oualidpro
@oualidpro1
Followers
64
Following
270
Media
5
Statuses
343
Blockchain Security Pro π‘οΈ | Top 5 @Code4Rena Bot Racer π | Discovering Smart Contract Secrets π | Let's Secure Crypto Together π | DM for Insights π©
Joined May 2019
Just got the first place in the bot race for the second time! π₯π· Realy happy with the result of my hard work. @code4rena Let's keep pushing the boundaries of automation and tech excellence! #VulnDetector #code4rena #BotRace #SmartContracts
3
2
9
One way to speed up PoC is to load data from external sources instead of from the chain Hereβs an example btw don't forget to allow Foundry to read it in foundry.toml https://t.co/cVszAoXcTq
0
4
42
For those serious about account abstraction in @ethereum this 4-part series authored by @agfviggiano is a must: π‘A deep dive into the main components of #ERC4337 Account Abstraction Using Alt Mempool; addressing common questions, misconceptions, and security considerations.
1
7
29
Security is 1% finding bugs and 99% understanding how the code works.
8
26
198
Ever tried to deal USDC with Foundry and seeing it revert? Well, 3 weeks ago, the support for USDC was added. Update Foundry frequently everyone! https://t.co/8Rg85vVy8m
7
5
52
USDC has 18 decimals instead of 6 on the following chains: - Oasys - BNB - OKX Chain - Sora - Kucoin Chain - Telos - Conflux - Bitgert
8
16
194
The chart on theblock website left me stunned. The surge in stolen funds between 2020 and 2023 is alarming, indicating a pressing need for heightened security measures. Employing both manual and automated scans could help mitigate the risks effectively. https://t.co/4meEjbw4yl
0
0
1
@ddimitrovv22 Even rounding in the right direction could be exploited (stealth donation). I very, very much encourage everyone to read this:
euler.finance
2
4
34
If you're auditing a protocol that uses Compound V3, you should read these papers! @RareSkills_io π«‘ 1. The Architecture of the Compound V3 Smart Contract Link: https://t.co/48SBfX0OQt 2. DeFi Interest Rate Indexes Link: https://t.co/LqqLaz4fZc 3. Understanding Collateral,
1
17
85
Recommended Read π§ The following comprehensive article on "Exchange Rate Manipulation in ERC4626 Vaults" from @eulerfinance co-authored with the legendary @alcueca
https://t.co/KtLXqxzy6v
euler.finance
1
8
38
"There's plenty for everyone." Thatβs my mantra for sharing everything that worked out for me so far. I didnβt just scale from $0 to +300K by gatekeeping knowledge. I honestly believe none of my success would be here if I hadn't shared my ups and downs. By putting myself in
15
17
177
3 mandatory checklists to go through before doing a smart contract security audit on your codebase: 1. The Solcurity Standard - https://t.co/RsJx0M5CuA 2. Weird ERC20 tokens list - https://t.co/BH0R6wP6kS 3. Solodit aggregated checklists -
3
56
276
Alpha alert: Speed boost I've been using this for years, and I know some others have their own ways with macros, but lots just copy-paste the tags. This is how I write the audit tags and other things (cmd + a number). Do Cmd+Shift+P, open keyboard shortcuts (JSON), and add those.
10
15
58
Gotta recommend this extension again: https://t.co/qDKg2NfY9s . With it, you can visually tell which line is fully covered, which line is partially covered, and which line isn't covered at all. Try `forge coverage --report lcov` and then use this extension to see what I mean
marketplace.visualstudio.com
Extension for Visual Studio Code - Display test coverage generated by lcov or xml - works with many languages
1
3
17
"Scenarios", "Flows", "State Transitions", "Stories", "Threats", "Paths", "Levers". The used word doesn't matter: our ultimate ambition should be to identify all weird/edge/unexpected cases in the time we have on a security review. These words are just helpful representations.
4
1
16
I've made $500k+ from SSRF vulnerabilities. Here are my tricks:
84
1K
4K
π₯ Peer reviews in smart contract audits can provide invaluable insights. Different perspectives uncover different issues. #PeerReview #CollaborativeSecurity
0
0
0
π Gas optimization is important but not at the cost of security. Efficient code should also be secure code. #SmartContractDevelopment #GasOptimization
0
0
0
Early detection, early peace of mind - automated tools in smart contract security. #EarlyDetection #CryptoSafety
0
0
1