Skip to content
View Grrwahrr's full-sized avatar
🐒
🐒
  • Dunn Rocks
  • Western Australia

Organizations

@EpicGames

Block or report Grrwahrr

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
grrwahrr/README.md

Security Audit Portfolio - Highlight Reel

Overview

119 High & Critical Severity Findings across 10+ blockchain ecosystems

Blockchain security analyst with 12 years of experience optimizing systems, identifying vulnerabilities, and securing high-value protocols. Currently as Senior Blockchain Security Analyst, specializing in multi-chain security audits, smart contracts, mobile wallets, and decentralized infrastructure. Expert in threat modeling, formal verification, and performance critical security analysis across Ethereum, Solana, Polkadot, Cosmos, and emerging blockchain platforms.


Professional Background

Senior Blockchain Security Analyst (2022–Present)

  • Audited code across major blockchain platforms including Ethereum, Solana, Polkadot, and Cosmos
  • Identified 119+ critical and high severity vulnerabilities in smart contracts, mobile wallets, and decentralized applications
  • Performed static and dynamic analysis with tools like MythX, Solhint, Truffle, Hardhat, and Foundry
  • Applied formal verification techniques using Certora, K Framework, and CCIP
  • Developed mitigation strategies and security best practices for clients
  • Authored clear, actionable audit reports for technical and non-technical stakeholders
  • Supported post audit remediation and integrated on-chain monitoring for proactive issue detection

Previous Experience

Developer, later Blockchain Developer and Auditor (2012–2021)

  • Deep code analysis of blockchain components written in Solidity, Vyper, Rust, Move, Go, Lua, Python
  • Developed performance-critical systems including search prediction microservices
  • Built smart contracts and blockchain-integrated solutions
  • Led full-stack development for e-commerce platforms (PHP, MySQL, JavaScript, Laravel)
  • Backend API development and integration for eBay, Google Shopping, and Adwords

University of Halle - Full Stack Developer (2008–2012)

  • Developed specialized database for text references and CMS using Java servlets and MySQL

Education

  • Free University of Berlin (2006–2009) - Computer Science
  • Humboldt University of Berlin (2005–2006) - Computer Science

Core Competencies

Security Analysis

  • Threat Modeling: Comprehensive attack surface analysis and trusted component evaluation
  • Static Analysis: MythX, Solhint, Securify, Slither, custom tooling
  • Dynamic Testing: Unit testing, fuzzing, symbolic execution (Hardhat, Foundry, Truffle, Echidna)
  • Formal Verification: Certora, K Framework, CCIP, property-based testing
  • Manual Review: Deep code analysis combining automated tools with expert manual inspection

Programming Languages

Expert: C/C++, Rust, Solidity, JavaScript, PHP, SQL
Proficient: Java, Go, Move, Lua, TypeScript, ASM

Blockchain Platforms

Ethereum, Solana, Polkadot, Cosmos, Terra, Aleo, Ripple, Arweave, Concordium, Substrate

Tools & Infrastructure

  • Security: MythX, Slither, Mythril, Echidna, IDA, Certora
  • Development: Hardhat, Foundry, Truffle, Anchor, Git
  • Infrastructure: Docker, Kubernetes, Linux server administration
  • Databases: MySQL, PostgreSQL, Elasticsearch, MongoDB
  • Performance: Multi-threading, GPU/FPGA acceleration, database tuning

Statistics

  • Total Findings: > 950
  • High & Critical severity Issues: 119
  • Ecosystems Covered: 10+ (Solana, Ethereum, Terra, Cosmos, Aleo, Ripple, Polkadot, Arweave, Concordium, Multichain)
  • Languages: Solidity, Rust, CosmWasm, Move, Substrate, TypeScript

Ecosystem Breakdown

  • Solana Programs
  • Ethereum/EVM
  • Terra/CosmWasm
  • Multichain/Bridge
  • Ripple/XRPL
  • Polkadot/Substrate
  • Cosmos SDK
  • Aleo
  • Arweave
  • Concordium

Projects By Ecosystem

Solana (32 projects)

