<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>Jack Oneschuk</title>
        <link>https://paragraph.com/@joneschuk</link>
        <description>jackoneschuk.com</description>
        <lastBuildDate>Wed, 08 Apr 2026 04:45:10 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <image>
            <title>Jack Oneschuk</title>
            <url>https://storage.googleapis.com/papyrus_images/123dd178e6e09823264e3e376a598d169579eb9fc7efd5fc38e9057753875ff3.png</url>
            <link>https://paragraph.com/@joneschuk</link>
        </image>
        <copyright>All rights reserved</copyright>
        <item>
            <title><![CDATA[Leveraging an Army of Interns]]></title>
            <link>https://paragraph.com/@joneschuk/leveraging-an-army-of-interns</link>
            <guid>lqYebfblv8SVfBecrXEG</guid>
            <pubDate>Fri, 16 Dec 2022 21:17:12 GMT</pubDate>
            <description><![CDATA[ChatGPT, OpenAI’s latest public Large Language Model (LLM) has been described as "like having an army of interns” since the quality of output is unpredictable but the breadth of the training data (billions of internet pages and 100k+ books) means using it is akin to delegating a task to a group of inexperienced people who you know will read everything they can find about a topic but might still miss the mark on understanding what you actually want. Also you get an answer instantly. In my test...]]></description>
            <content:encoded><![CDATA[<p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://chat.openai.com/chat">ChatGPT</a>, OpenAI’s latest public Large Language Model (LLM) has been described as &quot;like having an army of interns” since the quality of output is unpredictable but the breadth of the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.springboard.com/blog/data-science/machine-learning-gpt-3-open-ai/">training data</a> (billions of internet pages and 100k+ books) means using it is akin to delegating a task to a group of inexperienced people who you know will read everything they can find about a topic but might still miss the mark on understanding what you actually want. Also you get an answer instantly.</p><p>In my testing I found the current iterations of ChatGPT and GPT-3 (which are largely <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://dev.to/ben/the-difference-between-chatgpt-and-gpt-3-19dh">similar</a>) to have high failure rates comparing and summarizing content in detail. That isn’t to say there aren’t occasional spectacular successes, just that it’s unreliable without careful coaching (aka prompt engineering). I did find it quite capable of accurately producing short form summaries though and decided to improve search-ability and usability of <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://jackoneschuk.notion.site/Reading-List-142a66c16255422d8d4496b2ca0df90b">my public reading list</a> by using GPT-3 to read all the articles I added last month to:</p><ol><li><p>Summarize</p></li><li><p>Generate relevant keywords</p></li><li><p>Grade the piece as if it were a college professor who was a subject matter expert</p></li><li><p>Write the most upvoted response on Reddit</p></li></ol><p>Of note the ECB’s <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.ecb.europa.eu/press/blog/date/2022/html/ecb.blog221130~5301eecd19.en.html">piece</a> on Bitcoin received the lowest grade with a 60%, the feedback given was: “Does a good job of exploring the complexities surrounding the Bitcoin market, though it could have benefited from more concrete examples of the risks posed by crypto assets”.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/1794f0a4ed73ddec5f5bacb6680f1174c2a395ffd1ad31a156e5c0f464df5f00.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>On the other hand my intern army gave two perfect 100% grades: <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://research.paradigm.xyz/uniswaps-alchemy">Uniswap&apos;s Financial Alchemy</a> and <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://unchained.com/blog/bitcoin-cant-be-copied/">Bitcoin Can’t Be Copied</a>. I concur, both are must reads.</p><p>My takeaway overall from this experiment is that becoming familiar with the strengths and weaknesses of OpenAI’s GPT models is likely to be an asset. If you are comfortable running a relatively untested Chrome extension I’d suggest setting up <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/wong2/chat-gpt-google-extension">this</a> which displays ChatGPT’s answer beside all your Google queries to start learning today without altering your existing workflow.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/c162a333c0ed614b988f002b6f920a774d065e0ca71c253a6899c36365e517a3.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p><em>Follow me on Twitter </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/JackOneschuk"><em>@jackoneschuk</em></a><em> or Farcaster @joneschuk if you enjoyed this post</em></p>]]></content:encoded>
