My primary focus is leading the ongoing develoment of secure smart contracts, from architecture, process, team training, and personal code review. I've worked in web3 since 2017, and smart contract security since the fall of 2020.
Code I have signed off on has *never* had a loss of user funds bug found by a hacker, auditor, or bounty program.
-> Secured the development of Prime Eth from 0 to $35+ million TLV.
-> Secured the development of OETH from 0 to $200+ million TLV.
-> Secured the development of OUSD from 0 to $380+ million TLV.
-> On SEAL 911 with samczsun. Am a member of the Security Alliance
-> Led or assisted incident response war rooms for 10+ protocols
-> #1 place team at the 2023 EthCC Wargames
I'm most known for my security focused tweets, and tear downs of how hacks actually worked. I tweet from @DanielVF. You should follow.
-> Bytecode exuction visualization
-> Inverse finance hack visualization
-> How signature malability attacks work
-> Audius hack
Upcoming: Incident Response Lessons from Human Spaceflight
FilCon Security, Brussels
Upcoming: How the CertiK hack on Kraken Worked
DeFi Security Summit Series
Safe Upgrades, The Most Dangerous Game
DeFi Security Summit 2023, Paris
Understanding hacks - Unchained | Blockchain Security Conference 2022
Securing smart contracts - Blockchain Security Series 2024