  • Spree v2
  • Spree Points
  • Spree Branded Points
  • Holaplex Hub NFTs
  • Holaplex Hub Permissions
  • Holaplex Hub Treasuries
  • Streamflow Finance Distributor
  • Streamflow Finance
  • Realtime Dashboard Gov Contract
  • Solana Foundation Governance
  • Saage Ted Staking
  • Banger
  • Melee Solana Programs
  • Melee Traditional Markets
  • Amulet
  • pStake
  • 1intro Program
  • 4cast Programs
  • Ding Ding xPlace Contracts
  • Friktion Labs Volt
  • MarginFi
  • Pegax Program
  • PsyOptions Tokenized Euros
  • Solairdrop
  • Super Exchange
  • Voltr Vault Program

Ethereum/EVM (13 projects)

  • xDFI
  • Gusher
  • NatGold
  • Spree Points EVM
  • Bio Launchpad Agent EVM
  • Streamflow EVM Module
  • 5ire Substrate
  • Applied Blockchain Keo Rails
  • Applied Blockchain Silent Data DeFi Core
  • Applied Blockchain Silent Data DeFi App
  • InsurAce CCMS Smart Contracts
  • InsurAce Tokenomics
  • Theoriq Smart Contracts
  • Theoriq Oracle

Terra/CosmWasm (5 projects)

  • Angel Protocol
  • Anchor Protocol
  • TFL Alliance Contracts
  • TFL Enterprise Contracts
  • TFL Warp Contracts

Multichain/Bridges (11 projects)

  • Ondo Finance
  • Endless Bridge Contract
  • Axelar Amplifier
  • Axelar Solana Contracts
  • Axelar Stacks Amplifier
  • Flare Data Availability
  • Flare to8 Coreth
  • Flare Songbird Go-Flare
  • Levana
  • Levana Governance

Ripple/XRPL (3 projects)

  • Ripple
  • Xahau
  • Evernode Hook

Polkadot/Substrate (3 projects)

  • Bitgreen Node
  • Bitgreen Payment Gateway

Cosmos (4 projects)

  • BurnDAO CosmoBurn
  • Saage Kolme
  • Saage Six Sigma Kolme
  • Saage Six Sigma v2

Aleo (1 project)

  • SnarkVM

Arweave (4 projects)

  • AR.IO Network
  • Outcome Protocol
  • AR.IO ANT Process
  • VAOT

Avalanche (1 project)

  • AvalancheGo

Massa (1 project)

  • Umbrella Network Phoenix

Wallets (6 projects)

  • Aureus OX Venmo Foundry
  • Aureus OX iOS
  • XDEFI Chains
  • XDEFI Ctrl Extension
  • XDEFI Ctrl Mobile
  • Censo Wallet Integration 2

Identity/DID (2 projects)

  • DID BNB
  • Gateway Protocol EVM

Other (4 projects)

  • RAAC Core
  • ICHI Algebra Vaults
  • ICHI Ramses Vaults
  • Cosmic Xahau

Featured Critical Findings

1. Complete Fund Theft via Integer Underflow

Project: redacted (Ethereum)
Severity: Critical
Impact: Total loss of all contract funds

Discovered that negative withdrawal amounts were accepted and cast to uint256, allowing attackers to increment their balance while draining the entire contract. The vulnerability combined type confusion with missing input validation.

Key Insight: Type system misuse combined with arithmetic operations can create catastrophic vulnerabilities.


2. Privilege Escalation to SUDO Oracle

Project: redacted (Substrate/Rust)
Severity: Critical
Impact: Complete protocol compromise

Identified logic flaw allowing any user to add themselves as a sudo oracle by exploiting the origin resolution mechanism. This granted attackers the ability to manipulate ESG scores and control critical protocol parameters.

Key Insight: Origin validation must be explicit and cannot rely on implicit assumptions about caller identity.


3. Cryptographic Mode Tampering in Zero-Knowledge Proofs

Project: redacted (Aleo)
Severity: High
Impact: Signature forgery and message tampering

Discovered that circuit signature verification accepted signatures with different modes (Public/Private/Constant) for the same message, allowing attackers to tamper with privacy guarantees and potentially forge signatures.

Key Insight: Zero-knowledge circuit implementations must enforce strict mode consistency across cryptographic operations.


4. Signer List Validation Bypass

Project: redacted (Ripple/C++)
Severity: High
Impact: Multi-signature bypass

Found inverted logic in import transaction validation that skipped signer list comparison when both inner and outer transactions had signers present, allowing unauthorized transaction imports.

Key Insight: Boolean logic errors in security-critical paths can completely negate protection mechanisms.


