Security Researcher
Working as a Blockchain Developer at @blocktheoryhq | A technology enthusiast with a passion for learning Web3 | đź‘Ą Member @developer_dao
High
Total
Medium
Total
Total Earnings
#668 All Time
Payouts
1st Places
2nd Places
3rd Places
All
Sherlock
Code4rena
Cantina
CodeHawks
Jan '25
Dec '24
high
Out-of-Bounds Array Access in `_calculateQuantAMMVariance` with Odd Number of Assets and Vector Lambda
high
Fee Evasion via LP Token Transfer Resets Deposit Value
high
Owner fee will be locked in `UpliftOnlyExample` contract due to incorrect recipient address in `UpliftOnlyExample::onAfterSwap`
medium
quantAMMSwapFeeTake used for both getQuantAMMSwapFeeTake and getQuantAMMUpliftFeeTake.
medium
“Uplift Fee” Incorrectly Falls Back to Minimum Fee Due to Integer Division
medium
Transferring deposit NFT doesn't check if the receiver exceeds the 100 deposit limit
Nov '24
Findings not publicly available for private contests.
94.59 USDC • 1 total finding • Sherlock • Atharv
Oct '24
Findings not publicly available for private contests.
high
high
medium
Sep '24
high
Boost Creator Loses Access to Reclaim Funds Due to Owner Assignment in Deployed Incentive Contracts
medium
Loss of Fee in Boost Protocol Due to Referral Fee Manipulation
medium
Incompatibility with Fee-on-Transfer Tokens Causes Transaction Reverts
medium
Weak Randomness in drawRaffle() Function Allows Manipulation by Block Proposers
medium
Protocol Fails to Handle Rebasing Tokens, Leading to Potential Reward Losses for users
Aug '24
high
TokenManager - Unlimited withdraw
high
Native token withdrawal fails until manually approved
high
`DeliveryPlace::settleAskTaker` Has Incorrect Access Control
high
Malicious user can drain protocol by bypassing `ASK` offer abortion validation in `Turbo` mode
medium
Unnecessary balance checks and precision issues in TokenManager::_transfer
low
`listOffer` Unsafely References Fungible Identifiers
Jun '24
Apr '24
Mar '24
Jan '24