
Black Panther
@thepantherplus
Followers
4K
Following
32K
Media
109
Statuses
2K
software engineer | security researcher | Discord: _theblackpanther
Joined April 2022
another big win 🥉. just secured 3rd place in the @Aptos @aave contest hosted by @cantinaxyz. despite live fixes downgrading some of my other findings High→Low, still pulled 1H+1M. this was my first time auditing in Move lang, but as @zigtur always says: “Language doesn't
35
2
225
move has a sneaky footgun that can break your entire security model. test functions without the #[test_only] attribute become publicly callable by any module → your "internal test helpers" become production attack vectors → unauthorised operations everywhere. wen auditing.
1
0
25
Never skip deployment scripts of forks like this, one mistake in deployment script can lead to 67k $ pot 🚀.
The @asymmetryfin's USDaf v2 competition results are in. A modified Liquity-style CDP, new collateral types. Top-ranked researchers:. 🥇 @Zerocipher002 swept the $67.500 main prize pool with the only high.🥈 @ziusz: $1,250.🥉 @jayjonah_eth: $750. Full leaderboard below.
4
0
53
In move aptos there is no equivalent of hardhat and foundry yet, who gonna build it?.
6
0
22
Elon's "10 years → 6 months" principle can work for security audits too. he said take your 10 year goals and try to do them in the next six months. even if you fail, this is the correct mindset that wins. hot take, got 2 weeks for audit? attack it like you have 7 days. you.
7
4
66
move's hot-potato pattern enforces security via type system constraints, making policy bypass impossible by design. hot-potatoes are basically structs with zero abilities can't be stored or dropped → must be consumed within same trx → vm aborts if left unhandled → this forces.
move auto-checks for overflows in math ops, failing txns on detection. but bitwise ops? no such safeguards are present by default, potential overflow risks lurk unchecked. as a security researcher when auditing a move code, always check all bitwise instances in code for hidden.
2
0
17
August was a wild ride . wrapped up 3x private audits (1 sui move + 2x solidity). started a fresh one yesterday. explored a lot about sui move & ton (tact) in my research. loving the private grind, but kinda miss the contest adrenaline.
2
1
73
gm. be a quick learner and it’s an edge you have in web3 security . if it’s a new lang, new tech or new protocol … the quick learner always win.
9
3
67
i am preparing for a private audit written in tact built on ton, here are few resources which are really helpful in exploring ton, tact and it's common issues. ✔️ for tact the best resource is tact by example. ✔️ the awesome ton
github.com
A curated list of remarkable libraries, tools, services, protocols, and smart contracts related to TON. - ton-community/awesome-ton
3
1
30
gm. if you are new into aptos move and want to test your skills, must dig into this first flight by @Eman_Herawy ;).
Announcing First Flight #47: Pizza Drop, proudly sponsored by @AptosLabs!. nSLOC: ~125.Start date: August 28th, 2025 Noon UTC.Duration: 1 Week. Thanks so much to @Eman_Herawy for the submission of this codebase 🙏
3
2
14
RT @movebrah: Thinking of learning Move?. Here’s some no shit advice:. You don’t need to learn Rust first. A lot of people will try to ove….
0
12
0
gm. Every good firm I know is looking for move auditors, learn move, do move contests, do private audits, explore the ecosystem, talk about move. The demand is on peak!.
6
1
62
move auto-checks for overflows in math ops, failing txns on detection. but bitwise ops? no such safeguards are present by default, potential overflow risks lurk unchecked. as a security researcher when auditing a move code, always check all bitwise instances in code for hidden.
move has very interesting features & was architected with security as the foundational principle. in ethereum, contract calls another contract mid-execution → callbacks can manipulate state before original call finishes → leads to bugs like re-entrancy. in sui move, objects.
0
0
10
move has very interesting features & was architected with security as the foundational principle. in ethereum, contract calls another contract mid-execution → callbacks can manipulate state before original call finishes → leads to bugs like re-entrancy. in sui move, objects.
in eth we use token.approve(contract, amount) to approve tokens → contract can spend your tokens. in sui move, there is no built-in approve mechanism . devs solution is to build a custom "token vault" contract. users deposit → protocol act on it → magic happens ✨.
0
1
18
in eth we use token.approve(contract, amount) to approve tokens → contract can spend your tokens. in sui move, there is no built-in approve mechanism . devs solution is to build a custom "token vault" contract. users deposit → protocol act on it → magic happens ✨.
2
1
22
Look who is live on SoloAudit 🔥.
soloaudit.com
Security researcher
1. hey guys 👋. 🛡️Introducing SoloAudit — a public-good platform to make solo audits accessible for every Web3 project. We’re live 👇.
2
1
26
this is really important point, llm addiction weakens critical thinking by replacing routine cognitive work with AI assistance, imo it is really harmful for SRs who depend on independent analytical reasoning.
Junior researchers tend to overuse and abuse AI. I had @Montyly on THE NETWORK PODCAST. Here’s a short clip from the episode where he shares his take on using AI as you’re learning how to audit.
1
0
20
ranked 10 out of 506 auditors in the @Circuit_DAO contest on @cantinaxyz . chialisp felt weird at first, but complex code never stops a determined security researcher. big thanks to @cantinaxyz and @Circuit_DAO for hosting an incredible competition.
7
10
109
the power of lows in public contests. everyone’s chasing highs in audit contests.but the real gamechanger?.a clean low. (most are downgraded med/highs which adds value for sponsors). in the aptos × aave contest, top 3 tied on high+med. but 1st? broke the tie with a unique low —.
3
2
33