Loading video player...
// summary in 2021, one bit flip in a transaction proof would have drained $850,000,000 from polygon's plasma bridge. no private keys stolen. no servers hacked. just one byte that two checks read two different ways. // the series this is episode 2 — a walkthrough of famous crypto exploits from first principles. each video breaks down one bug down to the byte level and reproduces it live on a forked mainnet. // what's next drop the next exploit you want me to break down in the comments — bZx, euler, wormhole, ronin, nomad, parity multisig, take your pick. // subscribe more web3 security from first principles → hit subscribe. // tags #ethereum #polygon #smartcontracts #solidity #web3 #cryptohack #blockchainsecurity #bugbounty #plasma #merkletree // ai disclosure i used AI heavily to ship this video. here's how: - terminal animation — writing the python scripts that render every scene - voice — elevenlabs TTS, "george" voice. i wrote the cliffhangers and key lines, refined the rest for cadence. - thumbnails — wrote the PIL/pillow scripts that composite the thumbnails - research — helped me map the bug from the immunefi disclosure and the predicate contract source. tools used: - claude code - elevenlabs - VHS by charm - pyfiglet - ffmpeg - pillow / PIL - foundry / forge / anvil the bug, the math, and the architectural critique are mine. AI helped me ship faster.