Security Researcher
High
Total
Medium
Total Earnings
#336 All Time
Payouts
Top 10
Top 25
Top 50
All
Sherlock
Code4rena
Jul '24
256.42 USDC • 2 total findings • Sherlock • cryptphi
#7
high
Users can double claim in claimTokens()
medium
No access control on ERC1155Voucher::onERC1155BatchReceived()
80.87 USDC • Sherlock • cryptphi
#101
Mar '24
6.95 USDC • Code4rena • cryptphi
#19
1,620.06 USDC • 1 total finding • Code4rena • cryptphi
#6
User might execute PositionToken of token set by previous token owner.
Feb '24
7.18 USDC • 1 total finding • Code4rena • cryptphi
#34
Holders array can be manipulated by transferring or burning with amount 0, stealing rewards or bricking certain functions
Jan '23
36.24 USDC • Code4rena • cryptphi
Nov '22
38.28 USDC • 1 total finding • Code4rena • cryptphi
#35
Attacker can steal any funds in the contract by state confusion (no preconditions)
1,909.67 USDC • 1 total finding • Code4rena • cryptphi
#15
Call to declareInsolvent() would revert when contract status reaches liquidation point after repayment of credit position 1
687.41 USDC • 2 total findings • Sherlock • cryptphi
#5
Unchecked transfers
Anyone can spend on behalf of roller periphery
Oct '22
24.22 USDC • 1 total finding • Code4rena • cryptphi
#47
Oracle assumes token and feed decimals will be limited to 18 decimals
488.83 USDC • 3 total findings • Sherlock • cryptphi
Anybody can withdraw underlying asset without ERC5095 token burn before maturity without burning leading to theft of funds
User can double mint illuminate PTs through cross-function re-entrancy.
setFee() in Redeemer contract would always revert.
165.41 USDC • 2 total findings • Sherlock • cryptphi
#20
Vault can be drained of funds using arbitrary commitment input when Private vault delegate is 0.
Vault can be drained of funds via Signature replay.
351.52 USDC • 1 total finding • Code4rena • cryptphi
#21
If user sets a low `gasPrice` the operator would have to choose between being locked out of the pod or executing the job anyway
37.88 USDC • Code4rena • cryptphi
#18
Sep '22
52.04 USDC • Code4rena • cryptphi
#51
40.88 USDC • Code4rena • cryptphi
#62
27.95 USDC • Code4rena • cryptphi
#71
55.2 USDC • Code4rena • cryptphi
8.01 USDC • 1 total finding • Code4rena • cryptphi
#54
Different Oracle issues can return outdated prices
100.13 USDC • Code4rena • cryptphi
#49
33.6 USDC • Code4rena • cryptphi
#13
39.22 CANTO • Code4rena • cryptphi
#12
271.16 USDC • 1 total finding • Code4rena • cryptphi
#50
Delegation should not be allowed to address(0)
Aug '22
2,283.64 USDC • 2 total findings • Code4rena • cryptphi
#10
Anyone can pass any proposal alone before first `VOTES` are minted
OlympusGovernance#executeProposal: reentrancy attack vulnerable function
571.54 USDC • 1 total finding • Code4rena • cryptphi
#8
Inconsistent logic of increase unlock time to the expired locks
507.96 USDC • 1 total finding • Code4rena • cryptphi
#14
FraxlendPair.sol is not fully EIP-4626 compliant
41.2 USDC • Code4rena • cryptphi
#59
844.44 USDC • 3 total findings • Code4rena • cryptphi
#16
Project funds can be drained by reusing signatures, in some cases
Signature Checks could be passed when SignatureDecoder.recoverKey() returns 0
Incorrect initialization of smart contracts with Access Control issue
Jul '22
2,134.93 USDC • 1 total finding • Code4rena • cryptphi
removeWrapping can be called when there are still wrapped tokens
342.78 USDC • Code4rena • cryptphi
#36
44.78 USDC • Code4rena • cryptphi
#52
1,223.05 USDC • 2 total findings • Code4rena • cryptphi
It is possible to create fake ERC1155 NameWrapper token for subdomain, which is not owned by NameWrapper
transfer() depends on gas consts
142.3 USDC • 2 total findings • Code4rena • cryptphi
#55
Cash-out from a successful buyout allows an attacker to drain Ether from the `Buyout` contract
Use of `payable.transfer()` may lock user funds
3.41 USDC • 1 total finding • Code4rena • cryptphi
#65
Use a safe transfer helper library for ERC20 transfers
Jun '22
68.53 USDC • Code4rena • cryptphi
47.14 USDC • Code4rena • cryptphi
#33
53.16 USDC • Code4rena • cryptphi
#63
578.37 USDC • 4 total findings • Code4rena • cryptphi
#23
Allowance check always true in ERC5095 redeem
Unable to redeem from Notional
Funds may be stuck when `redeeming` for Illuminate
Lend method signature for illuminate does not track the accumulated fee
81.82 USDC • Code4rena • cryptphi
51.26 USDC • Code4rena • cryptphi
58.25 USDC • Code4rena • cryptphi
#64
4,096.71 USDC • 2 total findings • Code4rena • cryptphi
accountant address can be set to zero by anyone leading to loss of funds/tokens
Missing zero address check can set treasury to zero address
307.64 USDC • Code4rena • cryptphi
#28
88.16 USDC • Code4rena • cryptphi
#39
May '22
159.01 USDC • Code4rena • cryptphi
#29
1,153.85 USDT • 1 total finding • Code4rena • cryptphi
No check for existing extraRewards during push
219.59 USDC • Code4rena • cryptphi
257.48 USDC • 3 total findings • Code4rena • cryptphi
#31
USDT is not supported because of approval mechanism
Possible token reentrancy in release() of BathBuddy.sol
Use `safeTransfer()`/`safeTransferFrom()` instead of `transfer()`/`transferFrom()`
44.75 USDC • Code4rena • cryptphi
151.97 USDC • Code4rena • cryptphi
#44
54.89 USDC • Code4rena • cryptphi
#67
191.03 USDT • Code4rena • cryptphi
#43
179.97 DAI • Code4rena • cryptphi
#37
19.18 DAI • 1 total finding • Code4rena • cryptphi
#61
safeTransferFrom is recommended instead of transfer (1)
113.78 USDC • Code4rena • cryptphi
#42
30.28 USDC • Code4rena • cryptphi
93.58 USDC • Code4rena • cryptphi
#24
Mar '22
198.21 USDC • Code4rena • cryptphi
118.98 USDT • Code4rena • cryptphi
168.14 USDC • Code4rena • cryptphi
Feb '22
125.49 USDC • Code4rena • cryptphi