https://sherlock-files.ams3.digitaloceanspaces.com/profile_images/defaults/default_avatar_5.png

osuolale

Security Researcher

Contact Me

High

4

Total

Medium

7

Total

$32.00

Total Earnings

#2222 All Time

5x

Payouts

regular

1x

Top 25

regular

2x

Top 50

All

Sherlock

Code4rena

CodeHawks

Jul '25

DeBank

DeBank

0.00 USDC • Sherlock • osuolale

#130

Mar '25

Forte: Float128 Solidity Library

Forte: Float128 Solidity Library

2.69 USDC • 1 total finding • Code4rena • osuolale

#29

high

Natural Logarithm Function Silently Accepts Invalid Non-Positive Inputs

PinLink: RWA-Tokenized DePIN Marketplace

PinLink: RWA-Tokenized DePIN Marketplace

0.00 USDC • Sherlock • osuolale

#110

Symmio, Staking and Vesting

Symmio, Staking and Vesting

0.00 USDC • 1 total finding • Sherlock • osuolale

#18

medium

Missing Access Control Allows Reward Period Extension Attack. An attacker will dilute rewards for stakers

Feb '25

Core Contracts

Core Contracts

29.60 usdc • 14 total findings • CodeHawks • osuolale

#224

high

RAACNFT mint function receives funds to address(this) but has no way of withdrawing them

high

Incorrect Reward Claim Logic in FeeCollector::claimRewards Causes Denial of Service

high

Boost Miscalculation Leads to Excess Distribution

medium

Incorrect accounting in `veRAACToken::emergencyWithdraw` and `veRAACToken::withdraw` due to missing `totalLocked` update

medium

Treasury Contract Deposit Function Can Be Frontrun To Deny Protocol Operations

medium

Workingsupply would always be overwritten in boostcontroller.sol impacting reward calculations

medium

hardcoded baseamount in Updateuserboost fucntion causes users with small token holdings to receive higher boosts relative to their holdings t

medium

Multiple Token Management Lets Withdraw a Token Different than Deposited Token

medium

Users Cannot Remove Their Own Boost Delegation, Causing Potential Lock-In

low

Lack of enforcement of the `MAX_TOTAL_LOCKED_AMOUNT`

low

Incorrect Initialization of minBoost in BaseGauge Constructor Breaks Core Contract Functionality

low

`FeeCollector::updateFeeType` wrong fee share validation leads to impossible update for some fee types

low

Overwriting Previous Allocations in allocateFunds May Lead to Loss of Cumulative Allocation Data

low

Insufficient ETH Forwarding in Governance Execution Mechanism Causes Proposal Failures