rotcivegaf Profile Banner
Rotciv Profile
Rotciv

@rotcivegaf

Followers
958
Following
410
Media
84
Statuses
590

Solidity auditor(carancho) in: @code4rena, @sherlockdefi, @immunefi

Blockchain
Joined July 2012
Don't wanna be here? Send us removal request.
@rotcivegaf
Rotciv
11 months
PoC of @Penpiexyz_io exploit.11,113.6 ETH (~$27,348,259 USD) .Not ez replay, what a work!!!.
3
31
173
@rotcivegaf
Rotciv
6 days
RT @sozuhaus: sozu haus buenos aires.
0
5
0
@rotcivegaf
Rotciv
9 days
Yate by @J4X_Security.
0
0
9
@rotcivegaf
Rotciv
10 days
RT @intmaxIO: The energy at @ETHGlobal Cannes was electric! .Seeing 8 teams craft truly private, user-centric payment solutions with @Intma….
0
1
0
@rotcivegaf
Rotciv
11 days
Privacy is the first amendment.
@intmaxIO
INTMAX main
11 days
🎉 Congrats to the winners of the Best Use of @intmaxIO at @ETHGlobal Cannes!.You’re pushing the limits of privacy, UX, and real-world impact. 🕶️⚡️. 🥇 GhostPayroll ($2,500).A fully encrypted USDC payroll system built on INTMAX. No one sees how much or to whom — just private,
Tweet media one
1
1
7
@rotcivegaf
Rotciv
17 days
A big small step for me!. @adrianromero approves my pr, learn some rust and by the way mine your own #buttpluggy the are uniques #huff NFTs.
Tweet media one
0
0
2
@rotcivegaf
Rotciv
27 days
RT @CyversAlerts: 🚨ALERT🚨Today, @hackenclub appears to have suffered a security breach across $BNB and $ETH networks. The deployer wallet o….
0
7
0
@rotcivegaf
Rotciv
29 days
RT @eugenioclrc: 🕹️ Check out Huff Hop created by @an0n
0
5
0
@rotcivegaf
Rotciv
1 month
Also maybe we have more than one path and maybe we can block the #Buttpluggy like in the last version(my bad, If you want to take a look .
0
0
2
@rotcivegaf
Rotciv
1 month
Third challenge and maybe the last(I think I got bored and forgot to work for the food XD).Ohhh Catalina, that eyes. This time is not only pectra bugs, we have some OG and real life stuffs.
1
2
12
@rotcivegaf
Rotciv
1 month
Yes, I was lazy, I thought about setting up a fruntruning bot to steal the #buttpluggy after the authorization transaction, forcing the hacker to send the hack within the authorization transaction or set up a bundle with @flashbots_x.
1
0
0
@rotcivegaf
Rotciv
1 month
Really impressive 0x88d5. 03F48 with only 1155 blocks(≈4 hours) was able to solve the challenge. Ended up sending the #buttpluggy to address 0xfB46. 9a36
Tweet media one
0
0
0
@rotcivegaf
Rotciv
1 month
The buttpluggy transfer transaction has not been completed yet, but believe me, it is in the mempool, I have had a few pints. Please understand me.
1
0
1
@rotcivegaf
Rotciv
1 month
The previous was easy, this time it's more difficult.I accidentally sent my freshly mined #Buttpluggy to the wrong address I'm sure I can get it back.Ohhh!!! look at these attr: .- TQTS soldier .- Laser eyes .- Hammer .- Blacksmith's tongs
4
0
7
@rotcivegaf
Rotciv
1 month
@webtresclub Congrats to 0x8ADf. cD78 the winner of the first CTF Pectra series
Tweet media one
0
0
1
@rotcivegaf
Rotciv
1 month
After research the Pectra update I decided to make some educational challenges.So take the #buttpluggy @webtresclub of the [0x6E6d](.If you are interested that I finish developing the other challenges please comment.
2
6
51
@rotcivegaf
Rotciv
2 months
RT @BazziBazzani: 💾 Just launched EVM-Storage codes!. Visualize, compare, and analyze Ethereum smart contract storage layouts with this onl….
0
48
0
@rotcivegaf
Rotciv
2 months
A T H !!!!.
0
0
0
@rotcivegaf
Rotciv
2 months
Mom and Dad thought I wouldn't finish college, and I'm at the top of the world!.By the way, I didn't finish it.Great race @p_misirov !.
@TheSecureum
SΞCURΞUM
2 months
🎉 Secureum RACE-40 Results. 💨 Number of Runners: 62.⚖️ Median Score: 4/8.🥇 Top Score: 7.5/8. 🙏 Designer: @p_misirov. ✍️ Reviewer: @patrickd_de 🏆🏆 Top 32 Leaderboard 🏆🏆
Tweet media one
0
0
11
@rotcivegaf
Rotciv
2 months
RT @SlowMist_Team: 🚨The @CurveFinance 's DNS might be hijacked. Users were directed to malicious websites. Don't interact!.
0
16
0
@rotcivegaf
Rotciv
2 months
PoC #Mobius(#MBU) exploit.~2.16 M BUSD.The contracts aren't verified but I think it was an error in the oracle, the attacker call the deposit function of contract 0x95e9 with 0.001 WBNB to mint a large amount of MBU.Used @BlockRazor_Inc to protect from MEV.
0
1
18