https://sherlock-files.ams3.digitaloceanspaces.com/profile_images/defaults/default_avatar_6.png

rudhra1749

Security Researcher

Contact Me

High

22

Total

Medium

6

Total

$2.63K

Total Earnings

#994 All Time

7x

Payouts

silver

2x

2nd Places

regular

3x

Top 10

regular

4x

Top 25

All

Sherlock

Code4rena

May '25

LEND

LEND

1,229.69 USDC • 16 total findings • Sherlock • rudhra1749

silver

high

wrong calculation of amount of Ltokens to seize in liquidateCrossChain function

high

malicious liquidator can get collateral tokens of borrower in chainA even if he doesn't pay repay tokens in chainB

high

DOS of _handleLiquidationSuccess function due to using incorrect underlying address as input of lendStorage.findCrossChainCollateral function

high

DOS of _handleLiquidationSuccess function due to using currentEId as input in lendStorage.findCrossChainCollateral function instead of using srcEid of chain which trigger execution of _handleLiquidationSuccess in this chain

high

DOS of _handleLiquidationSuccess function due to using payload.srcToken as input in lendStorage.findCrossChainCollateral function instead of using corresponding borrowed token of chain A

high

removing a ltoken from userBorrowedAssets will out properly checking weather he still has any borrows of this token

high

incorrect update of user borrowed assets

high

incorrect calculation of totalBorrowed amount of user

high

Incorrect calculation of total user borrowed assets due to incorrect check in borrowWithInterest function

high

wrong check in coreRouter::Borrow function allows users to borrow even if they don't have sufficient collateral

high

unfair liquidation due to incorrect calculation of borrowed funds

high

incorrect distribution of Lend tokens to users

medium

user can't borrow even if he has sufficient collateral due to wrong calculation of collateral of user

medium

liquidation will revert due to incorrect calculation of maxClose value

medium

No incentive to liquidate small positions could result in protocol going underwater

medium

bad debt is not accounted for during partial liquidation of an insolvent position

LayerEdge - Staking

LayerEdge - Staking

946.48 USDC • 2 total findings • Sherlock • rudhra1749

silver

high

Tiers of users surrounding Tier2-Tier3 boundary were not updated correctly if a new user stakes when total users in tiering system is in form of 10N+4.

high

Tiers of users surrounding Tier2-Tier3 boundary were not updated correctly if a staker in Tier 3 of tiering system unstakes when total users in tiering system is in form of 10N+5

Jan '25

Liquid Ron

Liquid Ron

0.03 USDC • 2 total findings • Code4rena • rudhra

#10

high

The calculation of `totalAssets()` could be wrong if `operatorFeeAmount` > 0, this can cause potential loss for the new depositors

medium

Incorrect Logic in onlyOperator Modifier Leading to Denial-of-Service for Authorized Operators Across Critical Functions

Plaza Finance

Plaza Finance

1.05 USDC • 2 total findings • Sherlock • rudhra1749

#95

high

transferReserveToAuction function will always reverts

medium

malicious users can DOS the auction functionality

Dec '24

Oku's New Order Types Contract Contest

Oku's New Order Types Contract Contest

332.36 OP • 3 total findings • Sherlock • rudhra1749

#12

high

attacker can drain contract funds by creating->cancelling->modifying orders in Bracket contract

high

Attacker can drain contract funds by creating 2 orders in same block with different Input amounts(1st small amountIn 2nd with larger amountIn

high

attacker can drain StopLimit contract funds through Bracket contract because it gives type(uint256).max allowance to bracket contract for input token in performUpkeep function

Nov '24

Ethos Network Financial Contracts

Ethos Network Financial Contracts

0.38 USDC • 1 total finding • Sherlock • rudhra1749

#33

high

users funds loss and/or transaction reverts due to out of funds in ReputationMarket contract

Jul '24

Munchables

Munchables

116.34 USDC • 2 total findings • Code4rena • rudhra

#31

high

Failure to Update Dirty Flag in transferToUnoccupiedPlot Prevents Reward Accumulation On Valid Plot

high

[H-01] Miscalculation in `_farmPlots` function could lead to a user unable to unstake all NFTs