            <author>joneschuk@newsletter.paragraph.com (Jack Oneschuk)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/e7d0b46c2203ca10c9b1a1bd1a09b3611ea5121efa7a26c40a7085e92cce86cc.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Beyond the Headline: $163 Million in Profanity Related Losses]]></title>
            <link>https://paragraph.com/@joneschuk/beyond-the-headline-163-million-in-profanity-related-losses</link>
            <guid>FoskyWCEQaozV65l8xVN</guid>
            <pubDate>Thu, 22 Sep 2022 17:25:34 GMT</pubDate>
            <description><![CDATA[As disclosed by 1inch on September 14th, a vulnerability in Profanity an Ethereum vanity address generator was discovered. A day later $3.3 million was stolen from about a dozen vanity addresses including 0xBA5Ed… owned by the Index Finance Exploiter and 0x00000000000… which saves gas costs on certain contract interactions due to its leading 0s. Two days ago a Wintermute wallet which similarly used leading 0s to save on gas costs initiated $160 million in unauthorized transfers and CEO Evgeny...]]></description>
            <content:encoded><![CDATA[<p>As disclosed by <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://blog.1inch.io/a-vulnerability-disclosed-in-profanity-an-ethereum-vanity-address-tool-68ed7455fc8c">1inch</a> on September 14th, a vulnerability in Profanity an Ethereum vanity address generator was discovered. A day later $3.3 million was stolen from about a dozen vanity addresses including <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://etherscan.io/tx/0xdf5d8d087813b2c0efed72cf3cee5b2d9beb16fca87ecfa7a78740260950fee8">0xBA5Ed</a>… owned by the Index Finance Exploiter and <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://etherscan.io/tx/0xecc404208cf5a9b817b772ca0d51c4bfa02eae2b31a63083b1f0ed85642a6205">0x00000000000</a>… which <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://medium.com/coinmonks/on-efficient-ethereum-addresses-3fef0596e263">saves gas costs</a> on certain contract interactions due to its leading 0s. Two days ago a Wintermute wallet which similarly used leading 0s to save on gas costs initiated $160 million in unauthorized transfers and CEO Evgeny Gaevoy <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/EvgenyGaevoy/status/1572329150932987904?s=20&amp;t=qlBVjE8CdqzocYlTuq4xXw">confirmed</a> the loss was likely linked to a Profanity-type exploit.</p><p><em>I have written answers below to my initial questions after reading </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://decrypt.co/110131/algorithmic-market-maker-wintermute-hacked-for-160m"><em>this</em></a><em> Decrypt article.</em></p><p><strong>What assets were stolen?</strong></p><p>Initial incident: &gt;80% stablecoins, ETH, AAVE, COMP.</p><p>Wintermute incident: &gt;80% stablecoins, ETH, wBTC. Full list at end this <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.certik.com/resources/blog/uGiY0j3hwOzQOMcDPGoz9-wintermute-hack">report</a>.</p><p><strong>Will the loss of $160 million impact Wintermute’s operations?</strong></p><p>Per Evgeny, Wintermute still has at least $320 million in equity.</p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/EvgenyGaevoy/status/1572134277428703234?s=20&amp;t=0mijxdBSXc5paGyY9e2zmg">https://twitter.com/EvgenyGaevoy/status/1572134277428703234?s=20&amp;t=0mijxdBSXc5paGyY9e2zmg</a></p><p>At the time of exploit Wintermute had $200M in debt outstanding with on-chain lenders leading <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/maplefinance/status/1572367746041511937?s=20&amp;t=8Yh6x51WxoYi16_qggb6rQ">Maple Finance</a> and <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/TrueFiDAO/status/1572687453625925632?s=20&amp;t=8Yh6x51WxoYi16_qggb6rQ">TrueFi</a> to release statements further confirming Wintermute is still in a strong financial position.</p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/Blockanalia/status/1572216230890864642?s=20&amp;t=ZDfELG3iMJSSRG3suhRxuA">https://twitter.com/Blockanalia/status/1572216230890864642?s=20&amp;t=ZDfELG3iMJSSRG3suhRxuA</a></p><p><strong>Why didn’t Wintermute react to the 1inch disclosure on September 14th?</strong></p><p>Mudit Gupta noted in his <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://mudit.blog/wintermute-muted-in-crypto-winter/">summary</a> of the attack that Wintermute did in fact react shortly after the POC was released by 1inch removing all assets from the vulnerable address. However, that address was also designated an admin of the Wintermute vault smart contract (which contained the $160 million) and Evgeny noted that <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/EvgenyGaevoy/status/1572329161250975744?s=20&amp;t=hdYrs4y5_Fci4GqLgIHWuQ">human error</a> led to this access not being appropriately revoked.</p><p><strong>How much computing power did this attack require?