https://sherlock-files.ams3.digitaloceanspaces.com/profile_images/b8c25b50-d16e-44c1-9e36-1896ada33ea1.png

0xAsen

Security Researcher

EVM Smart Contracts Security Researcher @code4rena/@CodeHawks/@sherlockdefi Contact me for an audit/security consulting

Contact Me

High

34

Total

Medium

27

Total

$9.36K

Total Earnings

#565 All Time

25x

Payouts

bronze

1x

3rd Places

regular

7x

Top 10

regular

12x

Top 25

All

Sherlock

Code4rena

Cantina

CodeHawks

Immunefi

Mar '25

Audit Comp | Yeet

Audit Comp | Yeet

484 USDC • 1 total finding • Immunefi • yesofcourse

#7

medium

Finding not yet public.

Feb '25

THORWallet

THORWallet

0.35 USDC • 2 total findings • Code4rena • 0xAsen

#8

high

MergeTgt has no handling if TGT_TO_EXCHANGE is exceeded during the exchange period

medium

Improper Transfer Restrictions on Non-Bridged Tokens Due to Boolean Bridged Token Tracking, Allowing a DoS Attack Vector

Rova

Rova

0.04 USDC • 1 total finding • Sherlock • 0xAsen

bronze

medium

Mixing currency and token units in updateParticipation causes wrong accounting and potential loss of funds

Jan '25

Liquid Ron

Liquid Ron

0 USDC • 1 total finding • Code4rena • 0xAsen

#12

medium

Incorrect Logic in onlyOperator Modifier Leading to Denial-of-Service for Authorized Operators Across Critical Functions

IQ AI

IQ AI

1,190.49 USDC • 1 total finding • Code4rena • 0xAsen

#4

medium

Attacker can DOS liquidity migration in LiquidityManager.sol

Oct '24

mev-commit

mev-commit

13.67 USDC • 1 total finding • Cantina • 0xasen

#39

high

Finding not yet public.

Aug '24

Chakra

Chakra

3,568.68 USDT • 8 total findings • Code4rena • 0xAsen

#4

high

Malicious actors can manipulate the `cross_chain_callback` callback

high

In settlement.cairo::receive_cross_chain_msg - the payload_type can be passed by the user, confusing offchain systems

high

settlement.cairo doesn't process callback correctly leading to CrossChainMsgStatus marked as SUCCESS even if it failed on destination chain

high

In settlement.cairo::receive_cross_chain_msg - the message will always be marked with Status::SUCCESS

high

In Starknet already processed messages can be re-submitted and by anyone

high

handler's `receive_cross_chain_callback()` will always set the tx_status to `SETTLED` on source chain & burn the tokens (MintBurn Mode) even when the msg fails on destination

medium

A cross-chain message can be initiated with invalid parameters

medium

Does not check if to_chain and to_handler is whitelisted in cross_chain_erc20_settlement

Jul '24

ArkProject: NFT Bridge

ArkProject: NFT Bridge

836.04 USDC • 5 total findings • CodeHawks • 0xasen

#12

high

`Tokens` Are Automatically Whitelisted Upon Creation And Binding Even When `_whiteListEnabled == false`

high

The Bridging Process will revert if the Collection is matched on the destination chain and not matched on the source chain

high

Infinite loop breaks whitelist removal funtionality on L2

medium

Starknet tokens deposited with use_withdraw_auto can never be withdrawn

medium

Reentrancy attack to make an NFT unbridgeable

MakerDAO Endgame

MakerDAO Endgame

496.94 USDC • Sherlock • 0xAsen

#73

MagicSea - the native DEX on the IotaEVM

MagicSea - the native DEX on the IotaEVM

99.03 USDC • 4 total findings • Sherlock • 0xAsen

#27

high

Users can't vote because of a wrong check in BribeRewarder::_modify()

high

BribeRewarder.sol allows reward manipulation by malicious users

medium

Wrong check in _requireOnlyOperatorOrOwnerOf in MlumStaking.sol leading to anyone being able to add to someone else's position

medium

Voter.sol::onRegister()

Apr '24

DYAD

DYAD

0.02 USDC • 1 total finding • Code4rena • 0xAsen

#114

high

Attacker can make 0 value deposit() calls to deny user from redeeming or withdrawing collateral

