Banner
https://sherlock-files.ams3.digitaloceanspaces.com/twitter_images/dc9ef64e-cb2b-4200-a17b-aa7dbd9c1719.jpg

KrisRenZo

Security Researcher

Tokenomics Research Analyst

Contact Me

High

18

Total

Medium

1

Solo

10

Total

$14.95K

Total Earnings

#419 All Time

8x

Payouts

silver

1x

2nd Places

regular

3x

Top 10

regular

6x

Top 25

All

Sherlock

CodeHawks

Feb '25

Yieldoor

Yieldoor

61.92 USDC • 2 total findings • Sherlock • KrisRenZo

#12

high

Uninitialized Fee Recipient Address Causes Permanent Loss of Protocol Fees

high

Flawed Liquidation Threshold Calculation Allows Underwater Positions to Avoid Liquidation, Leading to Protocol Bad Debt

Liquidity Management

Liquidity Management

36.56 usdc • 2 total findings • CodeHawks • krisrenzo

#48

medium

Functions that rely on chainlink prices cannot be queried on avalanche due to sequencer uptime check.

low

Cancelling a Flow after a Position Is Created Might Result in Inflation/Deflation of Shares

Oct '24

Era

Era

9,077.10 USDC • CodeHawks • krisrenzo

#10

Sep '24

Liquid Staking

Liquid Staking

4,182.98 USDC • 8 total findings • CodeHawks • krisrenzo

silver

medium

Remove splitter will always revert if there are some rewards left on splitter contract

medium

Removed vaults still remain valid in `OperatorVCS`

medium

[WithdrawalPool.sol] Prevent efficient return of data in getBatchIds() by blocking updateWithdrawalBatchIdCutoff() update of newWithdrawalIdCutoff

medium

Principal amount of removed operator get's stuck in Chainlink's Staking Contract forever

low

No way to update unbonding and claim periods

low

The total amount to be distributed can be manipulated

low

Attacker Can Reset the Unbonding Period for Vaults in `globalState.curUnbondedVaultGroup`, Preventing User Withdrawals

low

Incorrect `nextGroupTotalUnbonded` Calculation in `FundFlowController::_getVaultUpdateData` Includes Non-grouped Vaults, Leading to Potential Withdrawal and Deposit Errors

Aug '24

Tadle

Tadle

377.84 USDC • 8 total findings • CodeHawks • krisrenzo

#18

high

Incorrect set up and logic of `referralInfoMap` in `SystemConfig::updateReferrerInfo` function

high

Taker of bid offer will loss assets without any benefit if he calls the DeliveryPlace::settleAskMaker() for partial settlement.

high

Formulaic Error Rounds Down Causing Total Loss Of Funds For Bid Takers During Abort

high

Malicious user can drain protocol by bypassing `ASK` offer abortion validation in `Turbo` mode

high

The `DeliveryPlace::settleAskTaker()` function mistakenly uses `makerInfo.tokenAddress` to update the `TokenBalanceType.PointToken` in the `userTokenBalanceMap` mapping, leading to a critical error.

high

Fund Withdrawal Flaw in preMarket Allows Users to Avoid Settlement Obligations

medium

Unnecessary balance checks and precision issues in TokenManager::_transfer

medium

`mulDiv()` can round down to 0 in realistic cases, allowing for tax avoidance

Jul '24

Zaros Part 1

Zaros Part 1

438.43 USDC • 9 total findings • CodeHawks • krisrenzo

#20

high

Inadequate Checking of `isIncreasing` when trader adjusts position size

high

`SettlementBranch._fillOrder` does not guarantee the collateral of a position is enough to pay the future liquidation fee.

high

Incorrect logic for checking isFillPriceValid

high

Market Disruption and Financial Loss Post-Liquidation

low

QA Report - 0xStalin - Low Severities

low

Attacker can abuse the system by modifying the collateral of pending orders

low

payable Modifier in TradingAccountBranch::createTradingAccountAndMulticall

low

When transfering the NFT associated to a TradingAccount, the old owner can grief the new owner by leaving an opened MarketOrder that will be executed even though the old owner is not the owner of the TradingAccount.

low

Users can be overcharged for orderFees

May '24

Elfi

Elfi

714.08 USDC • 7 total findings • Sherlock • KrisRenZo

#7

high

Loss of Funds to Protocol Due Incorrect Report of Repaid Borrowed Margin

high

Incorrect Margin Balance Update Leads to Loss of Funds

high

Sybil attacker to claim more reward fee

high

Insufficient input validation allows attacker to steal funds by increasing the value of their account

high

Accounting error due to Execution fee being charged to wrong vault

medium

collateralUserCap is Broken Due Incorrect check

medium

Use of outdated liability value in decreasePosition leads to account error

Dec '23

The Standard

The Standard

58.76 USDC • 3 total findings • CodeHawks • krisrenzo

#32

high

Looping over unbounded `pendingStakes` array can lead to permanent DoS and frozen funds

medium

Incorrect calculation of amount of EURO to burn during liquidation

low

`costInEuros` calculation will incur precision loss due to division before multiplication