https://sherlock-files.ams3.digitaloceanspaces.com/profile_images/316cc6b3-b794-4a0d-8a24-b42a53f3d31c.png

Falendar

Security Researcher

Contact Me

High

20

Total

Medium

19

Total

$5.54K

Total Earnings

#767 All Time

10x

Payouts

regular

1x

Top 10

regular

3x

Top 25

regular

5x

Top 50

All

Sherlock

Code4rena

Cantina

CodeHawks

Jun '25

DODO Cross-Chain DEX

DODO Cross-Chain DEX

11.07 USDC • 2 total findings • Sherlock • Falendar

#53

high

Tokens can be stolen from GatewaySend and GatewayCrossChain

medium

Unsafe ERC20 transfer in GatewaySend

May '25

LEND

LEND

4.96 USDC • 1 total finding • Sherlock • Falendar

#98

high

The liquidation validation logic is wrong

Apr '25

Kinetiq

Kinetiq

804.57 USDC • 2 total findings • Code4rena • Falendar

#7

high

Mishandling of receiving HYPE in the StakingManager , lead to user can't confirm withdrawal and inflate the exchange ratio

medium

Missing withdrawal pause check in `confirmWithdrawal` allows bypassing withdrawal restrictions

Feb '25

Core Contracts

Core Contracts

425.07 usdc • 35 total findings • CodeHawks • falendar

#52

high

Multiple Delegation by Double Spending Boosts and Lack of Delegation Tracking in BoostController Contract

high

Delegation Boost Not Usable by Delegatees

high

Gauge period cannot be updated

high

`GaugeController` does not send funds to FeeCollector disrupting fees distribution and causing loss of funds

high

Reward manipulation vulnerability in StabilityPool

high

Incorrect Reward Claim Logic in FeeCollector::claimRewards Causes Denial of Service

high

Users can borrow more assets than they have deposited as collateral

high

RToken is Not Interest Bearing Due to Broken Liquidity Index Calculation

high

Boost Miscalculation Leads to Excess Distribution

high

Ownership Parameter Mismatch in LendingPool’s Vault Withdrawal Logic

high

Treasury Balance Tracking Bypass in FeeCollector

high

Untracked Direct Fee Transfers from RAACToken to FeeCollector Break Fee Distribution System

high

Ineffective Time-Weighted Average Implementation in Fee Distribution

high

Gauge reward system can be gamed with repeatedly stake/withdraw

medium

Missing Vote Frequency Control in GaugeController

medium

`MAX_TOTAL_SUPPLY` Bypass in `veRAACToken` via `increase()` Function

medium

Incorrect Return Values and Double Scaling in `RToken.burn` Function Leads to Denial of Service

medium

LendingPool deposits do not work with CurveVault due to lack of funds

medium

Multiple Critical Calculation And Logic Errors in `RToken::mint/burn` Function

medium

There is no logic checking for RAACNFT price staleness before minting it

medium

Emergency Withdrawal Remains Active After Cancellation

medium

Time-skew Attack in RWAGauge Weight Calculations Through Precision Gaming

medium

Multiple Token Management Lets Withdraw a Token Different than Deposited Token

medium

Cordinated group of attacker can artificially lower quorum threshold during active proposals forcing malicious proposals to pass without true majority support.

medium

Incorrect boost calculation in `BoostController#_calculateBoost()` can be exploited to gain an unfair advantage in reward distribution

medium

balanceOf(address(this)) in StabilityPool causes reward distribution to be higher than it should be

medium

Users Cannot Remove Their Own Boost Delegation, Causing Potential Lock-In

low

Missing Controller Functions in GaugeController

low

Emergency withdraw functionality in veRAACToken takes longer than expected

low

Incorrect Initialization of minBoost in BaseGauge Constructor Breaks Core Contract Functionality

low

Missing Checkpoint Reset in `veRAACToken::emergencyWithdraw` Function

low

`FeeCollector::updateFeeType` wrong fee share validation leads to impossible update for some fee types

low

Insufficient ETH Forwarding in Governance Execution Mechanism Causes Proposal Failures

low

Missing Validation for Minimum Vote Weight in `vote` Function

low

BoostController Bypasses Boost State Tracking System

Jan '25

Liquid Ron

Liquid Ron

0 USDC • 1 total finding • Code4rena • Falendar

#12

medium

Incorrect Logic in onlyOperator Modifier Leading to Denial-of-Service for Authorized Operators Across Critical Functions

Dec '24

story-protocol

story-protocol

4,193.38 USDC • 1 total finding • Cantina • Falendar

#35

medium

Finding not yet public.

Oku's New Order Types Contract Contest

Oku's New Order Types Contract Contest

1.54 OP • 2 total findings • Sherlock • Falendar

#54

high

`generateOrderId` generates duplicate order IDs

high

Funds in `OracleLess.sol` can be drained

Nov '24

Debita Finance V3

Debita Finance V3

20.36 USDC • 2 total findings • Sherlock • Falendar

#45

medium

`offer.maxDeadline` is used instead of `extendedTime` when calculating the fee

medium

Incorrect calculation of `extendedTime`

Project

Project

75.27 USDC • 2 total findings • CodeHawks • falendar

#14

low

Lack of Validation for `tierConfigs[i].minted` Value in New Tiers During DAO Membership Update

low

No enforcement of max members for sponsored DAO allows more users to join crossing the max cap

Aug '24

Phi

Phi

0.19 USDC • 1 total finding • Code4rena • Falendar

#54

high

Exposed `_removeCredIdPerAddress` & `_addCredIdPerAddress` allows anyone to cause issues to current holders as well as upcoming ones