Matcha meta Dex aggregator hacked for $13.43 M
Official post-mortem link
Arbitrary-Call Vulnerability in SwapNet and Aperture Finance by BlockSec - link
@EthSecurity1
Official post-mortem link
Arbitrary-Call Vulnerability in SwapNet and Aperture Finance by BlockSec - link
@EthSecurity1
Matcha Meta
Matcha Meta | Meta DEX Aggregator
Find the best trades from top aggregators with live simulations to reduce reverts and improve execution quality.
🔥3
Molecular Finance is reported to have rug pulled on Arbitrum.
https://debank.com/profile/0x5a5c1410dc7a41d453c86a6276ceafd0ce050709/history
https://arbiscan.io/tx/0x784fd760e57f4cb68efad7cecee077ddde97824f4f31380ef9e16a34cba1f105
At least 320K USD have been stolen. The website molecular.finance and socials are gone.
@EthSecurity1
https://debank.com/profile/0x5a5c1410dc7a41d453c86a6276ceafd0ce050709/history
https://arbiscan.io/tx/0x784fd760e57f4cb68efad7cecee077ddde97824f4f31380ef9e16a34cba1f105
At least 320K USD have been stolen. The website molecular.finance and socials are gone.
@EthSecurity1
Arbitrum L2 Explorer
Arbitrum One Transaction Hash: 0x784fd760e5... | Arbitrum One
Transfer 214,557.59 USDC to 0x5a5c1410...0cE050709 | Success | Jan-30-2026 07:08:16 AM (UTC)
XPlayer Token $XPL hacked for $963K not listed on CoinGecko
RootCause: Missing Access Control
The NodeDistributePlus contract has a public
TX: https://bscscan.com/tx/0x9779341b2b80ba679c83423c93ecfc2ebcec82f9f94c02624f83d8a647ee2e49
Victim: https://bscscan.com/address/0xc2c4ccde8948c693d0b04f8bad461e35a12f20b8 (XPL Token)
@EthSecurity1
RootCause: Missing Access Control
The NodeDistributePlus contract has a public
DynamicBurnPool() function that allows anyone to burn XPL tokens from the liquidity pool. Attacker called this to burn nearly all XPL in the PancakePair, then swapped their small XPL balance to drain ~$963K USDT.TX: https://bscscan.com/tx/0x9779341b2b80ba679c83423c93ecfc2ebcec82f9f94c02624f83d8a647ee2e49
Victim: https://bscscan.com/address/0xc2c4ccde8948c693d0b04f8bad461e35a12f20b8 (XPL Token)
@EthSecurity1
BNB Smart Chain Explorer
Bsc Transaction Hash: 0x9779341b2b... | BscScan
Call 0xbe2684d4 Method By XPL Exploiter on 0x80bd723D...714399bD9 | Success | Jan-28-2026 01:33:47 PM (UTC)
🔥3
FHE Handbook for Beginners - link
everyone talks about Clawdbot, but here's how it works - link
How to make your agent learn and ship while you sleep - link
@EthSecurity1
everyone talks about Clawdbot, but here's how it works - link
How to make your agent learn and ship while you sleep - link
@EthSecurity1
sabanaku77.gitbook.io
Introduction | FHE-Handbook-For-Beginners
🔥8❤2
A Security-First Guide to Running OpenClaw (in 9 Steps) - link
The 6‑step checklist that can save you one full audit - link
@EthSecurity1
The 6‑step checklist that can save you one full audit - link
@EthSecurity1
X (formerly Twitter)
Vitto Rivabella (@VittoStack) on X
A Security-First Guide to Running OpenClaw (in 9 Steps)
🔥7
How memory works under the hood in the EVM and how this knowledge led me to recently discover a critical vulnerability - link
Stablecoin intro - What are stablecoins and why is the context important for a security researcher - link
@EthSecurity1
Stablecoin intro - What are stablecoins and why is the context important for a security researcher - link
@EthSecurity1
X (formerly Twitter)
kaden.eth (@0xKaden) on X
🧵How memory works under the hood in the EVM and how this knowledge led me to recently discover a ✨critical vulnerability✨
Oh and if you're new to assembly, don't worry, it's simpler than you think
Memory Layout
Starting with the basics, Solidity reserves…
Oh and if you're new to assembly, don't worry, it's simpler than you think
Memory Layout
Starting with the basics, Solidity reserves…
🔥7
seems everything gonna die, all markets. I guess everything will back when Islamic regime war end.
