Portfolio
Compiled below is collection of my most interesting and notable publicly shareable findings identified during engagements as a Lead Security Researcher for Cyfrin:
The Standard Auto Redemption
Hypervisor collateral redemption can cause vaults to become undercollateralized due to slippage.
Vaults can be made erroneously liquidatable due to incorrect swap path.
AutoRedemption::fulfillRequestshould never be allowed to revert.USDsredemption calculation can be manipulated due to unsafe signed-unsigned cast.Automation and redemption could be artificially manipulated due to use of instantaneous
sqrtPriceX96.
BENQI Ignite
Ignite fee is not returned for pre-validated
QIstakes in the event of registration failure.Redemption of failed registration fees and pre-validated QI is not guaranteed to be possible.
Redemption of slashed registrations could result in DoS due to incorrect state update.
The default admin role controls all other roles within
StakingContract.
One World Project
The Standard Smart Vault
USDs self-backing breaks assumptions around economic peg-maintenance incentives.
USD stablecoins are incorrectly assumed to always be at peg.
Chaos Labs Risk Oracle
Solidly V2 Memecore
Wormhole EVM NTT
Beanstalk BIP-39
Beanstalk BIP-38
Beanstalk
Sudoswap v2
Oku Trade
Miscellaneous
I have previously participated in the occasional contest, some interesting findings from which can be found below:
Recapitalisation resulting in fewer than 1000 shares can result in a share price manipulation attack.
Storage collision attack in
delegatecallto target contract.
A full list can be found here. Note that most, if not all, were completed early-on in my journey as a security researcher and/or under significant time constraints.