Smart contract security researcher focused on EVM ecosystems, with 5+ years of fullstack engineering behind me.
My edge: I understand the full web3 stack β frontend, backend, smart contracts, and the integrations between them β where a lot of real-world vulnerabilities actually live.
I audit Solidity smart contracts, reproduce historical DeFi exploits as Foundry PoCs, and participate in public audit contests.
Focus areas:
- Reentrancy, access control, and oracle manipulation
- Signature replay and EIP-712 edge cases
- MEV and front-running attack vectors
- Web2 β Web3 integration vulnerabilities (my differentiator)
Active on:
- HackerOne
- Code4rena Β· Cantina Β· Code Hawks (audit contests)
Security & Smart Contracts
Solidity Foundry EVM Ethers.js
Fullstack (day job)
TypeScript React React Native Next.js Node.js Express
Infra
AWS Docker PostgreSQL MongoDB Redis
(Coming soon β currently publishing CTF solutions and exploit reproductions.)
- ctf-writeups β Ethernaut, Damn Vulnerable DeFi, and other CTF solutions
- hack-analyses β Foundry PoCs reproducing historical DeFi exploits
Open to: smart contract audits, bug bounty collaborations, and web3 security research engagements.
Day job: Senior Fullstack Developer β not looking to change that, but happy to chat about independent security work.



