Security Researcher
High
Total
Medium
Total Earnings
#383 All Time
Payouts
Top 10
Top 25
Top 50
All
Sherlock
Code4rena
Jul '24
256.42 USDC • 2 total findings • Sherlock • cryptphi
#7
high
Users can double claim in claimTokens()
medium
No access control on ERC1155Voucher::onERC1155BatchReceived()
Mar '24
1,620.06 USDC • 1 total finding • Code4rena • cryptphi
#6
User might execute PositionToken of token set by previous token owner.
Feb '24
7.18 USDC • 1 total finding • Code4rena • cryptphi
#34
Holders array can be manipulated by transferring or burning with amount 0, stealing rewards or bricking certain functions
Nov '22
38.28 USDC • 1 total finding • Code4rena • cryptphi
#35
Attacker can steal any funds in the contract by state confusion (no preconditions)
1,909.67 USDC • 1 total finding • Code4rena • cryptphi
#15
Call to declareInsolvent() would revert when contract status reaches liquidation point after repayment of credit position 1
687.41 USDC • 2 total findings • Sherlock • cryptphi
#5
Unchecked transfers
Anyone can spend on behalf of roller periphery
Oct '22
24.22 USDC • 1 total finding • Code4rena • cryptphi
#47
Oracle assumes token and feed decimals will be limited to 18 decimals
488.83 USDC • 3 total findings • Sherlock • cryptphi
Anybody can withdraw underlying asset without ERC5095 token burn before maturity without burning leading to theft of funds
User can double mint illuminate PTs through cross-function re-entrancy.
setFee() in Redeemer contract would always revert.
165.41 USDC • 2 total findings • Sherlock • cryptphi
#20
Vault can be drained of funds using arbitrary commitment input when Private vault delegate is 0.
Vault can be drained of funds via Signature replay.
351.52 USDC • 1 total finding • Code4rena • cryptphi
#21
If user sets a low `gasPrice` the operator would have to choose between being locked out of the pod or executing the job anyway
Sep '22
8.01 USDC • 1 total finding • Code4rena • cryptphi
#54
Different Oracle issues can return outdated prices
271.16 USDC • 1 total finding • Code4rena • cryptphi
#50
Delegation should not be allowed to address(0)
Aug '22
2,283.64 USDC • 2 total findings • Code4rena • cryptphi
#10
Anyone can pass any proposal alone before first `VOTES` are minted
OlympusGovernance#executeProposal: reentrancy attack vulnerable function
571.54 USDC • 1 total finding • Code4rena • cryptphi
#8
Inconsistent logic of increase unlock time to the expired locks
507.96 USDC • 1 total finding • Code4rena • cryptphi
#14
FraxlendPair.sol is not fully EIP-4626 compliant
844.44 USDC • 3 total findings • Code4rena • cryptphi
#16
Project funds can be drained by reusing signatures, in some cases
Signature Checks could be passed when SignatureDecoder.recoverKey() returns 0
Incorrect initialization of smart contracts with Access Control issue
Jul '22
2,134.93 USDC • 1 total finding • Code4rena • cryptphi
removeWrapping can be called when there are still wrapped tokens
1,223.05 USDC • 2 total findings • Code4rena • cryptphi
#12
It is possible to create fake ERC1155 NameWrapper token for subdomain, which is not owned by NameWrapper
transfer() depends on gas consts
142.3 USDC • 2 total findings • Code4rena • cryptphi
#55
Cash-out from a successful buyout allows an attacker to drain Ether from the `Buyout` contract
Use of `payable.transfer()` may lock user funds
3.41 USDC • 1 total finding • Code4rena • cryptphi
#65
Use a safe transfer helper library for ERC20 transfers
Jun '22
578.37 USDC • 4 total findings • Code4rena • cryptphi
#23
Allowance check always true in ERC5095 redeem
Unable to redeem from Notional
Funds may be stuck when `redeeming` for Illuminate
Lend method signature for illuminate does not track the accumulated fee
4,096.71 USDC • 2 total findings • Code4rena • cryptphi
accountant address can be set to zero by anyone leading to loss of funds/tokens
Missing zero address check can set treasury to zero address
May '22
1,153.85 USDT • 1 total finding • Code4rena • cryptphi
No check for existing extraRewards during push
257.48 USDC • 3 total findings • Code4rena • cryptphi
#31
USDT is not supported because of approval mechanism
Possible token reentrancy in release() of BathBuddy.sol
Use `safeTransfer()`/`safeTransferFrom()` instead of `transfer()`/`transferFrom()`
19.18 DAI • 1 total finding • Code4rena • cryptphi
#61
safeTransferFrom is recommended instead of transfer (1)