Security Researcher
745fe9f9c2
High
Total
Medium
Total Earnings
#1089 All Time
Payouts
1st Places
Top 10
Top 25
All
Sherlock
Code4rena
CodeHawks
Dec '24
0.00 op • 1 total finding • CodeHawks • mgf15
#31
low
Old router retains token allowance after update
62.48 USDC • 1 total finding • Code4rena • mgf15
#4
medium
Missing slippage protection in `AerodromeDexter.sol` `swapExactTokensForTokens()`
134.33 USDC • 1 total finding • Sherlock • mgf15
#6
uses `ERC20.approve` instead of safe approvals, causing it to always revert on some ERC20s
0 USDC • 1 total finding • Code4rena • mgf15
#36
high
Minting zero tokens when underlyingToken is not Ether in cashIn()
Nov '24
94.59 USDC • 1 total finding • Sherlock • mgf15
attacker can front-run `claim` function and steal user tokens
Oct '24
4.04 USDC • 1 total finding • CodeHawks • mgf15
#65
Sequential Fee Calculations Lead to Lost Platform Revenue Due to Precision Loss
Aug '24
4.88 USDC • 3 total findings • CodeHawks • mgf15
#116
Incorrect set up and logic of `referralInfoMap` in `SystemConfig::updateReferrerInfo` function
TokenManager - Unlimited withdraw
CreateOffer allows eachTradeTax to be 100% ( 10000 bp ) violating code assumptions
Jul '24
#89
Pause and unpause functions are inaccessible
135.48 USDC • 1 total finding • Code4rena • mgf15
#7
`WellUpgradeable` can be upgraded by anyone
Apr '24
49.68 USDC • 2 total findings • Sherlock • mgf15
#27
IERC20.transferFrom wil fail for USDT
`executeOperation` will revert if _flashToken is USDT
Jan '24
2.82 USDC • 1 total finding • CodeHawks • mgf15
Any User can mint any amount of WStETH in the WStETHMock.sol and StETHMock.sol
0.09 USDC • 1 total finding • Code4rena • mgf15
#56
Anyone can update the address of the Router in the DcntEth contract to any address they would like to set.
7.43 USDC • Code4rena • mgf15
#85
42.44 USDC • Code4rena • mgf15
#47
Nov '23
91.26 USDC • Code4rena • mgf15
#20
Oct '23
21.02 USDC • Code4rena • mgf15
#17
129.7 USDC • Code4rena • mgf15
#10
Jul '23
0.04 USDC • 2 total findings • CodeHawks • mgf15
#159
Pragma isn't specified correctly which can lead to nonfunction/damaged contract when deployed on Arbitrum
gas
`++i`/`i++` should be `unchecked{++i}`/`unchecked{i++}` when it is not possible for them to overflow, as is the case when used in `for`- and `while`-loops
25.59 USDC • 1 total finding • CodeHawks • mgf15
#59
Events may be emitted out of order due to reentrancy
459.56 USDC • Code4rena • mgf15
#57
Jun '23
80.43 USDC • Code4rena • mgf15
#61
40.19 USDC • Code4rena • mgf15
#33
May '23
74.27 USDC • Code4rena • mgf15
#63
Jan '23
1.15 USDC • 1 total finding • Code4rena • mgf15
#91
Staking rewards can be drained