Today
Intel
Market
Earn
Settings
Account
Theme Selection
Light
Dark
Language
English
简体中文
繁體中文
Tiếng Việt
한국어
Followin APP
Mine Web3 Possibilities
App Store
Google Play
Log in
HackenProof
28,939 Twitter followers
Follow
Leading web3 bug bounty platform #StandWithUkraine Discord: https://bit.ly/3SUH5IE YT: https://bit.ly/3OEjadU TG: https://bit.ly/3utIw7y
Posts
HackenProof
03-17
Spot the Bug 🧠 ERC20 deposit accounting What’s the issue in this code?👇
HackenProof
03-16
Thread
#Thread#
🚀 Hiring CTO for a Spain-based Crypto Company HackenProof is supporting a reputable crypto company in Spain in the search for a key leadership hire: 📌 Chief Technology Officer (CTO) This is a direct position with the client, not with HackenProof. Role description in the comments below 👇
0XSEARCH
0%
HackenProof
03-13
Thread
#Thread#
He’s back. @ziko29504803 (@GallopingMrOwl) just dropped his second guest article on our blog. If you’ve read his previous piece, you already know the level. This time — he breaks down his full audit workflow used in competitive research 👇
SOL
0.12%
HackenProof
03-04
Spot the Bug 🧠 Session restore helper What’s the issue in this code?👇
HackenProof
03-04
❄️ In February 2026, we paid hackers $336,425 in bounties. 🙌 Grateful for every researcher in the community - keep going, exciting things are coming.
HackenProof
02-26
Thread
#Thread#
Your CRE workflow compiles. It passes simulation. But is it actually secure? Consensus is unforgiving — and even small non-deterministic mistakes can silently break production systems 👀 In this new guide, @Eman_Herawy — blockchain developer, security auditor, and one of the few female voices in Web3 community — breaks down the real vulnerabilities developers overlook when building with Chainlink CRE👇
CRE
0%
HackenProof
02-25
Thread
#Thread#
🚀 Hiring CTO & CISO for a Spain-based Crypto Company HackenProof is supporting a reputable crypto company in Spain with two key leadership roles: - Chief Technology Officer (CTO) - - Chief Information Security Officer (CISO) These are direct positions with the client (not with HackenProof). Role descriptions in the comments below👇
HackenProof
02-24
Spot the Bug 🧠 Time lock storage What’s the issue in this code?👇
HackenProof
02-10
Thread
#Thread#
HackenProof is proud to contribute to @erc4337 security. Through our bug bounty program, @TrustSec discovered a high-severity DoS attack in ERC-4337 — enabling transaction blocking via frontrunning and contract state manipulation (e.g., reentrancy guards), causing reverts while users pay gas. twitter.com/HackenProof/status...
BOUNTY
0.27%
HackenProof
02-10
Spot the Bug 🧠 Price-based mint What’s the issue in this code?👇
Loading..