Vulnerability Categories

Access Control & Authorization (25+ findings)

  • Missing permission checks on privileged functions
  • Broken authentication in multi-signature schemes
  • Privilege escalation through logic flaws
  • Unprotected admin functions

Example: Anyone could withdraw other users' funds due to missing msg.sender validation in withdrawal function.


Integer Arithmetic & Type Safety (15+ findings)

  • Integer overflow/underflow vulnerabilities
  • Type confusion attacks (int256 → uint256)
  • Saturating arithmetic misuse
  • Precision loss in financial calculations

Example: Negative withdrawal amounts exploited to drain contracts through type casting.


Reentrancy & Race Conditions (12+ findings)

  • Classic reentrancy in ERC-4626 vaults
  • Cross-function reentrancy
  • Front-running vulnerabilities
  • MEV exploitation vectors

Example: Unchecked return values combined with missing reentrancy guards in DeFi protocols.


Cryptographic & Signature Issues (8+ findings)

  • Signature replay attacks
  • Missing nonce validation
  • Weak randomness sources
  • Mode tampering in ZK circuits

Example: No replay protection on cross-chain attestations allowing message reuse.


State Management & Logic Errors (20+ findings)

  • State inconsistency after updates
  • Merkle root replacement breaking claim bitmaps
  • Inverted conditional checks
  • Variable shadowing hiding errors

Example: Replacing Merkle roots after claims created inconsistent state allowing double-claims.


Input Validation & Sanitization (18+ findings)

  • SQL injection in Rust applications
  • Missing bounds checks
  • Unvalidated external calls
  • Deserialization vulnerabilities

Example: Potential SQL injection in Solana indexer due to unsanitized user input.


Cross-Chain & Bridge Security (10+ findings)

  • Message verification bypass
  • Empty signer acceptance
  • Missing replay protection
  • Incorrect attestation validation

Example: Bridge contract accepted empty signer arrays as valid, allowing unauthorized cross-chain messages.


Oracle & Price Feed Issues (8+ findings)

  • Stale price data acceptance
  • Missing staleness checks
  • Hardcoded addresses
  • Unvalidated price feeds

Example: Oracle data used without timestamp validation, allowing stale prices to manipulate protocol.


Technical Depth Examples

Solana/Rust Expertise

  • Anchor framework security: PDA validation, account ownership checks, signer verification
  • CPI vulnerabilities: Cross-program invocation safety, account confusion attacks
  • Rent exemption issues: Account lifecycle management, fund recovery
  • SPL token security: Transfer hooks, mint authority, freeze authority

Notable Finding: Unvalidated SPL vote accounts allowing duplicate supports in governance contracts.


Ethereum/Solidity Expertise

  • ERC-4626 vault security: Share calculation, inflation attacks, withdrawal semantics
  • Upgradeable contracts: Proxy patterns, storage collisions, initialization
  • DeFi composability: Adapter patterns, strategy security, yield aggregation
  • Gas optimization: DoS via gas exhaustion, unbounded loops

Notable Finding: Adapter withdraw semantics mismatch causing double-transfers in yield vaults.


CosmWasm/Terra Expertise

  • IBC security: Channel validation, packet verification, timeout handling
  • Staking derivatives: Reward distribution, unbonding logic, validator selection
  • Template operations: Saturating arithmetic, variable shadowing, error handling
  • Migration safety: State compatibility, version management

Notable Finding: Variable shadowing causing all errors to be silently ignored in alliance contracts.


Substrate/Polkadot Expertise

  • Runtime development: Pallet security, origin validation, weight calculations
  • Extrinsic validation: Signature verification, nonce handling, transaction ordering
  • Storage optimization: Bounded collections, migration patterns
  • Governance security: Council operations, proposal validation

Notable Finding: Binary search on unsorted array causing incorrect validator selection.


Cross-Chain Security Insights

Bridge Protocol Vulnerabilities

  • Analyzed 8 cross-chain bridge implementations
  • Identified message verification bypasses in 3 protocols
  • Found replay attack vectors in attestation systems
  • Discovered signer validation flaws in multi-chain governance

Key Pattern: Cross-chain protocols often fail to validate message uniqueness and signer authenticity across different chain contexts.


