#  @webrainsec webrainsec webrainsec posts on X about opensea, $100k, forum, dark the most. They currently have [--] followers and [--] posts still getting attention that total [-------] engagements in the last [--] hours. ### Engagements: [-------] [#](/creator/twitter::1949963830299164672/interactions)  ### Mentions: [--] [#](/creator/twitter::1949963830299164672/posts_active)  ### Followers: [--] [#](/creator/twitter::1949963830299164672/followers)  ### CreatorRank: [-------] [#](/creator/twitter::1949963830299164672/influencer_rank)  ### Social Influence **Social category influence** [cryptocurrencies](/list/cryptocurrencies) [finance](/list/finance) [exchanges](/list/exchanges) **Social topic influence** [opensea](/topic/opensea) #17, [$100k](/topic/$100k), [forum](/topic/forum), [dark](/topic/dark), [nfts](/topic/nfts), [blackhat](/topic/blackhat), [transaction](/topic/transaction), [code](/topic/code), [entire](/topic/entire), [defi](/topic/defi) **Top accounts mentioned or mentioned by** [@opensea](/creator/undefined) [@yannickcrypto](/creator/undefined) [@dexfi](/creator/undefined) [@cetusprotocol](/creator/undefined) [@immunefi](/creator/undefined) [@dexfi_](/creator/undefined) ### Top Social Posts Top posts by engagements in the last [--] hours "We analysed the alleged @opensea Seaport 0-day being sold for $100K on a dark web forum. 🧵 blackhat is selling an alleged 0-day critical severity opensea vulnerability that allows for force transfer of NFTs for [--] ETH https://t.co/OiRVBdoG99 blackhat is selling an alleged 0-day critical severity opensea vulnerability that allows for force transfer of NFTs for [--] ETH https://t.co/OiRVBdoG99" [X Link](https://x.com/anyuser/status/2022305211822285268) 2026-02-13T13:41Z [--] followers, 18.2K engagements "100 real-world DeFi exploits reproduced $389M in historical hacks proven with working Foundry PoCs. 100% solve rate. Average [---] minutes per exploit. The big hitters are Nomad Bridge ($152M) Cream ($130M) Akutar ($34M) Indexed Finance ($16M) and Team Finance ($15.8M)" [X Link](https://x.com/webrainsec/status/2020154464192057412) 2026-02-07T15:15Z [--] followers, [--] engagements "@DexFi_ @opensea why not nice opportunity to review a hardened target learn something and fact-check so we can call bs" [X Link](https://x.com/webrainsec/status/2022455462562767085) 2026-02-13T23:38Z [--] followers, [---] engagements "@YannickCrypto @opensea Uniswap v4 ez game" [X Link](https://x.com/webrainsec/status/2022619890939760874) 2026-02-14T10:32Z [--] followers, [---] engagements "We've seen entire finding categories in Move audits that are FPs because auditors applied the Solidity mental model" [X Link](https://x.com/webrainsec/status/2022638825491550649) 2026-02-14T11:47Z [--] followers, [--] engagements "What actually IS dangerous in Move: Bitwise shifts ( ) silently produce wrong values. No abort. This is exactly what caused the Cetus $223M exploit on Sui. as looks dangerous but is safe. looks safe but is dangerous. The trap is assuming one VM behaves like another" [X Link](https://x.com/webrainsec/status/2022638827890774142) 2026-02-14T11:47Z [--] followers, [--] engagements "One line of Move code that trips up every Solidity auditor: let val = (amount as u64); In Solidity this silently truncates. In Move this aborts the entire transaction. Same syntax. Opposite behaviour. Here's why it matters for audits:" [X Link](https://x.com/anyuser/status/2022638818478981464) 2026-02-14T11:47Z [--] followers, [---] engagements "Quick cheat sheet for Move operators: If you're crossing from EVM to Move audits recalibrate your threat model. The bug classes are different" [X Link](https://x.com/anyuser/status/2022638831317717487) 2026-02-14T11:47Z [--] followers, [--] engagements "@CetusProtocol https://x.com/webrainsec/status/2022638818478981464s=20 