Banner
https://sherlock-files.ams3.digitaloceanspaces.com/twitter_images/6a2d260e-40e5-4152-8b97-557e891978b6.jpg

juan

Security Researcher

main sherlock account: https://audits.sherlock.xyz/watson/juaan

Contact Me

High

11

Total

Medium

13

Total

$13.22K

Total Earnings

#454 All Time

8x

Payouts

silver

2x

2nd Places

regular

4x

Top 10

regular

7x

Top 25

All

Sherlock

Code4rena

Jan '25

Aave v3.3

Aave v3.3

1,524.42 USDC • Sherlock • juan

#24

Nov '24

IVX

IVX

Collaborative Audit • Sherlock • juan

Jul '24

MakerDAO Endgame

MakerDAO Endgame

3,098.23 USDC • Sherlock • juan

#32

Apr '24

Renzo

Renzo

694.98 USDC • 5 total findings • Code4rena • GoatedAudits

#17

high

The amount of `xezETH` in circulation will not represent the amount of `ezETH` tokens 1:1

high

Incorrect withdraw queue balance in TVL calculation

high

Withdrawals logic allows MEV exploits of TVL changes and zero-slippage zero-fee swaps

high

DOS of `completeQueuedWithdrawal` when ERC20 buffer is filled

medium

stETH/ETH Feed being used opens up to 2 way deposit<->withdrawal arbitrage

TITLES Publishing Protocol

TITLES Publishing Protocol

215.05 USDC • 6 total findings • Sherlock • juan

#18

high

Malicious users can exploit a flaw in `mintBatch()` to mint large amounts of tokens, with very little cost

medium

Roles within any `Edition` contract can never be granted/revoked

medium

Signature malleability- anyone can acknowledge or unacknowledge an edge from someone else's node

medium

A malicious user can DoS the `acknowledgeEdge` and `unacknowledgeEdge` function by front-running

medium

The excess funds sent to Edition will be lost, since `_refundExcess` has a logical flaw

medium

`Edition.mintBatch()` will always revert due to using `msg.value` in a loop

Mar '24

Goat Trading

Goat Trading

150.17 USDC • 1 total finding • Sherlock • juan

#7

medium

GoatV1Pair does not work when fee-on-transfer tokens are used, leading to DoS of contract

Revert Lend

Revert Lend

3,697.85 USDC • 5 total findings • Code4rena • 0xjuan

silver

high

V3Utils.execute() does not have caller validation, leading to stolen NFT positions from users

high

Owner of a position can prevent liquidation due to the 'onERC721Received' callback

medium

AutoRange execution can be front-ran to avoid protocol fee, causing loss for protocol

medium

Repayments and liquidations can be forced to revert by an attacker that repays miniscule amount of shares

medium

Incorrect liquidation fee calculation during underwater liquidation, disincentivizing liquidators to participate

Feb '24

Smilee Finance

Smilee Finance

2,188.04 USDC • 3 total findings • Sherlock • juan

silver

medium

Complete DoS of every DVP's minting and burning, due to insufficient access controls within FeeManager::trackVaultFee.

medium

The refunding feature in the PositionManager contract will always revert due to insufficient approval

medium

Whenever swapPrice > oraclePrice, minting via PositionManager will revert, due to not enough funds being obtained from user.

Jan '24

Flat Money

Flat Money

1,650.81 USDC • 4 total findings • Sherlock • juan

#7

high

A malicious user can bypass limit order trading fees via cross-function re-entrancy

high

During liquidation, global position data is updated with the wrong price

high

A user can bypass the locking of tokens in announced orders, by unlocking it in the LimitOrder contract

high

Incorrect underflow-prevention logic when updating `marginDepositedTotal` which can lead to underflow and brick the system

Nov '23

IVX

IVX

Collaborative Audit • Sherlock • juan