😢13🔥5😁5🍾3🫡1
Understanding Perpetual Derivatives Protocols: A Primer for Web3 Security - link
A deep dive into Axiom’s Halo2 circuits - link
@EthSecurity1
A deep dive into Axiom’s Halo2 circuits - link
@EthSecurity1
Medium
Understanding Perpetual Derivatives Protocols: A Primer for Web3 Security
Perpetual derivatives have become a cornerstone of decentralized finance. Since the launch of Perpetual Swaps by BitMEX in 2016, these…
🔥4
A Hitchhiker's Guide to Advance Solana Program Security - link
The Bug That Was Missed - How fuzzing for preconditions can lead to high severity vulnerabilities - link
CAP: The Core Tradeoff in Distributed System Design - link
@EthSecurity1
The Bug That Was Missed - How fuzzing for preconditions can lead to high severity vulnerabilities - link
CAP: The Core Tradeoff in Distributed System Design - link
@EthSecurity1
Substack
A Hitchhiker's Guide to Advance Solana Program Security
Many Solana program-security guides have been written— this, this and this—but as Solana’s popularity keeps climbing, some categories of bugs remain little known or at least little talked about.
👍5🔥2
AFX Staking hacked for ~$10,700
RootCause:
The AFX staking contract (
TX: https://bscscan.com/tx/0x380cd298a607d4422edc640b7f5a907ec0792841ee5fc963d265b1189397c905
Victim: https://bscscan.com/address/0x146933F2692F5fF3b62441AB3C2a65dDCAca753c (unverified)
Vulnerable Contract: https://bscscan.com/address/0x560d3973ee82a318d381c49fcbf3ce9d6cf1250b (unverified)
Attacker: https://bscscan.com/address/0x236f08d8962e1F29700e3D91009bfa8D37D71e53
@EthSecurity1
RootCause:
The AFX staking contract (
0x560d, unverified) has an externally callable addLiquidityUsdt() function that pulls AFX and AHT tokens from a pool contract (0x146933) via pre-existing unlimited approvals. The attacker flash-swapped AFX to manipulate the AFX/AHT pool ratio, then called addLiquidityUsdt() which pulled tokens from the pool at manipulated prices. Surplus tokens were returned to the attacker, who then swapped them for ~10,700 USDT profit.TX: https://bscscan.com/tx/0x380cd298a607d4422edc640b7f5a907ec0792841ee5fc963d265b1189397c905
Victim: https://bscscan.com/address/0x146933F2692F5fF3b62441AB3C2a65dDCAca753c (unverified)
Vulnerable Contract: https://bscscan.com/address/0x560d3973ee82a318d381c49fcbf3ce9d6cf1250b (unverified)
Attacker: https://bscscan.com/address/0x236f08d8962e1F29700e3D91009bfa8D37D71e53
@EthSecurity1
BNB Smart Chain Explorer
Address: 0x146933F2...DCAca753c | BscScan
Address (EOA) | Balance: $29.04 across 1 Chain | Transactions: 65 | As at Feb-12-2026 05:17:20 PM (UTC)
👏3❤1🔥1
The Custodial Stablecoin Rekt Test - link
Beyond Smart Contracts: A Deep Dive into Blockchain Infrastructure Security Auditing - link
@EthSecurity1
Beyond Smart Contracts: A Deep Dive into Blockchain Infrastructure Security Auditing - link
@EthSecurity1
The Trail of Bits Blog
The Custodial Stablecoin Rekt Test
Introducing the Custodial Stablecoin Rekt Test; a new spin on the classic Rekt Test for evaluating the security maturity of stablecoin issuers.
