Skip to content
View LouisTsai-Csie's full-sized avatar

Block or report LouisTsai-Csie

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
LouisTsai-Csie/README.md

Welcome, My name is Louis Tsai

Welcome to my github page! ✨✨ Please help save my github contributions, the snake is eating all of them!


github contribution grid snake animation

Who am I?

I’m Louis Tsai, living on Ethereum Mainnet and contributing to its decentralized future.

Graduated from NTU as a CS student, I focus on Web3 Security and Ethereum Research.

As a white hat at DeFiHackLabs, I analyze attack incidents, join CTF challenges,
  and participate in audit competitions at Cantina & Codehawks.

I also enjoy creating fun projects and exploring new ideas, now is a vibe coder.

eth / acc

Experience

💻 Software Development

Backend Intern @ Junyi Academy
Software Trainee @ AppWorks
🛡️ Web3 Security

Web3 Security Intern @ Amber Group
Auditing Fellowship @ yAcademy
⛓️ Ethereum Research

EEST Intern @ Ethereum Foundation
Blockchain Dev Trainee @ AppWorks

Projects

👾 Mothra

TLDR: A Ghidra extension for EVM decompilation and transaction tracing.

Role: Developer
👾 Awesome Smart Contract Analysis Tools

TLDR: Curated list of smart‑contract analysis & auditing tooling.

Role: Maintainer
👾 FintechIntro

TLDR: Materials for NTU “Introduction to Decentralized Finance”.

Role: Maintainer · Teaching
👾 DeFiHackLabs

TLDR: Reproducing DeFi incidents with Foundry. See analyses: past‑attack‑incident.

Role: Contributor

Public Talks

👾 Reverse Engineering EVM Bytecode with Ghidra
Mothra is an extension that brings disassembly, control-flow graphing, and decompilation of EVM bytecode into Ghidra, enabling practical reverse engineering of Ethereum smart contracts.

Event: Devcon 7 · English
👾 Mothra: A Ghidra EVM Extension
Mothra is a Ghidra extension that enables EVM decompilation and interactive analysis, bridging Web2 reverse engineers into Web3 security through use cases such as unverified contract forensics and CTF challenges.

Event: Black Hat Europe 2024 · English
👾 Exploring Contract Analysis Tools by Unveiling Real-World Upgradeable Proxy Vulnerabilities
This presentation introduces common smart contract security detection tools, using upgradeable proxies as a case study to show how these tools help identify well-known vulnerabilities and mitigate risks before they lead to real-world exploits.

Event: COSCUP 2024 · Chinese
👾 Mastering Web3 Security: From Tracking Attacks to Reproducing Exploits
This talk explores Web3 security from attack trace analysis to exploit reproduction, introducing methods to track the latest incidents, study common vulnerabilities, and use Foundry to recreate attacks, with a live demo on contributing to DeFiHackLabs PoCs

Event: Ethereum Taipei Meetup · Chinese
👾 Reentrancy Vulnerabilities and DEX Security Analysis
This is a study group session on blockchain security that focuses on security concerns related to Reentrancy issue and Decentralized Exchanges (DEXs), including price manipulation, swap path issues, and non-standard tokens.

Event: DeFiHackLabs Study Group · Chinese
👾 Security Challenges in Ethereum Layer 2 and Cross-Chain Ecosystems
As Ethereum scales through rollups and bridges, this talk uncovers their emerging security pitfalls and discusses how researchers and developers can mitigate these risks

Event: CyberSec 2025 · Chinese
👾 Ethereum Object Format (EOF): Necessary Evil or Needless Complexity?
This talk gives a technical and neutral overview of the Ethereum Object Format (EOF) — explaining what it solves, what it breaks, why it was removed from Fusaka, and whether it could return in the future.

Event: COSCUP 2025 · English
👾 A Deep Dive into EOF and Its Impact on Program Analysis
This talk explores how the Ethereum Object Format (EOF) reshapes program analysis and reverse engineering, highlighting differences from legacy EVM, new control-flow mechanisms, and integration into the Mothra decompiler.

Event: ETH Taipei 2025 · English

Status

A Solidity developer, auditor, enthusiast now

GitHub stats Top languages

Skills

Smart Contracts

     

Solidity · Vyper · Foundry

Backend

     

Node · Express · FastAPI

Frontend

     

HTML / CSS / JS · React · Next

Databases

     

MongoDB · MySQL · Supabase

DevOps / Cloud

     

Docker · Git Actions · GCP

Version Control

     

Git · GitHub · GitLab

Publication

  • Secure Medical Data Management Based on Homomorphic Encryption and Secret Sharing
  • Unveiling Vulnerabilities in DAO: A Comprehensive Security Analysis and Protective Framework
  • Pinned Loading

    1. SheetHandler SheetHandler Public

      Tool designed for National Taiwan University Social Work Department, in order to process data for Global Welfare Program.

      Python

    2. LendMixer LendMixer Public

      A minimal flash loan service for user

      Solidity 2

    3. awesome-smart-contract-analysis-tools awesome-smart-contract-analysis-tools Public

      A curated list of awesome smart contract analysis tools

      124 17

    4. audit-profile audit-profile Public