unvariant.io
@unvariant_io
Followers
78
Following
53
Media
1
Statuses
20
blockchain security research specialised in audits of DeFi apps
Joined August 2025
Balancer ComposableStablePool was drained in a series of batchSwaps almost a week ago. Plenty of short writeups popped up — most miss the root cause or lack details. We wanted to figure it out and we wrote a full deep-dive along the way: https://t.co/YI0Wqy3qsN
6
10
60
Just posted my latest and biggest web3 scam investigation: Scam Telegram. Together with @__noided, @blackbigswan from @_SEAL_Org and @unvariant_io, I revealed a massive scam scheme targeting users of every single DeFi protocol out there. https://t.co/zID2EDI6EX
timsh.org
How I found a large network of fake support groups spreading crypto stealers and drainers.
4
8
27
Run the tests and simulations yourself:
github.com
Contribute to unvariantio/balancer-hack-explained development by creating an account on GitHub.
0
0
3
We traced the exact swap that killed the pool - amountOut = 17. That tiny number broke the invariant and dropped virtual_price by ~98%. One line in _swapGivenOut() made all the difference.
1
0
4
Most posts stop at “math issue in StableMath.” That’s not it. The real bug hid in how Balancer handled rate-based tokens (osETH, wstETH) — one rounding direction flipped the invariant upside down.
1
0
1
Impact: Relayers do not receive their intended fee, while recipients receive more MTR than they should. Since relayers spend MTR to execute transactions and may be operated via automated scripts without per-transaction validation, this vulnerability could lead to a complete
0
0
1
Reentrancy in fee handling lets recipient steal relayer’s fee Found in the https://t.co/MxTpNRNJfm repository. In the PermitRouterV2._handleFee() and PermitRouter._handleFee() functions, there is a reentrancy vulnerability that allows malicious recipients to steal relayer’s
github.com
Contribute to meterio/tokenERC20 development by creating an account on GitHub.
0
0
1
How we discovered a reentrancy vulnerability in @meter_io About two months ago, our automated scanner tool discovered a reentrancy in Meter’s fee handling that lets recipients steal relayer’s fees. The scanner combines static analysis with a set of reviews by llms,
3
0
1
You do realize that the stated goal of Worldcoin is to create a digital identity, a definition of humanity, through which they will gate-keep technological and financial services. You do realize that they control the keys to create said human definitions and that there is no
42
122
572
Here’s how we trained LLM to find reentrancy vulnerabilities in smart contracts: https://t.co/zCOa2vEeHe Our model outperformed major static analysis tools like Slither and Mythril and even helped find a couple of real-world cases🥩
blog.unvariant.io
Discover how we used a small and open-source model to outperform major static analysis tools and find real-world cases
1
0
5