How Glider Contributors Write & Debug Security Queries | Interview w/ ChaseTheLight
In this interview, we talk with a security researcher and Glider contributor about how they approach security research at scale, from getting started to debugging false positives and iterating on detection logic. We discuss their background in security research, what pulled them into large-scale analysis tools like Glider, and how their workflow evolved over time. This conversation covers: • Getting started in security research • How researchers analyze large codebases efficiently • Turning ideas into scalable bug-finding logic • Debugging when results don’t match expectations • Using AI to speed up security research • Practical tools and workflows used in real research • Where these techniques apply beyond contests If you’re interested in Web3 security, bug bounties, or scaling security research beyond manual reviews, this episode breaks down how researchers actually work in practice. ⭐ GLIDER CONTEST: https://r.xyz/glider-query-database Glider IDE: https://glide.r.xyz/ Remedy platform: https://r.xyz/ 📌 Remedy - web3 Security Researcher Community Join our Discord for live researcher interviews, challenges, and discussions. → https://discord.com/invite/HW7c6dFC5B
Download
0 formatsNo download links available.