Hunting for Security Bugs in Code with AI Agents: A Full WalkthroughIn my previous article, I introduced Hound, an open-source code auditing tool that models the cognitive and organizational processes of…Sep 7A response icon1Sep 7A response icon1
Unleashing the Hound: How AI Agents Find Deep Logic Bugs in Any CodebaseAug 26A response icon2Aug 26A response icon2
Reverse Engineering Inferno DrainerInferno Drainer is a widely used piece of JavaScript malware in web3 phishing campaigns. Its purpose is to drain the assets of phishing…Apr 17, 2024A response icon1Apr 17, 2024A response icon1
A Brief Analysis of Angel DrainerAngel drainer is a notorious piece of code used on web3 phishing sites. Its purpose is to extract the victim’s most valuable assets once…Apr 6, 2024A response icon1Apr 6, 2024A response icon1
Building a Secure NFT Gaming Experience. A Herdsman’s DiaryExperiences and learnings from my continuous security audit for Wolf Game.Dec 15, 2021A response icon3Dec 15, 2021A response icon3
Rage of the Machine: An AI* Makes MetalIntroducing the latest album from the versatile metal genius DeepSlayerXL, with song reviews by GPT-3.Aug 8, 2021A response icon4Aug 8, 2021A response icon4
Is Tether a Black Swan?A risk assessment by a DeFi security dude.Jun 18, 2021A response icon25Jun 18, 2021A response icon25
I asked GPT-3 for the question to “42”. I didn’t like its answer and neither will you.Can GPT-3 compute the ultimate question about life, the Universe and everything?Nov 24, 2020A response icon62Nov 24, 2020A response icon62
Catching Weird Security Bugs in Solidity Smart Contracts with Global Invariant ChecksContract invariants are properties of the program program state that are expected to always be true. In my previous article I discussed…Mar 24, 2020Mar 24, 2020