https://sherlock-files.ams3.digitaloceanspaces.com/twitter_images/78237b5d-8f99-456d-ae65-97e2bf9d39e4.jpg

0xHelium

Security Researcher

Hawk at @codehawks | warden @code4arena | protecting web3 | Unavailable ATM

Contact Me

High

3

Total

Medium

4

Total

$664.00

Total Earnings

#1440 All Time

11x

Payouts

regular

1x

Top 25

regular

2x

Top 50

All

Sherlock

Code4rena

Aug '24

Chakra

Chakra

0.1 USDT • 2 total findings • Code4rena • 0xHelium

#64

high

There is no refund mechanism in `ChakraSettlement.processCrossChainCallback` or `ChakraSettlementHandler.receive_cross_chain_callback` function

high

SettlementSignatureVerifier is missing check for duplicate validator signatures

Jul '24

TraitForge

TraitForge

0 USDC • 1 total finding • Code4rena • 0xHelium

#89

high

`mintToken()`, `mintWithBudget()`, and `forge()` in the `TraitForgeNft` Contract Will Fail Due to a Wrong Modifier Used in `EntropyGenerator.initializeAlphaIndices()`

Jan '24

Salty.IO

Salty.IO

104.52 USDC • 1 total finding • Code4rena • 0xHelium

#67

medium

If there is only one USDS borrower, he can never be liquidated

reNFT

reNFT

2.72 USDC • Code4rena • 0xHelium

#67

Dec '23

Revolution Protocol

Revolution Protocol

7.22 USDC • 1 total finding • Code4rena • 0xHelium

#73

medium

CultureIndex.sol#dropTopVotedPiece() - Malicious user can manipulate topVotedPiece to DoS the whole CultureIndex and AuctionHouse

Nov '23

Panoptic

Panoptic

479.29 USDC • Code4rena • 0xHelium

#17

Kelp DAO | rsETH

Kelp DAO | rsETH

2.76 USDC • Code4rena • 0xHelium

#54

Sep '23

Maia DAO - Ulysses

Maia DAO - Ulysses

38.61 USDC • Code4rena • 0xHelium

#51

Allo V2

Allo V2

0.09 USDC • 1 total finding • Sherlock • 0xHelium

#74

medium

Malicious user can manipulate the poolAmount leading to loss of funds for recipients.

Centrifuge

Centrifuge

12.79 USDC • Code4rena • 0xHelium

#34

Aug '23

Dopex

Dopex

15.93 USDC • 1 total finding • Code4rena • 0xHelium

#116

medium

Change of `fundingDuration` causes "time travel" of `PerpetualAtlanticVault.nextFundingPaymentTimestamp()`