https://sherlock-files.ams3.digitaloceanspaces.com/twitter_images/cc1cd728-537d-434c-9e6a-0b5f9eba26d8.jpg

Draiakoo

Security Researcher

Web3 security resercher Audit portfolio: https://t.co/TTUOxBoVIW

Contact Me

High

17

Total

Medium

18

Total

$10.71K

Total Earnings

#555 All Time

8x

Payouts

regular

1x

Top 10

regular

4x

Top 25

regular

5x

Top 50

All

Code4rena

Aug '24

Chakra

Chakra

785.61 USDT • 9 total findings • Code4rena • Draiakoo

#13

high

Malicious actors can manipulate the `cross_chain_callback` callback

high

There is no refund mechanism in `ChakraSettlement.processCrossChainCallback` or `ChakraSettlementHandler.receive_cross_chain_callback` function

high

Inconsistent Handler Validation Behavior in Cairo ERC20Handler's Cross-Chain Callback

high

Anyone can manipulate user nonce (nonce_manager) in settlement contract

medium

Settlement contract is mistakenly used for the handler contract when assigning ReceivedCrossChainTx struct

medium

inconsistency in sender address when creating cross chain messages on Starknet can lead to loss of funds

medium

Wrong usage of transaction originator address instead of caller address

medium

Does not check if to_chain and to_handler is whitelisted in cross_chain_erc20_settlement

medium

SettlementSignatureVerifier's required_validators is not updated, resulting in a low or high number of signatures being required

Apr '24

NOYA

NOYA

4.59 USDC + NOYA stars • 1 total finding • Code4rena • Draiakoo

#103

medium

Dust donation might DOS all connectors to create new holding positions, by preventing removing existing holding positions

Feb '24

Wise Lending

Wise Lending

7,970.35 USDC • 2 total findings • Code4rena • Draiakoo

#7

high

Incorrect bad debt accounting can lead to a state where the `claimFeesBeneficial` function is permanently bricked and no new incentives can be distributed, potentially locking pending and future protocol fees in the `FeeManager` contract

medium

Liquidating chaining can be achieved by liquidating token collateral with the highest `collateralFactor`

AI Arena

AI Arena

178.73 USDC • 11 total findings • Code4rena • Draiakoo

#31

high

Malicious user can stake an amount which causes zero curStakeAtRisk on a loss but equal rewardPoints to a fair user on a win

high

A locked fighter can be transferred; leads to game server unable to commit transactions, and unstoppable fighters

high

Since you can reroll with a different fighterType than the NFT you own, you can reroll bypassing maxRerollsAllowed and reroll attributes based on a different fighterType

high

Players have complete freedom to customize the fighter NFT when calling `redeemMintPass` and can redeem fighters of types Dendroid and with rare attributes

high

Fighters cannot be minted after the initial generation due to uninitialized `numElements` mapping

high

Non-transferable `GameItems` can be transferred with `GameItems::safeBatchTransferFrom(...)`

high

FighterFarm:: reroll won't work for nft id greator than 255 due to input limited to uint8

medium

Can mint NFT with the desired attributes by reverting transaction

medium

Constraints of dailyAllowanceReplenishTime and allowanceRemaining during mint() can be bypassed by using alias accounts & safeTransferFrom()

medium

DoS in `MergingPool::claimRewards` function and potential DoS in `RankedBattle::claimNRN` function if called after a significant amount of rounds passed.

medium

Fighter created by mintFromMergingPool can have arbitrary weight and element

Jan '24

Salty.IO

Salty.IO

988.03 USDC • 6 total findings • Code4rena • Draiakoo

#15

high

User can evade `liquidation` by depositing the minimum of tokens and gain time to not be liquidated

high

First depositor can break staking-rewards accounting

medium

THE USER WHO WITHDRAWS LIQUIDITY FROM A PARTICULAR POOL IS ABLE TO CLAIM MORE REWARDS THAN HE DULY DESERVES BY CAREFULLY SELECTING A `decreaseShareAmount` VALUE SUCH THAT THE `virtualRewardsToRemove` IS ROUNDED DOWN TO ZERO

medium

Incorrect assumption in PoolMath.sol can cause underflow when zapping is used

medium

SALT staker can get extra voting power by simply unstaking their xSALT

medium

Reusing a SALT that has already been used for voting can allow a malicious proposal to pass and compromise the protocol.

Curves

Curves

5.11 USDC • 3 total findings • Code4rena • Draiakoo

#101

high

Unrestricted claiming of fees due to missing balance updates in `FeeSplitter`

high

Unauthorized Access to setCurves Function

medium

If a user sets their curve token symbol as the default one plus the next token counter instance it will render the whole default naming functionality obsolete

Nov '23

Kelp DAO | rsETH

Kelp DAO | rsETH

2.76 USDC • Code4rena • Draiakoo

#54

Oct '23

NextGen

NextGen

780.17 USDC • 3 total findings • Code4rena • Draiakoo

#15

high

Attacker can drain all ETH from AuctionDemo when block.timestamp == auctionEndTime

medium

The RandomizerVRF and RandomizerRNG not produce hash value.

medium

Artist signatures can be forged to impersonate the artist behind a collection