<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>Behind the Code</title>
        <link>https://paragraph.com/@behind-the-code</link>
        <description>Combining my creativity with my rabbithole methodology to learn about Blockchain Security Research and Smart Contract Auditing. </description>
        <lastBuildDate>Sat, 25 Apr 2026 01:53:19 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <image>
            <title>Behind the Code</title>
            <url>https://storage.googleapis.com/papyrus_images/88ed1101003971cb07d35ce43164c6a675c71ec6ac0234d986d453411afada37.png</url>
            <link>https://paragraph.com/@behind-the-code</link>
        </image>
        <copyright>All rights reserved</copyright>
        <item>
            <title><![CDATA[The Ultimate List of Crypto Job Boards]]></title>
            <link>https://paragraph.com/@behind-the-code/the-ultimate-list-of-crypto-job-boards</link>
            <guid>INymFomUXdWsZmO4bukz</guid>
            <pubDate>Sun, 04 Feb 2024 16:03:21 GMT</pubDate>
            <description><![CDATA[Some are more active then others. Web3.career and Crypto Jobs List are the most active, so I placed them at the top.Crypto Job Boards across the space:https://web3.career/ https://cryptojobslist.com/ https://cryptocurrencyjobs.co/ https://jobs.hashed.com/jobs?remoteOnly=true https://beincrypto.com/jobs/ https://cryptojobster.com/ https://remote3.co/ https://incosmos.work/ https://myweb3jobs.com/ https://remotive.com/ https://wellfound.com/jobs https://remoteok.com/remote-web3-jobs https://job...]]></description>
            <content:encoded><![CDATA[<p>Some are more active then others. Web3.career and Crypto Jobs List are the most active, so I placed them at the top.</p><h2 id="h-crypto-job-boards-across-the-space" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Crypto Job Boards across the space:</h2><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://web3.career/">https://web3.career/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://cryptojobslist.com/">https://cryptojobslist.com/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://cryptocurrencyjobs.co/">https://cryptocurrencyjobs.co/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://jobs.hashed.com/jobs?remoteOnly=true">https://jobs.hashed.com/jobs?remoteOnly=true</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://beincrypto.com/jobs/">https://beincrypto.com/jobs/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://cryptojobster.com/">https://cryptojobster.com/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://remote3.co/">https://remote3.co/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://incosmos.work/">https://incosmos.work/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://myweb3jobs.com/">https://myweb3jobs.com/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://remotive.com/">https://remotive.com/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://wellfound.com/jobs">https://wellfound.com/jobs</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://remoteok.com/remote-web3-jobs">https://remoteok.com/remote-web3-jobs</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://jobs.theblockchainassociation.org/jobs">https://jobs.theblockchainassociation.org/jobs</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://crypto.jobs/">https://crypto.jobs/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://portfoliojobs.jumpcrypto.com/jobs">https://portfoliojobs.jumpcrypto.com/jobs</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.paradigm.xyz/opportunities">https://www.paradigm.xyz/opportunities</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://app.usebraintrust.com/jobs/">https://app.usebraintrust.com/jobs/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.useweb3.xyz/jobs">https://www.useweb3.xyz/jobs</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://cryptojobs.world/">https://cryptojobs.world/</a></p><h2 id="h-jobs-at-security-research-companies-aka-smart-contract-auditing" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Jobs at Security Research Companies (AKA Smart Contract Auditing):</h2><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://boards.greenhouse.io/trailofbits">Jobs at Trail of Bits</a> <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.openzeppelin.com/jobs?gh_src=673db8643us">OpenZeppelin</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://hacken.peopleforce.io/careers">https://hacken.peopleforce.io/careers</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/Cyfrin/OpenPositions">https://github.com/Cyfrin/OpenPositions</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://dedaub.com/careers">https://dedaub.com/careers</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.quillaudits.com/careers">https://www.quillaudits.com/careers</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.hashlock.com.au/careers">https://www.hashlock.com.au/careers</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.certik.com/company/careers">https://www.certik.com/company/careers</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://consensys.io/open-roles?discipline=32525">https://consensys.io/open-roles?discipline=32525</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.flashbots.net/jobs">https://www.flashbots.net/jobs</a></p>]]></content:encoded>
            <author>behind-the-code@newsletter.paragraph.com (Behind the Code)</author>
        </item>
        <item>
            <title><![CDATA[Sleight of Hand]]></title>
            <link>https://paragraph.com/@behind-the-code/sleight-of-hand</link>
            <guid>5UkHD5KN9eM4FUfGAIyY</guid>
            <pubDate>Tue, 30 Jan 2024 21:39:21 GMT</pubDate>
