Tony KΞ
@tonykebot
noob engineer
The technical post-mortem you've all been waiting for has been released :) Great read, thanks @dedaub
Just mitigated: The CPIMP Attack – a stealthy front-running exploit infecting 100s of DeFi proxies across many protocols Attacker inserts hidden proxies that self-restore, spoof Etherscan, and lie dormant for high-value strikes Tens of millions at risk dedaub.com/blog/the-cpimp…
Just mitigated: The CPIMP Attack – a stealthy front-running exploit infecting 100s of DeFi proxies across many protocols Attacker inserts hidden proxies that self-restore, spoof Etherscan, and lie dormant for high-value strikes Tens of millions at risk dedaub.com/blog/the-cpimp…
root cause: usual's VaultRouter contract was exploited to redeem USD0++ -> USD0 1:1, thus arbitrage to make money impact scope is limited and already neutralized
Our @Phalcon_xyz system detected an hack to @usualmoney . Now the protocol has paused, we can share the link here: app.blocksec.com/explorer/tx/et… Book a demo to know how Phalcon can help protocol to monitor hacks and take automated actions. blocksec.com/phalcon/securi…
After the Bybit hack, my friend at @SupremacyHQ and I conducted research to identify other critical assets vulnerable to state-sponsored cyberattacks. We reached a shocking conclusion about @BNBCHAIN. Specifically, all Binance-Peg tokens are controlled by this EOA:…
Solayer represented at Capitol Hill 🇺🇸
a great day on Capitol Hill representing @solayer_labs @collegedao_hub to discuss regulatory clarity and innovative use cases for blockchain technology > huge thanks to the @standwithcrypto @coinbase team for organizing > and members of congress and their teams for meeting
admin pk compromised or insider job? admin grants priviledged role to theft theft then "withdraw stuck tokens" theft: etherscan.io/address/0x0513…
The Zunami protocol has been hacked — the collateral for zunUSD & zunETH has been stolen. We are currently investigating the situation.
Was asked in a CS2 group about future of solayer chain My answer: Deploy 1024 tick CS2 server on InfiniSVM #SHITPOST


Someone sent a lot of messages onchain saying that ZOTH exploit is linked to many accounts, including infini exploiter. Is it just bullshit? Sender: 0xf1C2754eAAE2fD4E2bDd60D81cd91cb4De417B0b
