https://sherlock-files.ams3.digitaloceanspaces.com/profile_images/defaults/default_avatar_8.png

Holmgren

Security Researcher

Contact Me

High

5

Total

Medium

4

Total

$10.96K

Total Earnings

#550 All Time

3x

Payouts

bronze

2x

3rd Places

regular

3x

Top 10

regular

3x

Top 25

All

Sherlock

Code4rena

Apr '23

ENS Contest

ENS Contest

5,411.66 USDC • 1 total finding • Code4rena • Holmgren

bronze

medium

`validateSignature(...)` in `EllipticCurve` mixes up Jacobian and projective coordinates

Oct '22

Inverse Finance contest

Inverse Finance contest

3,596.28 USDC • 2 total findings • Code4rena • Holmgren

bronze

medium

User can borrow DOLA indefinitely without settling DBR deficit by keeping their debt close to the allowed maximum

medium

Two day low oracle used in `Market.liquidate()` makes the system highly at risk in an oracle attack

Illuminate

Illuminate

1,949.98 USDC • 6 total findings • Sherlock • Holmgren

#6

high

Any user can receive arbitrarily large amount of Illuminate tokens for a small deposit by exploiting reentrancy in Lender

high

Users' redemptions of Illuminate can be hijacked by front-running and minting more Illuminate

high

Reentrancy and using user-supplied address in Sense variant of redeem() allows for manipulating holdings and increasing redemption payouts

high

Redemption pause is not enforced in authRedeem() and autoRedeem()

high

ERC5095's redeem() and withdraw() pre-maturity don't consume caller's tokens

medium

MarketPlace.setPrincipal(...) doesn't work for Notional