<?xml version="1.0" encoding="UTF-8"?><oembed><type>video</type><version>1.0</version><html>&lt;iframe src=&quot;https://www.loom.com/embed/dfd57ecab76b4df99c9fe1516da5ac87&quot; frameborder=&quot;0&quot; width=&quot;1728&quot; height=&quot;1296&quot; webkitallowfullscreen mozallowfullscreen allowfullscreen&gt;&lt;/iframe&gt;</html><height>1296</height><width>1728</width><provider_name>Loom</provider_name><provider_url>https://www.loom.com</provider_url><thumbnail_height>1296</thumbnail_height><thumbnail_width>1728</thumbnail_width><thumbnail_url>https://cdn.loom.com/sessions/thumbnails/dfd57ecab76b4df99c9fe1516da5ac87-1709378094152.gif</thumbnail_url><duration>206.17</duration><title>HoneyPause: Permissionless On-Chain Exploit Bounties With Circuit Breakers</title><description>In this video, I explain the concept of Honeypods, a project that offers permissionless on-chain exploit bounties tied to a circuit breaker. I discuss how projects with smart contract protocols can register bounties and provide a verifier, poser, and pair contract. I also demonstrate the process of a white hat finding and submitting an exploit contract, as well as the steps taken by Honeypods to confirm and undo the exploit. Action requested: Watch the video to understand the inner workings of Honeypods and the potential for white hat hackers to earn bounties.</description></oembed>