One line of Move code that trips up every Solidity auditor: let val = (amount as u64); In Solidity this silently truncates. In Move this aborts the entire transaction. Same syntax. Opposite behaviour. Here's why it matters for audits: https://t.co/MgA4PNkCTa https://x.com/webrainsec/status/2022638818478981464s=20 One line of Move code that trips up every Solidity auditor: let val = (amount as u64); In Solidity this silently truncates. In Move this aborts the entire transaction. Same syntax. Opposite behaviour. Here's why" [X Link](https://x.com/anyuser/status/2022638981733908799) 2026-02-14T11:48Z [--] followers, [--] engagements "gm time to find some vulns" [X Link](https://x.com/anyuser/status/2022619633577267220) 2026-02-14T10:31Z [--] followers, [--] engagements "RT @webrainsec: We analysed the alleged @opensea Seaport 0-day being sold for $100K on a dark web forum. 🧵" [X Link](https://x.com/anyuser/status/2022619215648489721) 2026-02-14T10:29Z [--] followers, [--] engagements "We analysed the alleged @opensea Seaport 0-day being sold for $100K on a dark web forum. 🧵 blackhat is selling an alleged 0-day critical severity opensea vulnerability that allows for force transfer of NFTs for [--] ETH https://t.co/OiRVBdoG99 blackhat is selling an alleged 0-day critical severity opensea vulnerability that allows for force transfer of NFTs for [--] ETH https://t.co/OiRVBdoG99" [X Link](https://x.com/anyuser/status/2022305211822285268) 2026-02-13T13:41Z [--] followers, 18.2K engagements "blackhat is selling an alleged 0-day critical severity opensea vulnerability that allows for force transfer of NFTs for [--] ETH" [X Link](https://x.com/anyuser/status/2022118032588562876) 2026-02-13T01:18Z [----] followers, 31K engagements "The domain separator includes the chainid preventing cross-chain replay even though the zone uses the same CREATE2 address across chains. If this were real the rational play is OpenSea's $3M Bugcrowd bounty. Not $100K on a forum" [X Link](https://x.com/anyuser/status/2022305222517789029) 2026-02-13T13:41Z [--] followers, [----] engagements "https://x.com/webrainsec/status/2022305211822285268s=20 We analysed the alleged @opensea Seaport 0-day being sold for $100K on a dark web forum. 🧵 https://x.com/webrainsec/status/2022305211822285268s=20 We analysed the alleged @opensea Seaport 0-day being sold for $100K on a dark web forum. 🧵" [X Link](https://x.com/anyuser/status/2022305396841394457) 2026-02-13T13:42Z [--] followers, [----] engagements "researching a possible valid 0/n-day that was presented on an exploit selling board let's see what we can uncover" [X Link](https://x.com/anyuser/status/2022281717483008360) 2026-02-13T12:08Z [--] followers, [--] engagements "Weve raised $30B in funding at a $380B post-money valuation. This investment will help us deepen our research continue to innovate in products and ensure we have the resources to power our infrastructure expansion as we make Claude available everywhere our customers are" [X Link](https://x.com/anyuser/status/2022023155423002867) 2026-02-12T19:01Z 833.8K followers, 6.9M engagements "escalated - closed. oversaw a minor detail that killed it. learned from it on to the next 🫡 @immunefi" [X Link](https://x.com/anyuser/status/2021996851155914910) 2026-02-12T17:16Z [--] followers, [--] engagements "gm Auditing bridges today. The gap between "owner can do X" and "owner accidentally does X" is where the real bugs hide" [X Link](https://x.com/anyuser/status/2020791833052209407) 2026-02-09T09:28Z [--] followers, [--] engagements Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing
@webrainsec webrainsecwebrainsec posts on X about opensea, $100k, forum, dark the most. They currently have [--] followers and [--] posts still getting attention that total [-------] engagements in the last [--] hours.
