Workflow
Security
icon
Search documents
X @Sui
Sui· 2025-09-29 17:44
https://t.co/im3QjGjTM7Haedal🦦 (@HaedalProtocol):Haedal is proud to join the Sui Ecosystem Security Expansion Program with @SuiNetwork and fellow partners — a collective effort to strengthen defenses through real-time monitoring, comprehensive formal verification, and ecosystem-wide protections. 🛡️Building the ultimate https://t.co/lFBoNCT5EB ...
X @Sui
Sui· 2025-09-29 14:00
https://t.co/hJbZiMbG9FBlockaid (@blockaid_):Blockaid and @SuiFoundation partner to enhance the security of the Sui ecosystem.This includes:→ Ecosystem-wide wallet protection for every user→ Transaction simulation to block malicious wallet interactions→ Real-time monitoring to stop malicious NFT airdrops and https://t.co/24rqPUc8eP ...
X @Sui
Sui· 2025-09-29 13:59
Security Enhancement Program - HackenProof 与 Sui Network 合作推出安全扩展计划 [1] - 该计划旨在提升 Sui 生态系统的安全性,为建设者、用户、应用程序和合约提供世界一流的保护 [1] Ecosystem Focus - 该计划的任务是提升 Sui 生态系统的安全性 [1]
X @Sui
Sui· 2025-09-29 13:59
https://t.co/8KwIAy1yp5Asymptotic (@AsymptoticTech):Proud to join @SuiNetwork's Ecosystem Security Expansion as the formal verification partner 🛡️Our mission: Comprehensive Formal Verification for all critical Sui infrastructure and top DeFi protocols.This goes beyond standard security practices. While other chains rely on ...
X @Sui
Sui· 2025-09-29 13:00
The Sui ecosystem is scaling fast.More builders. More apps. More users.With that momentum comes a responsibility: keep everyone safe.That's why the Sui Foundation is funding enterprise-grade defenses and making them accessible to teams building on Sui with a $10M fund. https://t.co/N2ebRhJzRo ...
X @Bloomberg
Bloomberg· 2025-09-29 09:39
After a wave of drone incursions, Denmark is receiving security assistance from NATO allies ahead of a high-level meeting of European leaders in Copenhagen https://t.co/4ZN1jFhkvt ...
X @Elon Musk
Elon Musk· 2025-09-29 05:26
Code Optimization Strategy - The AI panel's mission is to analyze, refactor, and harden code to production standards, focusing on security, performance, maintainability, and quality [1] - Decision precedence prioritizes correctness and security over API stability, performance, and maintainability/style [2] - The process involves phases: Intake and Strategy, Implementation, Recursive Critique and Improvement (RCI), and Verification and Delivery [7] Security Considerations - Security risks are assessed with severity labels (Critical, High, Med, Low) and include CWE IDs and CVSS base scores [9] - Hardcoded secrets, unsafe deserialization, and `eval` on untrusted data are prohibited; input validation and normalization are required [4] - Constant-time compares should be used for secrets when relevant [14] Performance Optimization - Performance issues are analyzed with Big-O notation and memory hotspots, including expected memory deltas for changed hot paths [9] - Time and space complexity for changed hot paths should be noted, avoiding premature micro-optimizations [14] - Data structures, hot paths, I/O, and concurrency should be optimized [17] Maintainability and Architecture - Code should be readable, well-documented, and testable, considering pure vs side effects and test seams [1][2] - Public APIs should have types/annotations and docstrings/docs [13] - Coupling, cohesion, and test seams should be addressed [10]
X @TechCrunch
TechCrunch· 2025-09-28 14:04
Ami Luttwak, CTO of Wiz, breaks down how AI is changing cybersecurity, why startups shouldn't write a single line of code before thinking about security, and opportunities for upstarts in the industry. https://t.co/wfOVGtdBMJ ...
X @Starknet
Starknet 🐺🐱· 2025-09-27 14:27
RT Fiddius Maximus - privacy/acc 🦡 (@fiddybps1)SN is one of the only L2s to keep pushing down the decentralization path so this take is a bit misdirected. Decentralization might not be valued much by the market right now but it doesn't mean it isn't valuable. We build on ETH precisely because of its security and decentralization guarantees.Also, Eli has done more for this space than most people I know. Having access to him and the SW team was a big reason we decided to fork public SN and build the first ZK ...
X @Ivan on Tech 🍳📈💰
Privacy & Security - The industry emphasizes the importance of privacy and security for private communications, advocating for solutions without hackable backdoors [1] - The industry criticizes government officials seeking exemptions from laws they impose on others, highlighting potential conflicts of interest [1] Regulatory Concerns - The industry expresses concern over potential chat control measures, viewing them as a threat to societal security [1]