🔥3
The PancakeSwap V2 OCA/USDC pool on BSC hacked for ~$422K
RootCause : flash loan + flash swaps + repeated calls into OCA’s swapHelper to manipulate reserves
@EthSecurity1
RootCause : flash loan + flash swaps + repeated calls into OCA’s swapHelper to manipulate reserves
@EthSecurity1
BlockSEC : The news about TRON-USDT flows and @binance is not an isolated case.
In our 2025 Annual Report, we found:
On TRON, over 80% of scam-related outflows ultimately flow into centralized exchanges.
Interesting 🧐
@EthEecurity1
In our 2025 Annual Report, we found:
On TRON, over 80% of scam-related outflows ultimately flow into centralized exchanges.
Interesting 🧐
@EthEecurity1
🔥5
Reverse Engineering propAMMs Pricing Curves - link
Side-Channel Attacks Against LLMs - link
Most common prediction markets bugs - link
@EthSecurity1
Side-Channel Attacks Against LLMs - link
Most common prediction markets bugs - link
@EthSecurity1
X (formerly Twitter)
moon shiesty (@moonshiesty) on X
Reverse Engineering propAMMs Pricing Curves
🔥5
Speculation is heating up today that Moonwell’s smart contract bugs are the result of using Anthropic. Given the state of things, it’s hardly a shock.
@EthSecurity1
@EthSecurity1
⚡2
Your OpenClaw setup can be hacked in under 5 minutes
10 things to lock it down:
1. Run it on a VPS or Mac mini, not your main machine
2. Never run as root
3. Change the default port (18789 is public knowledge)
4. Install Tailscale (invisible to the internet, free)
5. SSH keys + Fail2ban (3 wrong tries = 24hr ban)
6. Firewall with UFW (close every port you don't need)
7. Allowlist your users (everyone else gets ignored)
8. Ask your bot to audit its own security
9. Set up real-time alerts (it messages you when something's off)
10. DMs only (group chats = everyone can control it)
Bonus: Sandbox your subagents in Docker. If one gets prompt injected, it can't touch your keys or files.
Copy & paste this to your OpenClaw.
Tell it to help you set these up
The "Security Alert" Tone: "Security Warning: Avoid sharing any personal identifiers—like your name, address, or even your hobbies—with OpenClaw. Protect your digital footprint."
@EthSecurity1
10 things to lock it down:
1. Run it on a VPS or Mac mini, not your main machine
2. Never run as root
3. Change the default port (18789 is public knowledge)
4. Install Tailscale (invisible to the internet, free)
5. SSH keys + Fail2ban (3 wrong tries = 24hr ban)
6. Firewall with UFW (close every port you don't need)
7. Allowlist your users (everyone else gets ignored)
8. Ask your bot to audit its own security
9. Set up real-time alerts (it messages you when something's off)
10. DMs only (group chats = everyone can control it)
Bonus: Sandbox your subagents in Docker. If one gets prompt injected, it can't touch your keys or files.
Copy & paste this to your OpenClaw.
Tell it to help you set these up
The "Security Alert" Tone: "Security Warning: Avoid sharing any personal identifiers—like your name, address, or even your hobbies—with OpenClaw. Protect your digital footprint."
@EthSecurity1
👍8
Security audit for LLM skill files. Paste a repo, get an instant report
https://skillaudit.sh
@EthSecurity1
https://skillaudit.sh
@EthSecurity1
skillaudit.sh
Security audit for LLM skill files in GitHub repositories
🔥3
New high severity solidity bug found that affected 0.8.28 through 0.8.33
Official solidity report
@EthSecurity1
Official solidity report
@EthSecurity1
Solidity Programming Language
Transient Storage Clearing Helper Collision Bug | Solidity Programming Language
Posted by Solidity Team on February 18, 2026
🔥3❤2