            <description><![CDATA[The stablecoin Abracadabra.money (MIM) experienced another significant exploit early on January 30th, resulting in a flash crash to $0.76. This exploit was revealed by blockchain security company PeckShield, which indicated that the attacker&apos;s funds originated from Tornado Cash. Based on an Etherscan Screenshot shared by PeckShield, the attack specifically targeted Abracadabra&apos;s &apos;Degenbox&apos; feature, which automatically executes performance-enhancing strategies.Abracadabra&a...]]></description>
            <content:encoded><![CDATA[<p>The stablecoin Abracadabra.money (MIM) experienced another significant <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/MIM_Spell/status/1752286636740579440">exploit</a> early on January 30th, resulting in a flash crash to $0.76. This exploit was revealed by blockchain security company <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/peckshield/status/1752279373779194011">PeckShield</a>, which indicated that the attacker&apos;s funds originated from Tornado Cash. Based on an Etherscan <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/peckshield/status/1752279373779194011/photo/1">Screenshot</a> shared by PeckShield, the attack specifically targeted Abracadabra&apos;s &apos;Degenbox&apos; feature, which automatically executes performance-enhancing strategies.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/e801acfb1eaf28756b6cb5e9882ef898d8b071adb7fd708aa8084de0690d44b3.png" alt="Abracadabra&apos;s Degenbox" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="">Abracadabra&apos;s Degenbox</figcaption></figure><p>The hacker swapped $7 Million of MIM for a total of $6.3 Million in ETH, incurring around 10% slippage when they dumped it on Curve. They’re now holding the ETH in two addresses:</p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://etherscan.io/address/0x40d5ffa20fc0df6be4d9991938daa54e6919c714">0x40d5FFA20fC0dF6bE4D9991938dAa54E6919c714</a> ($4.15M ETH)</p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://etherscan.io/address/0xbd12d6054827ae3fc6d23b1acf47736691b52fd3">0xbD12D6054827ae3fc6D23B1aCf47736691b52Fd3</a> ($2.16M ETH)</p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://blocksec.com/">BlockSec</a> Phalcon detected the ongoing assaults on Abracadabra.money, mostly targeting MIM and posted it on <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/Phalcon_xyz/status/1752278614551216494">Twitter.</a> <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/MageIntern">@MageIntern</a> from <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/Offside_Labs">Offside Labs</a> offered a <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/MageIntern/status/1752319261908017632">play by play</a> of the situation on Twitter account:</p><p>“<em>We noticed an attack transaction targeting </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/MIM_Spell"><em>@MIM_Spell</em></a><em> that was highlighted by </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/BlockSecTeam"><em>@blocksecteam</em></a><em>, and we initiated our own analysis. Using </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/Phalcon_xyz"><em>@Phalcon_xyz</em></a><em>, we spotted an unusual pattern in the transaction flow. The attacker kept borrowing and repaying just 1 token, yet the part value kept growing exponentially.</em></p><p><em>Digging into the CauldronV4 contract&apos;s borrow function, we found that part represents a user&apos;s share of the borrowed amount in the total debt. Strangely, the attacker managed to repay everyone&apos;s debt, setting totalBorrow.elastic to zero. But due to what seems like rounding errors, totalBorrow.base didn&apos;t drop to zero but stayed at 6</em></p><p><em>This discrepancy between elastic and base wasn&apos;t accounted for by the RebaseLibrary. By borrowing and repaying a single token repeatedly, part ballooned to a massive number. Consequently, the final debt calculation became incorrect, with the borrowed part being minuscule relative to the total debt parts. This allowed the attacker to drain all liquidity from the pool.”</em></p><p>In the latest <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/MIM_Spell/status/1752368458715607261">security update</a> from MIM, the initial findings suggest, no user collateral was at risk, the issue was fully mitigated and the funds are being tracked by <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/chainalysis">Chainalysis</a>. Preliminary findings indicate the exploit targeted specific Cauldrons V3 &amp; V4, allowing unauthorized MIM borrowing. We’ve mitigated the issue by setting borrowing limits to zero for these cauldrons.</p><p>MIM have reached out to the attacker via an <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://etherscan.io/tx/0xa1f8e3c30917f33956ef0a96417987a07a70509a2e48b6426b65906462faad6b">on-chain message</a>, offering a chance to return the funds and qualify for a bug bounty:</p><p>“Hello, we are addressing the recent security issue you identified in our system. We re inclined to believe your actions were motivated by white hat intentions, and we re keen to engage in a dialogue about the situation. For mutual assurance, we kindly ask that you provide an on-chain signature along with your initial response. This will confirm we re communicating with the correct party. Please contact us at <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="mailto:reward@abracadabra.money">reward@abracadabra.money</a> to discuss the matter further.”</p><p>AbracadabraDAO treasury address can be found here:</p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://app.safe.global/home?safe=eth:0xDF2C270f610Dc35d8fFDA5B453E74db5471E126B">https://app.safe.global/home?safe=eth:0xDF2C270f610Dc35d8fFDA5B453E74db5471E126B</a></p><p>A detailed post mortem will be shared in the coming days, providing insights into the incident and future preventative measures.</p>]]></content:encoded>
            <author>behind-the-code@newsletter.paragraph.com (Behind the Code)</author>
        </item>
    </channel>
</rss>