https://sherlock-files.ams3.digitaloceanspaces.com/profile_images/defaults/default_avatar_8.png

johny37

Security Researcher

Contact Me

High

2

Solo

9

Total

Medium

1

Solo

18

Total

$4.85K

Total Earnings

#857 All Time

4x

Payouts

gold

1x

1st Places

silver

1x

2nd Places

regular

2x

Top 10

All

Sherlock

CodeHawks

Hats Finance

Oct '25

Valhalla CLOB - Oct 3rd

Valhalla CLOB - Oct 3rd

Collaborative Audit • Sherlock • johny37

Feb '25

Core Contracts

Core Contracts

410.77 usdc • 35 total findings • CodeHawks • johny7173

#53

high

Multiple Delegation by Double Spending Boosts and Lack of Delegation Tracking in BoostController Contract

high

ZENO Token Redemption Returns Negligible USDC Amount Compared to Purchase Price

high

Multiple issues from unnecessary balance increase calculation in DebtToken.mint

high

Incorrect Reward Claim Logic in FeeCollector::claimRewards Causes Denial of Service

high

Incorrect Debt Scaling Leading to Protocol Solvency Risk

high

Treasury Balance Tracking Bypass in FeeCollector

high

Ineffective Time-Weighted Average Implementation in Fee Distribution

medium

Missing StabilityPool Integration in `mintRewards` Function

medium

Incorrect Return Values and Double Scaling in `RToken.burn` Function Leads to Denial of Service

medium

Using balanceOf Instead of Voting Power

medium

Workingsupply would always be overwritten in boostcontroller.sol impacting reward calculations

medium

Permanent boost inflation through delegation removal in Boostcontroller.sol

medium

Inconsistent Scaling in RToken Transfer Functions

medium

[L-1] Inaccurate boost calculations in `veRAACToken` due to wrong input parameter

medium

Failure to update `lastClaimTime` mapping when users claim rewards in FeeCollector Causes Time-Based Reward Calculation Issues

medium

RAACToken burns less tokens than expected when feeCollector is unset

medium

Incorrect boost calculation in `BoostController#_calculateBoost()` can be exploited to gain an unfair advantage in reward distribution

medium

Flawed Boost Multiplier Calculation Always Yields Maximum Boost

medium

Misuse of Raw vs. Normalized Values in Utilization Rate Calculation

medium

Users Cannot Remove Their Own Boost Delegation, Causing Potential Lock-In

medium

The earned yield from the Curve vault can never be utilized when withdrawing or borrowing

low

`mint` function in RToken contract doesn't return the correct expected values, leading to emission of ReserveLibrary `Deposit` event and LendingPool `Deposit` event with incorrect values.

low

Limited veRaac Token Supply Triggers DoS, Hampering Proper Governance Participation.

low

Unauthorized Vote Casting Vulnerability

low

Incorrect Initialization of minBoost in BaseGauge Constructor Breaks Core Contract Functionality

low

Missing Pause Functionality in veRAACToken Contract Can Be Abused When Emergency Withdrawal Mechanism Is Activated

low

`FeeCollector::updateFeeType` wrong fee share validation leads to impossible update for some fee types

low

Inadequate Emergency Shutdown Role Enforcement in RAACMinter: Denial of Service in Emergency Response

low

Hardcoded Emission Values Lead to Incorrect Reward Calculations

low

Misleading NatSpec and Ambiguous Access Control in `setHousePrice` Function

low

`emergencyUnlockEnabled` Is Never Used, Rendering “Emergency Unlock” Ineffective

low

`collateralLiquidated` value is always 0 when emitted in the `LiquidationFinalized` event

low

Incorrect Gauge Weight Emission in BoostController Vote Function

low

Indefinite Extension of Delegation in function delegateBoos() in BoostController.sol

low

Inaccurate Execution Time Reporting in Proposal Execution Revert

Jan '25

DAOsis

DAOsis

3,300 wROSE • 4 total findings • Hats • johny37

gold

high

Missing Access Control on burnFrom() Function

high

Missing Handling of Excess Ether in buy() Function

medium

No Time Checks During invest()

low

Potential Duplicate Participant Entries in participants Array

Oct '24

Dria

Dria

38.22 USDC • 5 total findings • CodeHawks • johny7173

#33

medium

Platform fees withdrawal will sweep oracle agents earned fees

medium

Request responses and validations can be mocked leading to extraction of fees and/or forcing other generators to lose their fees by making them outliers

medium

Users can list assets with price < 1 ERC20 (ETH, WETH), leading to potential DoS vulnerability.

low

Lack of output validation in `LLMOracleCoordinator::respond` allows empty responses and potential fee exploitation by oracles.

low

`LLMOracleCoordinator::request` lacks a check for non-empty `task.input`, making `assertValidNonce` easier to pass due to reduced uniqueness

Sep '24

Accumulated finance

Accumulated finance

1,100 wROSE • 1 total finding • Hats • johny37

silver

low

Potential Front-Running and DoS Vulnerabilities due to EIP-2612 Usage