</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/0xtuba/status/1572153573605281792?s=20&amp;t=YxDj2xwVLHELZprl-7wjcQ">https://twitter.com/0xtuba/status/1572153573605281792?s=20&amp;t=YxDj2xwVLHELZprl-7wjcQ</a></p><p>Although a <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/johguse/profanity/issues/61#issuecomment-1017935267">comment</a> on Profanity’s Github from January of this year hypothesized an attack would require significant computing power the 1inch blog notes instead that their proof of concept allowed them to:</p><p><code>recover private keys from any vanity address generated with Profanity at almost the same time that was required to generate that vanity address</code></p><p>According to a Reddit <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.reddit.com/r/EtherMining/comments/7bhkda/i_made_a_thing_an_address_to_impress/">post</a> from the creator of Profanity in 2017 on a single GPU it takes less than 10 minutes on average to generate a specific 8 character address. The Wintermute address had only 7 leading 0s so per the 1inch blog should have been trivial to crack once the exploiter built the required tools. Further technical discussion about how this was done including comments from the founder of 1inch can be found <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://t.me/lobsters_chat/380140">here</a>.</p><p><strong>How much did Wintermute save by using a leading 0 address?</strong></p><p>The <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://etherscan.io/address/0x0000000fe6a514a32abdcdfcc076c85243de899b#analytics">specific vulnerable address</a> only spent $27k in gas since inception and since leading 0s only reduce gas spend <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://medium.com/coinmonks/on-efficient-ethereum-addresses-3fef0596e263">up to 5% in most cases</a> the savings were minimal and likely less than $1k. However the Wintermute <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://etherscan.io/address/0x00000000ae347930bd1e7b0f35588b92280f9e75#analytics">vault smart contract</a> has used $3.3 million in total gas across 120k+ transactions over 3.5 months of active use. Extrapolated over a year that puts the upper bound of annual gas savings at about $500k. A Twitter user noted this disparity in $ saved vs. $ lost prompting a lighthearted reply from Evgeny.</p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/EvgenyGaevoy/status/1572606599314960385?s=20&amp;t=StRy6I3OtiXccLN8CkB23A">https://twitter.com/EvgenyGaevoy/status/1572606599314960385?s=20&amp;t=StRy6I3OtiXccLN8CkB23A</a></p><p>Before recalling that Etherscan added gas analytics I used <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.impersonator.xyz">impersonator.xyz</a> to WalletConnect as Wintermute’s address with <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://fees.wtf">fees.wtf</a> to view lifetime gas spend. Including this because I don’t think enough people have impersonator.xyz bookmarked, it’s a great tool.</p><p><strong>Where did the funds stolen from Wintermute go?</strong></p><p>The Wintermute exploiter swapped the stolen BUSD and TUSD to DAI and then <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://etherscan.io/tx/0xd7bf7b67e0d0095b7eb1813a4a60c129b45694374bf996f9ecc249d07efbcd02">deposited</a> all stolen DAI, USDT, and USDC into Curve’s 3pool becoming the 3rd largest 3CRV holder. This prevents the stablecoins from being blacklisted without also blacklisting all other stablecoins in 3pool (currently $860 million). The other assets stolen are still held by the exploiter and can be see <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://debank.com/profile/0xe74b28c2eAe8679e3cCc3a94d5d0dE83CCB84705">here</a> on debank.</p><p>As rekt.news pointed out in <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://rekt.news/wintermute-rekt-2/">their summary</a> of events, it is worrying to see Curve potentially being used as a mixer post Tornado sanctions.</p><p><strong>What happens next?</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/EvgenyGaevoy/status/1572329658636537857?s=20&amp;t=kkvxUdJIlxXdHxtFp71ozg">https://twitter.com/EvgenyGaevoy/status/1572329658636537857?s=20&amp;t=kkvxUdJIlxXdHxtFp71ozg</a></p><p>Wintermute has offered a 10% bounty to the exploiter on Twitter and sent a <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://etherscan.io/tx/0xb616a24add0364c7224f307945345b7e7738feda521d3a908490ac7b177cc9d9">corresponding transaction</a> with the below message indicating a deadline of 5pm PST today.</p><p><code>We want to cooperate with you and resolve this matter immediately. Accept the terms of the bounty and return the funds within 24 hours before September 22nd UST by 23:59 while we can still consider this a white-hat event for a 10% bounty as offered. If the stolen funds are not returned by the deadline, you will force us to remove our bounty offer and white-hat label; we will then proceed accordingly with the appropriate authorities and avenues</code></p><p><em>Follow me on Farcaster @joneschuk if you have enjoyed this post</em></p>]]></content:encoded>
            <author>joneschuk@newsletter.paragraph.com (Jack Oneschuk)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/a8d4e8f9e72829af0ee87fad72507ad34c37344d248c43d9ea91c0e37145e790.png" length="0" type="image/png"/>
        </item>
    </channel>
</rss>