Multi-Signature Scheme Analysis

  • Audited 15+ multi-sig implementations across chains
  • Found signer list validation issues in 4 protocols
  • Identified threshold bypass vulnerabilities
  • Discovered signature mode tampering in ZK systems

Key Pattern: Multi-signature schemes frequently have subtle logic errors in signer comparison and threshold validation.


Methodology Highlights

Full Audit Lifecycle Ownership

  • Threat Modeling: Identifying attack surfaces and trusted components in decentralized systems
  • Design Review: Evaluating architecture against best practices and industry standards (EIPs, OpenZeppelin)
  • Code Analysis: Deep manual review combined with automated tooling
  • Vulnerability Assessment: Identifying reentrancy, overflow/underflow, access control flaws, gas inefficiencies
  • Post-Deployment Validation: On-chain monitoring and remediation support

Static Analysis

  • Custom tooling for pattern detection across multiple languages
  • Automated vulnerability scanning with MythX, Solhint, Securify, Slither
  • Code flow analysis for complex state transitions
  • Manual verification of automated findings

Dynamic Testing

  • Proof-of-concept exploit development
  • Fuzzing critical functions with Echidna
  • Integration testing for cross-contract interactions
  • Unit testing with Hardhat, Foundry, Truffle

Formal Verification

  • Property-based testing for invariant validation
  • Symbolic execution for path exploration with Certora
  • Manual mathematical proofs for critical algorithms
  • K Framework and CCIP for formal specification

Impact & Remediation

Prevented Losses

Identified vulnerabilities that could have resulted in:

  • Complete fund theft from multiple protocols
  • Privilege escalation in governance systems
  • Cross-chain bridge exploits
  • Oracle manipulation attacks

Project Types Audited

DeFi Protocols

  • ERC-4626 yield vaults
  • Lending/borrowing platforms
  • Staking derivatives
  • Liquidity pools

Infrastructure

  • Cross-chain bridges
  • Oracle networks
  • Governance systems
  • Payment gateways

NFT & Gaming

  • NFT marketplaces
  • Gaming economies
  • Rarity systems
  • Metadata management

Wallets & Custody

  • Multi-signature wallets
  • Custody solutions
  • Key management systems

Languages & Frameworks

Expert Level:

  • C++ (XRPL, Bitcoin Core, performance-critical systems)
  • Rust (Anchor, CosmWasm, Substrate, Solana programs)
  • Solidity (EVM, Foundry, Hardhat, Truffle)
  • JavaScript/TypeScript (Node.js, Web3, full-stack)
  • PHP (Laravel, e-commerce, backend APIs)
  • SQL (MySQL, PostgreSQL, database optimization)

Proficient:

  • Java (Servlets, enterprise applications)
  • Go (Cosmos SDK, blockchain infrastructure)
  • Move (Aptos/Sui)
  • Lua (Smart contracts)
  • ASM (Low-level optimization)

Security Tools:

  • MythX, Slither, Mythril, Echidna (Solidity)
  • Solhint, Securify (Static analysis)
  • IDA (Reverse engineering)
  • Certora, K Framework, CCIP (Formal verification)
  • Anchor, Solana CLI (Solana)
  • Foundry, Hardhat, Truffle (Ethereum)

Infrastructure:

  • Docker, Kubernetes
  • Linux server administration & DevOps
  • Git, CI/CD pipelines
  • Elasticsearch, MongoDB
  • Multi-threading, GPU/FPGA acceleration

Contact & Collaboration

Current Role: Senior Blockchain Security Analyst

Open to:

  • Smart contract security audits
  • Protocol design reviews
  • Security consulting
  • Bug bounty programs
  • Research collaboration

Specializations:

  • Multi-chain protocol security
  • DeFi composability risks
  • Cross-chain bridge security
  • Zero-knowledge proof systems
  • Formal verification
  • Mobile wallet security
  • Performance-critical security analysis

Languages: English (Fluent), German (Native)


This portfolio represents a selection of publicly disclosed findings from 5 years of blockchain security work. Additional private audit work and references available upon request.

Popular repositories Loading

  1. avtomat_dos avtomat_dos Public

    A simple to use dos tool to support Ukraine 🇺🇦

    Rust 9 1

  2. sesame_web sesame_web Public

    TypeScript 1

  3. sesame sesame Public

    Rust 1

  4. sesame_api sesame_api Public

    JavaScript 1

  5. sesame_aleo sesame_aleo Public

    Shell 1

  6. degen-adventures degen-adventures Public

    1 1