Social category influence cryptocurrencies finance exchanges
Social topic influence opensea #17, $100k, forum, dark, nfts, blackhat, transaction, code, entire, defi
Top accounts mentioned or mentioned by @opensea @yannickcrypto @dexfi @cetusprotocol @immunefi @dexfi_
Top posts by engagements in the last [--] hours
"We analysed the alleged @opensea Seaport 0-day being sold for $100K on a dark web forum. 🧵 blackhat is selling an alleged 0-day critical severity opensea vulnerability that allows for force transfer of NFTs for [--] ETH https://t.co/OiRVBdoG99 blackhat is selling an alleged 0-day critical severity opensea vulnerability that allows for force transfer of NFTs for [--] ETH https://t.co/OiRVBdoG99"
X Link 2026-02-13T13:41Z [--] followers, 18.2K engagements
"100 real-world DeFi exploits reproduced $389M in historical hacks proven with working Foundry PoCs. 100% solve rate. Average [---] minutes per exploit. The big hitters are Nomad Bridge ($152M) Cream ($130M) Akutar ($34M) Indexed Finance ($16M) and Team Finance ($15.8M)"
X Link 2026-02-07T15:15Z [--] followers, [--] engagements
"@DexFi_ @opensea why not nice opportunity to review a hardened target learn something and fact-check so we can call bs"
X Link 2026-02-13T23:38Z [--] followers, [---] engagements
"@YannickCrypto @opensea Uniswap v4 ez game"
X Link 2026-02-14T10:32Z [--] followers, [---] engagements
"We've seen entire finding categories in Move audits that are FPs because auditors applied the Solidity mental model"
X Link 2026-02-14T11:47Z [--] followers, [--] engagements
"What actually IS dangerous in Move: Bitwise shifts ( ) silently produce wrong values. No abort. This is exactly what caused the Cetus $223M exploit on Sui. as looks dangerous but is safe. looks safe but is dangerous. The trap is assuming one VM behaves like another"
X Link 2026-02-14T11:47Z [--] followers, [--] engagements
"One line of Move code that trips up every Solidity auditor: let val = (amount as u64); In Solidity this silently truncates. In Move this aborts the entire transaction. Same syntax. Opposite behaviour. Here's why it matters for audits:"
X Link 2026-02-14T11:47Z [--] followers, [---] engagements
"Quick cheat sheet for Move operators: If you're crossing from EVM to Move audits recalibrate your threat model. The bug classes are different"
X Link 2026-02-14T11:47Z [--] followers, [--] engagements
"@CetusProtocol https://x.com/webrainsec/status/2022638818478981464s=20 One line of Move code that trips up every Solidity auditor: let val = (amount as u64); In Solidity this silently truncates. In Move this aborts the entire transaction. Same syntax. Opposite behaviour. Here's why it matters for audits: https://t.co/MgA4PNkCTa https://x.com/webrainsec/status/2022638818478981464s=20 One line of Move code that trips up every Solidity auditor: let val = (amount as u64); In Solidity this silently truncates. In Move this aborts the entire transaction. Same syntax. Opposite behaviour. Here's why"
X Link 2026-02-14T11:48Z [--] followers, [--] engagements
"gm time to find some vulns"
X Link 2026-02-14T10:31Z [--] followers, [--] engagements
"RT @webrainsec: We analysed the alleged @opensea Seaport 0-day being sold for $100K on a dark web forum. 🧵"
X Link 2026-02-14T10:29Z [--] followers, [--] engagements
"We analysed the alleged @opensea Seaport 0-day being sold for $100K on a dark web forum. 🧵 blackhat is selling an alleged 0-day critical severity opensea vulnerability that allows for force transfer of NFTs for [--] ETH https://t.co/OiRVBdoG99 blackhat is selling an alleged 0-day critical severity opensea vulnerability that allows for force transfer of NFTs for [--] ETH https://t.co/OiRVBdoG99"
X Link 2026-02-13T13:41Z [--] followers, 18.2K engagements
"blackhat is selling an alleged 0-day critical severity opensea vulnerability that allows for force transfer of NFTs for [--] ETH"
X Link 2026-02-13T01:18Z [----] followers, 31K engagements
"The domain separator includes the chainid preventing cross-chain replay even though the zone uses the same CREATE2 address across chains. If this were real the rational play is OpenSea's $3M Bugcrowd bounty. Not $100K on a forum"
X Link 2026-02-13T13:41Z [--] followers, [----] engagements
"https://x.com/webrainsec/status/2022305211822285268s=20 We analysed the alleged @opensea Seaport 0-day being sold for $100K on a dark web forum. 🧵 https://x.com/webrainsec/status/2022305211822285268s=20 We analysed the alleged @opensea Seaport 0-day being sold for $100K on a dark web forum. 🧵"
X Link 2026-02-13T13:42Z [--] followers, [----] engagements
"researching a possible valid 0/n-day that was presented on an exploit selling board let's see what we can uncover"
X Link 2026-02-13T12:08Z [--] followers, [--] engagements
"Weve raised $30B in funding at a $380B post-money valuation. This investment will help us deepen our research continue to innovate in products and ensure we have the resources to power our infrastructure expansion as we make Claude available everywhere our customers are"
X Link 2026-02-12T19:01Z 833.8K followers, 6.9M engagements
"escalated - closed. oversaw a minor detail that killed it. learned from it on to the next 🫡 @immunefi"
X Link 2026-02-12T17:16Z [--] followers, [--] engagements
"gm Auditing bridges today. The gap between "owner can do X" and "owner accidentally does X" is where the real bugs hide"
X Link 2026-02-09T09:28Z [--] followers, [--] engagements
Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing
/creator/twitter::webrainsec