Opens profile photo
Follow
Click to Follow farazsth98
Faith
@farazsth98
blockchain hacker | ctfs w/ | prev: vuln researcher (0days in chrome, android) | @farazsth98@infosec.exchange
Perth, Australiafaith2dxy.xyzJoined May 2019

Faith’s Tweets

New year, new job, new bugs. Published a write-up about an interesting integer overflow issue in BNB Chain, the 4th largest blockchain.
Quote Tweet
We are now sharing the technical write-up of the vulnerability in @bnbchain that @_fel1x (a security researcher at @jump_) discovered and responsibly disclosed earlier this week: jumpcrypto.com/helping-secure
14
175
idea for an actual useful feature for twitter to put out: allow users to opt out of these new features. i dont want my timeline to be polluted with random bs :(
1
Show this thread
So, project on ImmuneFi uses signatures incorrectly, resulting in a high severity issue. I report it. Them - "this is a side-effect of a decentralized system using signatories, therefore it's out of scope, but we will give you $500 in good faith". I post a fix, and.... silence...
6
28
... Reminder to myself to never mention "question" and "M*tamask" in the same tweet..
Image
10
This begs the question: why does metamask (and other wallet providers, I assume) use dictionary words for their mnemonics? 12 words is a good amount but surely someone has a bot running that randomly generates dictionary mnemonics and checks if theres money on those addresses..
Quote Tweet
9/ 🤠 Wild-west Similarly, the @trufflesuite default mnemonic "candy maple cake sugar pudding cream honey rich smooth crumble sweet treat" is still being used in the wild in Ethereum today
Show this thread
Image
1
2
Show this thread
1/ 🫡💿💵🫰 With the advent of digital money, there is a lot of free money floating around waiting to be picked up Some have made hundreds of thousands Below are three of my favorite examples:
Opt Outside GIF by REI
GIF
8
95
Show this thread
Honestly this is probably one of the best ways to find "novel" targets for bug hunting. If you're one of the first to be able to figure out how to set up a testing environment that others don't have access to, testing out assumptions and figuring out the system becomes so easy.
Quote Tweet
Replying to @RightNowIn
Aha that was the difficult part :p that's what I would be blogging about. It's hard to put it into a tweet, but you basically need to set up nodes for each network locally + relayers to communicate between the networks + the bridge nodes + deploying contracts. A lot of setup..
11
Mostly because it's very easy to confirm a smart contract bug by testing it on a forked network. However, it's not so easy to just "fork" a bridge, since it spans multiple networks. Testing on the mainnet / testnet is also obviously out of the question.
1
3
Show this thread
Here's to hoping I don't get shafted by the project on Immunefi now. Surely being able to stop the bridge from functioning counts as a critical?😅 Will more than likely blog about this later down the line to make auditing bridges more accessible to all auditors.
1
6
Show this thread
Spent the last few days setting up a fully local testing environment for a bridge (multiple nodes + the bridge + relayers), and found a crit. I'm convinced more people don't hunt for vulns in bridges simply due to the sheer complexity of setting up the needed testing environment.
3
31
Show this thread
I know I don't do browser vuln research anymore, but it's nice to see glazunov is still a beast at it. Honestly a role model to vuln researchers in any field. The work ethic of this man and the results he puts out is insane
Quote Tweet
Chrome: Design flaw in Synchronous Mojo message handling introduces unexpected reentrancy and allows for multiple UAFs bugs.chromium.org/p/project-zero
2
68
Recreated the exploit for this here: github.com/farazsth98/rea Will write a (much shorter this time) blog post about this tomorrow. The bug is actually so stupid lol, no idea why this code even exists..
Quote Tweet
#CertiKSkynetAlert 🚨 We are seeing a #flashloan exploit on @SportsDao1. Contract BSC: 0x6666625Ab26131B490E7015333F97306F05Bf816 Exploit txn: bscscan.com/tx/0xb3ac111d2 The attacker took advantage of the rewards system and gained ~$13.6k
Image
8
Several young CTF players have asked me about working at . Great place to work, I learned immensely. Pros: highly-paid, cutting-edge VR job. full remote and async. coworkers are rock stars Cons: you may have to look at the same code bases for long periods of time
3
172
Show this thread
Just found out about dashboard.tenderly.co, works even better than etherscan / snowtrace for getting detailed data on transactions. Would've saved me a lot of time when analyzing the Nereus Finance flash loan attack if I knew about this.
10
Just finished analyzing the Nereus Finance flash loan attack. This was the perfect exercise for me to figure out how to break down a complex transaction step by step, and recreate it. New blog post coming very soon :) transaction here for the curious:
1
26
Show this thread