Security Researcher
Blockchain Security Researcher | Solidity & Rust | EVM & Solana & Near Expertise
High
Total
Medium
Total
Total Earnings
#869 All Time
Payouts
3rd Places
Top 10
Top 25
All
Sherlock
Code4rena
CodeHawks
Oct '24
Feb '24
high
Malicious user can stake an amount which causes zero curStakeAtRisk on a loss but equal rewardPoints to a fair user on a win
medium
NFTs can be transferred even if StakeAtRisk remains, so the user's win cannot be recorded on the chain due to underflow, and can recover past losses that can't be recovered(steal protocol's token)
Jan '24
high
Attack to make ````CurveSubject```` to be a ````HoneyPot````
high
Unrestricted claiming of fees due to missing balance updates in `FeeSplitter`
medium
onBalanceChange causes previously unclaimed rewards to be cleared
medium
Curves::_buyCurvesToken(), Excess of Eth received is not refunded back to the user.
Sep '23
Aug '23
high
The settle feature will be broken if attacker arbitrarily transfer collateral tokens to the PerpetualAtlanticVaultLP
high
The peg stability module can be compromised by forcing lowerDepeg to revert.
high
Users can get immediate profit when deposit and redeem in `PerpetualAtlanticVaultLP`
medium
Inaccurate swap amount calculation in ReLP leads to stuck tokens and lost liquidity
medium
reLP() mintokenAAmount the calculations are wrong.
high
The same signature can be used in different `distribution` implementation causing that the caller who owns the signature, can distribute on unauthorized implementations
low
If a winner is blacklisted on any of the tokens they can't receive their funds
low
Owner can incorrectly pull funds from contests not yet expired
low
Precision loss/Rounding to Zero in `_distribute()`
Jul '23
high
Tokens with less than 18 decimals allow for draining of funds
high
Borrower can use Refinance to cancel auctions so they can extend their loan indefinitely
high
During refinance() new Pool balance debt is subtracted twice
high
[H-04] Lender#buyLoan - Malicious user could take over a loan for free without having a pool because of wrong access control
high
Stealing any loan opening for auction through others' lending pool
high
Attacker can steal a loan's collateral and break the protocol
high
Rewards can be sabotaged by large deposit and withdraw
high
`Lender` does not handle correctly rebasing, inflationary, deflationary tokens and tokens with fee on transfer
high
Forcing a borrower to pay a huge debt via the giveLoan()
high
Lender can Sandwich a borrower to seize his collateral
high
WETH staking rewards accumulated before the first staker deposits remain unutilized and stuck in the `Staking` contract
medium
The `borrow` and `refinance` functions can be front-run by the pool lender to set high interest rates
low
Lender fails to giveLoan because of inconsistent length between `loadIds` and `poolIds`
low
Griefing Attack via updateFor Function
gas
Multiple accesses of a mapping/array should use a local variable cache.
gas
Unnecessary If condition in update() of Staking.sol
gas
No use of Ownable in Staking contract.
gas
Incorrect Fee Calculation in Seize Function
2.47 USDC • 1 total finding • CodeHawks • ubermensch
#94
May '23
Jan '23
Sep '22