Feb '24

AI Arena

AI Arena

22.56 USDC • 4 total findings • Code4rena • 0xAsen

#107

high

A locked fighter can be transferred; leads to game server unable to commit transactions, and unstoppable fighters

high

Since you can reroll with a different fighterType than the NFT you own, you can reroll bypassing maxRerollsAllowed and reroll attributes based on a different fighterType

high

Players have complete freedom to customize the fighter NFT when calling `redeemMintPass` and can redeem fighters of types Dendroid and with rare attributes

high

Non-transferable `GameItems` can be transferred with `GameItems::safeBatchTransferFrom(...)`

Jan '24

Salty.IO

Salty.IO

1,040.83 USDC • 4 total findings • Code4rena • 0xAsen

#13

high

User can evade `liquidation` by depositing the minimum of tokens and gain time to not be liquidated

medium

StakingRewards pools are not given their promised share of rewards due to incorrect calculation

medium

Adversary can prevent updating price feed addresses by creating poisonous proposals ending in `_confirm`

medium

Unwhitelisting does not clear _arbitrageProfits, so re-whitelisting may result in an unfair distribution of liquidity rewards.

Telcoin Platform Audit

Telcoin Platform Audit

2.64 USDC • 1 total finding • Sherlock • 0xAsen

#9

high

In CouncilMember.sol

Dec '23

The Standard

The Standard

19.96 USDC • 5 total findings • CodeHawks • 0xasen

#54

high

Rewards can be drained because of lack of access control

high

Looping over unbounded `pendingStakes` array can lead to permanent DoS and frozen funds

medium

Missing deadline check allow pending transactions to be maliciously executed

medium

Fees are hardcoded to 3000 in ExactInputSingleParams

low

doesn't follow the EIP standard

Revolution Protocol

Revolution Protocol

68.11 USDC • 1 total finding • Code4rena • 0xAsen

#49

medium

It may be possible to DoS AuctionHouse by specifying malicious creators

Oct '23

NextGen

NextGen

2.77 USDC • 2 total findings • Code4rena • 0xAsen

#102

high

Attacker can drain all ETH from AuctionDemo when block.timestamp == auctionEndTime

high

Adversary can block `claimAuction()` due to push-strategy to transfer assets to multiple bidders

Steadefi

Steadefi

85.50 USDC • 3 total findings • CodeHawks • 0xasen

#32

high

`GMXVault` can be blocked by a malicious actor

medium

Wrong hardcoded PnL factor is used in all GMXVault add liquidity operations

medium

Incorrect state transition may cause vault in stuck

The Wildcat Protocol

The Wildcat Protocol

3.34 USDC • 1 total finding • Code4rena • 0xAsen

#73

high

Borrower can drain all funds of a sanctioned lender

Sep '23

Ondo Finance

Ondo Finance

1,021.54 USDC • 1 total finding • Code4rena • 0xAsen

#9

medium

Admin can't burn tokens from blocklisted addresses because of a check in _beforeTokenTransfer

Aug '23

Tangible Caviar

Tangible Caviar

0.03 USDC • Code4rena • 0xAsen

#87

Jul '23

Beedle - Oracle free perpetual lending

Beedle - Oracle free perpetual lending

92.16 USDC • 11 total findings • CodeHawks • 0xasen

#47

high

Sandwich attack to steal all ERC-20 tokens in the Fees contract

high

[H-04] Lender#buyLoan - Malicious user could take over a loan for free without having a pool because of wrong access control

high

Stealing any loan opening for auction through others' lending pool

high

Attacker can steal a loan's collateral and break the protocol

high

Hardcoded Router Address May Cause Token Lockup in Non-Standard Networks

high

Lender can Sandwich a borrower to seize his collateral

medium

The `borrow` and `refinance` functions can be front-run by the pool lender to set high interest rates

medium

No expiration deadline leads to losing a lot of funds

medium

Single-step process for critical ownership transfer is risky

medium

Fixed fee level is used when swap tokens on Uniswap

medium

Pragma non-specification can lead to non-functional / corrupted contract when deployed on Arbitrum

May '23

Footium

Footium

298.89 USDC • 3 total findings • Sherlock • 0xAsen

#11

high

Club buyers on secondary marketplace could get scammed

medium

Unsafe ERC20.transfer() - unchecked return values

medium

Use safeMint instead of mint for ERC721

Mar '23

Gitcoin

Gitcoin

5.53 USDC • Sherlock • 0xAsen

#69

Feb '23

Surge

Surge

3.65 USDC • 1 total finding • Sherlock • 0xAsen

#22

high

_loanTokenBalance can be easily manipulated leading to wrong calculations and loss of funds