Smart Contract Exploits
Reentrancy, oracle manipulation, signature replay, proxy flaws, precision loss, governance attacks, and economic exploit chains.
Cyber Security Firm
Elite vulnerability research for Web3 protocols, AI platforms, and high-value internet infrastructure.
We specialize in finding critical bugs before attackers do — smart contract exploits, access-control failures, economic attacks, platform vulnerabilities, and logic flaws that automated scanners miss.
Security research across programs and platforms involving Netflix, xAI, Chia Network, and other verified organizations.
References indicate security research experience across public or authorized programs and do not imply endorsement, partnership, or affiliation.
Capabilities
Kistsune focuses on vulnerabilities that matter: exploitable paths, economic impact, broken trust assumptions, and proof strong enough to survive adversarial review.
Reentrancy, oracle manipulation, signature replay, proxy flaws, precision loss, governance attacks, and economic exploit chains.
Flash loan modeling, MEV vectors, liquidity attacks, collateral manipulation, invariant failures, and protocol-level risk.
Access-control bypasses, exposed internal endpoints, auth drift, IDORs, state-changing unauthenticated actions, and business logic flaws.
Prompt injection surfaces, model-integrated workflows, data exposure, tool-abuse paths, and agentic system risk.
Scope analysis, target prioritization, exploit validation, evidence packaging, and submission-ready reporting.
Every finding is validated with reproducible evidence, impact analysis, clean proof-of-concept material, and remediation guidance.
Research Philosophy
Most security work fails because it stops at suspicion. Kistsune pushes findings through proof, impact, reproducibility, and adversarial review before anything is treated as real.
Every candidate must have a concrete exploit path, not just theoretical weakness.
Findings are framed around business, protocol, financial, or platform risk.
Reports are built to help teams reproduce, validate, and remediate quickly.
Founder & CEO
Founder & CEO, Kistsune Cyber Security
Jimmy Dinh leads Kistsune Cyber Security with a focus on high-impact vulnerability research, responsible disclosure, and revenue-driven security operations. Kistsune’s work is built around one standard: findings must be real, reproducible, and worth submitting.
Process
We map programs, assets, contracts, endpoints, permissions, and exposed trust boundaries.
We identify unusual state transitions, logic flaws, economic paths, and security assumptions worth testing.
We reduce noise by building evidence, reproductions, traces, and proof-of-concept material.
We translate technical behavior into concrete platform, protocol, financial, or user risk.
We package findings clearly for triage, remediation, and responsible disclosure.
Research
Kistsune treats every finding like it will be challenged. The work is refined until the evidence, exploitability, and impact can stand on their own.
Contact
For serious reviews, high-value targets, Web3 protocols, AI platforms, or responsible disclosure support, request a private security review.