ulexec
@ulexec
Followers
3K
Following
8K
Media
56
Statuses
3K
Co-founder @inversive_xyz
Joined March 2015
π¦πΎπ¦ We have implemented Cross-CPI flows in Radiant, If you want to know how it works, we've published an example so you can see it in a more visual way. Testing in @solana is becoming much easier every time !
Cross-CPI flows in Radiant! β‘οΈ Symbolically executing program invocations across @solana program boundaries. In this example, a caller program invokes a callee's program increment instruction. The solutions shown are the parameter values that must be passed to the caller
0
3
8
Cross-CPI flows in Radiant! β‘οΈ Symbolically executing program invocations across @solana program boundaries. In this example, a caller program invokes a callee's program increment instruction. The solutions shown are the parameter values that must be passed to the caller
0
4
9
This effect is great; lately, I've been reading the radare book and learning a lot.
@Michael_e18 @HeyAndyS @Mikkke_crypto @Solana_zh Nice, thanks for your contribution! Better rust string resolution can be obtained with the custom sBPF commands we implemented for @radareorg . Iβm afraid the ghidra decompiler wonβt propagate these as of yet, however it works for the most part on r2dec. Working on few more PRs
0
3
7
π¦πΎπ¦ At @inversive_xyz , we are improving several OSS projects, such as the Solana static analyzer that I released a few months ago, with the goal of continuing to enhance and make the ecosystem more secure. I hope you like it
2
4
10
I'm excited to share a project we've been working hard on at @inversive_xyz : Radiant, a concolic execution engine for Solana. Any developer or auditor knows how challenging it can be without a robust testing framework. Radiant aims to solve that problem. We've included a GIF
Have you ever wanted to validate invariants with symbolic execution on Solana programs? Across CPI boundaries? Framework agnostic? Radiant simplifies security testing so you can focus on building. Learn more at: https://t.co/mQYiT8KYtO
0
6
29
Have you ever wanted to validate invariants with symbolic execution on Solana programs? Across CPI boundaries? Framework agnostic? Radiant simplifies security testing so you can focus on building. Learn more at: https://t.co/mQYiT8KYtO
0
4
11
In case you missed the stream, here is this year #r2con2025 presentation by @ulexec & @Seecoalba on supporting sBPF in @radareorg! Hope you enjoy it! https://t.co/Ap5X6ZidpX
0
8
25
Radare2 #r2con2025 day2 just started! link: https://t.co/1SUbJUvSez Our talk (@Seecoalba, @ulexec) premiers in 15 minutes, donβt miss it! π
0
5
11
Thrilled to announce that together with @Seecoalba we launched @inversive_xyz! Excited for this new chapter and really looking forward to showcasing what we are building!
Introducing Inversive Labs! π We're a Security Tooling, Research and Engineering provider focused on @solana and other non-EVM ecosystems. https://t.co/JEX6mLFklB | contact@inversive.xyz Let's make Solana faster and safer together! β‘οΈ
3
3
9
Today @radareorg #r2con2025 starts! β https://t.co/Og69r4Oj4S Tomorrow @ulexec and @Seecoalba will present our new radare2 plugins for @solana sBPF analysis, as way to give back to the community! Join us!
0
6
17
Introducing Inversive Labs! π We're a Security Tooling, Research and Engineering provider focused on @solana and other non-EVM ecosystems. https://t.co/JEX6mLFklB | contact@inversive.xyz Let's make Solana faster and safer together! β‘οΈ
2
4
11
πΎπ¦πΎ Working on some very promising new projects that will improve Solana's security I'm really looking forward to showing more about it π
4
1
27
Locus: Agentic Predicate Synthesis for Directed Fuzzing https://t.co/kHGrgB2gOw
arxiv.org
Directed fuzzing aims to find program inputs that lead to specified target program states. It has broad applications, such as debugging system crashes, confirming reported bugs, and generating...
0
0
3
LibLMFuzz: LLM-Augmented Fuzz Target Generation for Black-box Libraries https://t.co/KwD5E3osNZ
arxiv.org
A fundamental problem in cybersecurity and computer science is determining whether a program is free of bugs and vulnerabilities. Fuzzing, a popular approach to discovering vulnerabilities in...
0
0
2