https://sherlock-files.ams3.digitaloceanspaces.com/profile_images/4e7646ce-545b-47dc-b5d5-ddb7328bc56f.jpeg

Uddercover

Security Researcher

Blockchain Security Sesearcher - Solidity https://t.co/BP97fbKhmN

Contact Me

High

24

Total

Medium

19

Total

$1.83K

Total Earnings

#1123 All Time

11x

Payouts

regular

1x

Top 10

regular

6x

Top 25

regular

8x

Top 50

All

Sherlock

Code4rena

Cantina

CodeHawks

May '25

LEND

LEND

17.57 USDC • 5 total findings • Sherlock • Uddercover

#73

high

Poor state synchronization across chains will allow users to borrow past the allowed amount for their supplied collateral

high

Use of wrong exchange rate will cause loss of value for users of the protocol

high

Any rando can steal all supplied funds due to faulty conditional in `CoreRouter::borrow` function

medium

Incorrect borrow amount calculation will prevent users from borrowing the max borrowable amount

medium

Not adding liquidated tokens to liquidator `userSuppliedAssets` will cause unfair liquidations for users

mystic-monorepo

mystic-monorepo

203.92 USDC • 10 total findings • Cantina • uddercover

#16

high

Finding not yet public.

high

Finding not yet public.

high

Finding not yet public.

high

Finding not yet public.

high

Finding not yet public.

medium

Finding not yet public.

medium

Finding not yet public.

medium

Finding not yet public.

medium

Finding not yet public.

medium

Finding not yet public.

Mar '25

Forte: Float128 Solidity Library

Forte: Float128 Solidity Library

345.88 USDC • 1 total finding • Code4rena • Uddercover

#19

high

Unwrapping while equating inside the `eq` function fails to account for the set `L_MATISSA_FLAG`

Nudge.xyz

Nudge.xyz

0.06 USDC • 1 total finding • Code4rena • Uddercover

#8

medium

Unauthorized Reallocation in `NudgeCampaign::handleReallocation` and Reward Disruption Vulnerability in `NudgeCampaign::invalidateParticipations`

PinLink: RWA-Tokenized DePIN Marketplace

PinLink: RWA-Tokenized DePIN Marketplace

16.05 USDC • Sherlock • Uddercover

#41

Symmio, Staking and Vesting

Symmio, Staking and Vesting

48.59 USDC • 2 total findings • Sherlock • Uddercover

#13

medium

Wrong initialization pattern will stop the `SymmVesting.sol` contract from working correctly

medium

Bad check in `Vesting.sol::_resetVestingPlans` will prevent users from adding additional liquidity in `SymmVesting.sol`

Feb '25

Yieldoor

Yieldoor

16.34 USDC • 2 total findings • Sherlock • Uddercover

#23

medium

Code implementation error will DOS users who try to open leverage position with multiswap params

medium

Wrong code implementation will DOS users when they try to withdraw from the leverager

Core Contracts

Core Contracts

1,165.84 usdc • 19 total findings • CodeHawks • uddercover

#15

high

`BaseGauge` users can claim rewards without staking

high

Wrong use of the `GaugeController::typeWeights` multiplier in `GaugeController::_calculateReward` causes a reduction in gauge rewards instead

high

`GaugeController::_calculateReward` implementation will cause smaller shares to be allocated to every gauge

high

Incorrect Reward Claim Logic in FeeCollector::claimRewards Causes Denial of Service

high

Treasury Balance Tracking Bypass in FeeCollector

high

Attackers can double voting power and veToken amount by locking and increasing

high

Gauge rewards are not transferred to gauge when distributeRewards() is called

high

Untracked Direct Fee Transfers from RAACToken to FeeCollector Break Fee Distribution System

high

Ineffective Time-Weighted Average Implementation in Fee Distribution

high

Gauge stakers won't get any reward due to round-down in user weight calculation

medium

Missing Vote Frequency Control in GaugeController

medium

There is no logic checking for RAACNFT price staleness before minting it

medium

Treasury Contract Deposit Function Can Be Frontrun To Deny Protocol Operations

medium

Emergency revoke in RAACReleaseOrchestrator will freeze revoked RAAC tokens in orchestrator

medium

Incorrect Period Transition Logic in Reward Distribution

low

Incorrect Initialization of minBoost in BaseGauge Constructor Breaks Core Contract Functionality

low

Missing Pause Functionality in veRAACToken Contract Can Be Abused When Emergency Withdrawal Mechanism Is Activated

low

`FeeCollector::updateFeeType` wrong fee share validation leads to impossible update for some fee types

low

Incorrect Timestamp Tracking in RAACHousePrice contract

Jan '25

Plaza Finance

Plaza Finance

11.62 USDC • 2 total findings • Sherlock • Uddercover

#76

high

Auctions will never end, causing users' tokens to remain stuck

high

Malicious user will drastically increase coupon amount to distribute

Dec '24

SecondSwap

SecondSwap

0.03 USDC • 2 total findings • Code4rena • Uddercover

#66

high

Users can claim more that their actual allotment

medium

Incorrect referral fee calculations

Oku's New Order Types Contract Contest

Oku's New Order Types Contract Contest

2.03 OP • 3 total findings • Sherlock • Uddercover

#46

high

Any random bad actor will drain user tokens from `Bracket` contract

high

Random bad actor will steal user funds from `OracleLess` contract

medium

"Fresh price" returned by `PythOracle` will cause a significant denial of service in the Oku automation system