Skip to content
View z0ls3c's full-sized avatar

Block or report z0ls3c

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
z0ls3c/README.md

πŸ‘‹πŸΎ Hey, I'm Z! Web3 Security Researcher & Smart Contract Auditor

Solidity Foundry Code4rena Sherlock Etherscan Security%20Research


Aspiring smart contract auditor building DeFi security expertise through deep protocol analysis. Focused on EVM security, Solidity analysis, and precision math. 2 valid High findings on Code4rena. Currently: Day 21/90 of intensive audit preparation


⚑ Highlights

  • 🧩 2 High-Severity Valid Findings (Rewarded) - Code4rena (Forte Float128)
  • 🧱 1 Valid Finding - Sherlock (Crestal Network, duplicate)
  • ❌ 1 Invalid / Intended Behavior Report - documented for learning transparency
  • πŸ§ͺ Foundry-based test + PoC workflow
  • 🧰 Tools: Foundry Β· Slither Β· Aderyn Β· Anvil Β· Echidna Β· Remix Β· Etherscan

🎯 Current Focus (May 2026)

Protocol Deep-Dives: Building security pattern recognition through line-by-line analysis

  • βœ… Uniswap V2 (AMM mechanics, K invariant, reentrancy patterns)
  • πŸ”„ Aave V3 (lending, liquidations, health factors)
  • πŸ“‹ Next: Compound, Curve, Lido

Contest Strategy: Selective participation when protocols align with studied patterns

πŸ“Š Progress: Day 21/90 of intensive preparation


πŸ”¬ Featured Work

Uniswap V2 Security Analysis

Deep-dive into swap(), mint(), burn() with security pattern analysis and architecture diagrams.

Key insights:

  • Lock modifier prevents reentrancy across all state changes
  • Balance-based calculations prevent spoofing attacks
  • MINIMUM_LIQUIDITY burn prevents donation attacks
  • $\Large {k}$ invariant ensures pool integrity

Read Full Analysis β†’

Published: Twitter Thread | 790-line analysis


πŸ“‚ Audit Portfolio

Finding Platform Severity Status Link
Float128::toPackedFloat Fails to Promote to L Size When Exponent Is Critically Low Code4rena – Forte High βœ… Valid (Rewarded) View Report
Ln::ln() Fails to Validate Negative Inputs, Causing Division-by-Zero Panics Code4rena – Forte High βœ… Valid (Rewarded) View Report
Unauthorized Token Transfer via Insufficient Access Control Sherlock – Crestal Network Medium ⚠️ Valid (No Reward) View Report
Reward Manipulation in Referral Logic Code4rena – Nudge – ❌ Invalid (Intended Behavior) View Report

πŸ‘‰ See full portfolio: z0L-audits


🧠 Audit Workflow

  1. Recon & Architecture Mapping: Identify trust boundaries and actor roles
  2. Static Review: Analyze state transitions and access modifiers
  3. Dynamic Testing: Foundry fuzz + invariant testing, mainnet forks
  4. Exploit Simulation: Model realistic attack paths
  5. Impact Analysis: Evaluate severity, risk exposure, and cascading effects
  6. Reporting: Clear PoC, rationale, mitigation, and lessons learned

🧰 Tech Stack

Domain Tools / Frameworks
Security & Auditing Foundry Β· Slither Β· Aderyn Β· Anvil Β· Echidna
Languages Solidity Β· TypeScript
Analysis Etherscan Β· Tenderly Β· Remix
Documentation Markdown Β· Obsidian

πŸ—ΊοΈ Protocol Study Roadmap

Building audit expertise through systematic protocol analysis:

Tier 1: Core DeFi Primitives (May - Oct 2026)

  1. βœ… Uniswap V2 (Constant Product AMM)
  2. πŸ”„ Aave V3 (Lending & Liquidations)
  3. Compound V2 (Simpler Lending - Comparison Study)
  4. MakerDAO (CDP Mechanics & Oracles)
  5. Curve (StableSwap Invariant)
  6. Lido (Liquid Staking)

Tier 2: Advanced Patterns (2027)

  • Uniswap V3/V4 (Concentrated Liquidity & Hooks)
  • GMX V2 (Perpetuals)
  • Synthetix (Derivatives)

Each deep-dive includes: architecture diagrams, security pattern analysis, attack vectors, and Foundry PoCs.


πŸ“ˆ Goals for 2026

By July 2026:

  • βœ… Deep-dive 6 core DeFi protocols (Uniswap, Aave, Compound, Maker, Curve, Lido)
  • βœ… Participate in 5+ high-quality audit contests (selective focus)
  • βœ… Study 3+ major DeFi exploits with working PoCs
  • βœ… Active Twitter presence sharing learnings

By December 2026:

  • 🎯 Land junior auditor role or apprenticeship
  • 🎯 Published technical write-ups on AMM & lending security
  • 🎯 Contribute to open-source audit tooling

🧩 Philosophy

β€œPrecision is security.”
β€” z0L

I believe secure code is the byproduct of clarity, not just caution.
Every function should explain why it’s safe, not just assume it.


πŸ“¬ Connect


πŸ›‘οΈ Always learning. Always breaking (ethically). Always improving.

Pinned Loading

  1. z0l-audits z0l-audits Public

    Portfolio showcasing my smart contract security audits, identifying vulnerabilities and offering mitigation strategies.

    1

  2. z0ls3c z0ls3c Public

    Smart contract auditor breaking down DeFi protocols. Building security pattern recognition through deep-dives and contest grinding.

  3. uniswap-v2-security-analysis uniswap-v2-security-analysis Public

    Line-by-line security analysis of Uniswap V2 core contracts. Covers AMM invariants, reentrancy patterns, LP token mechanics, flash swaps, and weird ERC20 handling. Written for auditors and security…