How do smart-contract auditors stay on top of real-time exploit news? I feel like I’m always late.
I’m a junior smart-contract auditor trying to build a more reliable “security radar,” but honestly, I feel like I’m always late to the news. Some days I learn about an exploit hours after it happened, and in this industry that feels like being outdated already.
The problem is the information overload: Twitter/X threads, security blogs, private Discords, researchers posting PoCs… it’s chaotic. I’m struggling to understand what experienced auditors actually rely on to track real-time vulnerabilities without drowning in noise.
I’m not looking for generic lists — I want to understand how pros keep their signal clean.
Which sources consistently surface incidents first?
Who are the researchers worth following?
Do people rely on newsletters, automated alerts, or dev-tool dashboards?
And how do you filter between hype, speculation, and real incident response data?
If you're working in audits, bug bounties, or protocol engineering, I’d love to know what your actual workflow looks like when a new exploit happens. I want to fix this gap before it starts affecting my interviews and daily work.