> socials


> Security Researcher · Blockchain · Exploits · AI Agents
> gpt-3 'who is tintinweb'
</img>
> attack --surface
Smart Contracts · P2P Networks · Protocols · Cryptographic Implementations · Embedded Devices
> whoami
- improve Security for the Ethereum Ecosystem
- review complex Smart Contract Systems and Off-Chain components
- research new attack vectors and practice Responsible Disclosure
- buidl useful Tools to satisfy the lazy efficiency monk in me
- buidl AI-powered security agents and coding assistants
- led InfoSec for a major European corporation
- am on the Ethereum & Ethereum 2.0 Vulnerability Leaderboard
- am #39 in theCyber
- disclosed multiple vulnerabilities in cpp-ethereum, mist, parity, bitcoin-core, and bitcoin miners
- broke parts of Android, OpenSSH, Putty, Python, various Web Applications, and Embedded Devices
> featured
🥷 Vulnerability Research / Offensive
🔬 Security Research & Tools
VSCode Extensions · marketplace
🤖 AI / Agent Ecosystem
> trophy
OS agnostic, any programming language, any architecture, things will be reverse engineered if needed.
📋 Public Disclosures — 40+ vulnerabilities across:
- Android — CVE-2017-13208 · RCE via DHCP out-of-bounds write (Android 5.1–8.1)
- OpenSSH — CVE-2016-3115 · CRLF injection to bypass shell-command restrictions
- PuTTY — CVE-2016-2563 · Stack-based buffer overflow RCE via SCP
- Python — CVE-2016-0772 · StartTLS stripping in smtplib
- Ethereum — Mist browser arbitrary command execution, Parity SOP bypass, Trinity & Teku DoS
- Nim — 6 CVEs including arbitrary code execution via package metadata
- IPFS — Path traversal, IPNS downgrading & takeover, CORS bypass
- Bitcoin miners — RCE & directory traversal in cgminer, bfgminer, Claymore

Be a Hero, tip a 🍺 🙂 ⟶ Ƀ: 1AZMeGVfCBbYwVYyG9s79pJDyocTZgiApa | Ξth: 0x438B38E30eF117C15fBfF833f9C2c70182925815