riptide & tpiliposian discuss how auditors and bounty hunters differ, hexens audit model, what the certora prover actually does, what devs should do prior to deploying, RED FLAGS to look for when looking at a project to bounty hunt on, why everyone misses bugs, getting your money's worth as a protocol dev with audits and contests, and much, much, more ...