Рет қаралды 1,844
This Web3 Security Tool Changes The Game | Glider by Hexens Tutorial
Glider, a powerful new tool created by Hexens, is here to take your Web3 bug-hunting game to the next level. In this video, I’ll show you how to leverage Glider to uncover vulnerabilities across multiple smart contracts and potentially earn significant bug bounties.
~~~ Links ~~~
Try Glider for free: johnnytime.xyz/glider
Become a certified smart contract hacker: johnnytime.xyz/smart-contract...
Highlights:
- $50,000 Web3 Bounty Example: Learn from a recent discovery by Trust Security that earned them $50,000 by identifying a denial-of-service bug across multiple projects.
- Scale Your Efforts: Discover how to use Glider to find similar bugs in different protocols, increasing your bug bounty rewards exponentially.
- How Glider Works: Understand how to craft queries in CodeQL to search for vulnerabilities in smart contracts on Ethereum test networks and mainnet.
- Practical Demonstrations: Follow along with practical demos showing how to identify contracts with the selfdestruct opcode and detect ERC777 reentrancy vulnerabilities.
~~~ Timestamps ~~~
00:00 Intro
01:00 Maximizing Web3 Bug Bounties
03:07 What is Glider
06:20 Demo 1 - selfdestruct
09:55 Demo 2 - selfdestruct Advanced
12:18 Demo 3 - Open Burn Function
13:50 Demo 4 - ERC777 Reentrnacy Bugs
15:22 Summary