Alex the Entreprenerd pfp

Alex the Entreprenerd

@entreprenerd

32 Following
11 Followers


Alex the Entreprenerd pfp
Alex the Entreprenerd
@entreprenerd
In just a few hours we’ll host a unique event “Reverse Engineering for Security” We’ll have 3 elite open source devs showcase their tools to reverse engineer smart contracts on the EVM And well also do a deep technical dive into the Bybit exploit If you’re tired of trusting and want to verify, join us later today on X at ) pm CET https://x.com/getreconxyz/status/1893615517820412032
0 reply
0 recast
0 reaction

Alex the Entreprenerd pfp
Alex the Entreprenerd
@entreprenerd
Towards the end of the video we talk about some of the decision making behind each config (number of signers, timelock delay, etc..) I believe you can pick some of those and combine them based on your needs
0 reply
0 recast
0 reaction

Alex the Entreprenerd pfp
Alex the Entreprenerd
@entreprenerd
Pretty timely All of the advice the bybit team should have followed is in this 2 hour video Consider learning this for your own opsec
0 reply
1 recast
2 reactions

Alex the Entreprenerd pfp
Alex the Entreprenerd
@entreprenerd
It’s absolute inexcusable for projects to deploy with a multisig and no timelock In this 2 hours video I’m joined by security experts and DAO members to discuss the most common best practices for multisig and governance security https://x.com/getreconxyz/status/1885249716386226572?s=46
1 reply
1 recast
10 reactions

Alex the Entreprenerd pfp
Alex the Entreprenerd
@entreprenerd
I’m organising an event on reverse engineering bytecode for security Like this for a free invite!
0 reply
0 recast
0 reaction

Alex the Entreprenerd pfp
Alex the Entreprenerd
@entreprenerd
Like this if you use foundry
0 reply
0 recast
0 reaction

Alex the Entreprenerd pfp
Alex the Entreprenerd
@entreprenerd
Very happy to share a new podcast I’ve registered with @austingriffith ! - Watch me build the simplest lending market - One key invariant to prevent many critical exploits - Quickly scaffold invariant with the Sandbox - Convert echidna traces into foundry repros in one click A complete overview of our professional workflow at Recon, all based on open source tools and templates you can use yourself! https://www.youtube.com/embed/cUAgLUra3Zw
0 reply
0 recast
0 reaction

Alex the Entreprenerd pfp
Alex the Entreprenerd
@entreprenerd
AAVE V2 could have been exploited for a long time (this was 2021/2022), it wasn't because at the time nobody knew about the "donation" as a attack vector The same exploit today is performed automatically on new lending protocols
0 reply
0 recast
0 reaction

Alex the Entreprenerd pfp
Alex the Entreprenerd
@entreprenerd
One of the best ways to get started with Invariant Testing! December we hosted Fuzz Fest, an event focused solely on Fuzzing for security - How to Get started - Step by step examples of using Fuzz Testing to prevent exploits - Contributing to Medusa (OSS) - The UniV4 testing suite, by ToB https://www.youtube.com/watch?v=Cqmu-mhSLt8
0 reply
0 recast
0 reaction

Alex the Entreprenerd pfp
Alex the Entreprenerd
@entreprenerd
If you’re building a Liquity V2 fork that is not using exactly the same collaterals as the original DM me, I’ll save you $15k with 2 words
0 reply
0 recast
0 reaction

Alex the Entreprenerd pfp
Alex the Entreprenerd
@entreprenerd
Pro tip: Use Cmd + K to clear your terminal
0 reply
0 recast
0 reaction

Alex the Entreprenerd pfp
Alex the Entreprenerd
@entreprenerd
Who write invariant tests on the EVM? I have some cool open source tech to show you 👀
0 reply
0 recast
0 reaction

Alex the Entreprenerd pfp
Alex the Entreprenerd
@entreprenerd
Hello world
0 reply
0 recast
4 reactions