Security Researcher
High
Total
Medium
Total Earnings
#875 All Time
Payouts
Top 10
Top 25
Top 50
All
Sherlock
Mar '26
0.25 USDC • 3 total findings • Sherlock • 8olidity
#27
high
Liquidation seize calculation uses spot price without EMA consistency check
medium
Debt ADL Uses Group-Scoped Config but Global Debt Trigger
Deposit limit check double subtracts protocol reserves, allowing cap bypass
Oct '25
114.68 USDC • 3 total findings • Sherlock • 8olidity
#6
Zero-Cost Settlement via Payment Rounding
Fee Custody Hijack by Authorized Matchers
Emergency Resolution Skips Past Epochs
Sep '25
232.31 OP • 3 total findings • Sherlock • 8olidity
#16
Stake/Unstake Reward Wipe
Cross-Pool Reward Siphoning
Zero-Stake Infinite Emissions
381.18 USDC • 1 total finding • Sherlock • 8olidity
#5
Vesting Factory Owner Can Recall Tokens While Escrow Owns Wallet
27.60 USDC • 4 total findings • Sherlock • 8olidity
#63
Unrestricted Maker Gifting Bricks Victim Accounts
NFT Metadata Reader Hits Diamond Storage Mismatch
Decompose Underflow Bricks Small Positions
Vault Balance Transfer Hard-Reverts
Aug '25
37.97 USDC • 1 total finding • Sherlock • 8olidity
#56
wStable Contract is Vulnerable to ERC4626 Inflation Attack
Jul '25
41.41 USDC • 2 total findings • Sherlock • 8olidity
#39
Flawed logic in `Rebalancer.sendMsg` for the `maxTransferSize` check can cause a Denial of Service, blocking the rebalancing mechanism after a time window resets.
Blacklisted users can withdraw funds from mTokenGateway by using a non-blacklisted delegated account.
7.06 USDC • 2 total findings • Sherlock • 8olidity
#38
Signature Re-use Bypasses Multi-signature Threshold in Consensus Module
Incorrect Index Usage in `DepositQueue.cancelDepositRequest` Leads to Accounting Corruption and Permanent Denial-of-Service
May '23
0.01 USDC • 1 total finding • Sherlock • 8olidity
#32
Use safeTransfer/safeTransferFrom consistently instead of transfer/transferFrom
Apr '23
196.24 USDC • 3 total findings • Sherlock • 8olidity
#26
`setCollateralEscrowBeacon()` can be called by anyone
`commitCollateral()` can be called by anyone
fee-on-transfer tokens are not supported
Mar '23
80.82 USDC • Sherlock • 8olidity
30.89 USDC • 1 total finding • Sherlock • 8olidity
#12
Logic Error in _decreaseCurrentMinted
Feb '23
798.15 USDC • Sherlock • 8olidity
Findings not publicly available for private contests.
557.46 USDC • 3 total findings • Sherlock • 8olidity
#18
The attacker can bypass the original logic of `reduceposition()`
No check sequencer is down in Chainlink feeds
`latestRoundData()` has no check for round completeness
236.36 USDC • 2 total findings • Sherlock • 8olidity
DepositManagerV1::refundDeposit() does not judge bounty status
claimManager will cause BountyCore::refundDeposit() to fail
Jan '23
0.30 USDC • 1 total finding • Sherlock • 8olidity
#30
use safetransfer and safetransferFrom
Nov '22
135.21 USDC • 1 total finding • Sherlock • 8olidity
#21
Price oracle could get a stale price
62.49 USDC • 1 total finding • Sherlock • 8olidity
`address.call{value:x}()` should be used instead of `payable.transfer()`
1,604.26 USDC • 2 total findings • Sherlock • 8olidity
Solmate safetransfer and safetransferfrom doesnot check the codesize of the token address, which may lead to fund loss
The value of `createFeeDiscount` can never be updated
99.23 USDC • 1 total finding • Sherlock • 8olidity
#7
rollerPeriphery::approve() has no permission control and can steal contract tokens
Oct '22
65.78 USDC • 1 total finding • Sherlock • 8olidity
As long as the set `Feeto` address, will make `VaultImplementation.sol::commitToLien()` to stop working
176.00 USDC • 1 total finding • Sherlock • 8olidity
#9
Nonces not used in signed data
317.74 USDC • 1 total finding • Sherlock • 8olidity
use safecast
209.05 USDC • 2 total findings • Sherlock • 8olidity
Steal their money
ConvertToShares () uses the LINK of the contract to calculate and may result in a loss of user assets