Skip to content
View SrishtiCode's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report SrishtiCode

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
SrishtiCode/README.md

Srishti Rathi

Web3 Security Researcher | Smart Contract Auditor


About Me

// SPDX-License-Identifier: MIT
pragma solidity ^0.8.0;

/// @title Web3SecurityResearcher
/// @author Srishti Rathi
/// @notice B.Tech. Computer Engineering | J.C. Bose University

contract Web3SecurityResearcher {

    string public name = "Srishti Rathi";
    string public role = "Web3 Security Researcher & Smart Contract Auditor";
    string public education = "B.Tech. Computer Engineering | J.C. Bose University";
    string public currentStatus = "Open to Web3 Security Research & Smart Contract Audit Opportunities";

    string[] public specializations = [
        "Smart Contract Auditing & Exploit Development",
        "DeFi Protocol Security & Economic Attack Research",
        "On-Chain Threat Intelligence & Blockchain Forensics",
        "EVM Internals, Opcodes & Bytecode Analysis",
        "CTF Research — Ethernaut, Damn Vulnerable DeFi, Paradigm"
    ];

    struct Expertise {
        string[] smartContractSecurity;
        string[] auditAndResearchTools;
        string[] onChainIntelligence;
        string[] evmInternals;
        string[] programming;
    }

    function getExpertise() external pure returns (Expertise memory) {
        string[] memory smartContractSecurity = new string[](6);
        smartContractSecurity[0] = "Reentrancy";
        smartContractSecurity[1] = "Access Control Flaws";
        smartContractSecurity[2] = "Delegatecall Abuse";
        smartContractSecurity[3] = "Storage Collisions";
        smartContractSecurity[4] = "Oracle Manipulation";
        smartContractSecurity[5] = "Flash Loan Attacks";

        string[] memory auditAndResearchTools = new string[](6);
        auditAndResearchTools[0] = "Foundry";
        auditAndResearchTools[1] = "Hardhat";
        auditAndResearchTools[2] = "Slither";
        auditAndResearchTools[3] = "Echidna";
        auditAndResearchTools[4] = "Mythril";
        auditAndResearchTools[5] = "Tenderly";

        string[] memory onChainIntelligence = new string[](5);
        onChainIntelligence[0] = "Blockchain Forensics";
        onChainIntelligence[1] = "Wallet Clustering";
        onChainIntelligence[2] = "Fund Tracing";
        onChainIntelligence[3] = "MEV Analysis";
        onChainIntelligence[4] = "Mempool Monitoring";

        string[] memory evmInternals = new string[](6);
        evmInternals[0] = "Opcodes";
        evmInternals[1] = "ABI Encoding";
        evmInternals[2] = "Storage Layout";
        evmInternals[3] = "Bytecode Analysis";
        evmInternals[4] = "Gas Optimization";
        evmInternals[5] = "Proxy Patterns";

        string[] memory programming = new string[](5);
        programming[0] = "Solidity";
        programming[1] = "Python";
        programming[2] = "Bash";
        programming[3] = "JavaScript";
        programming[4] = "Assembly (EVM/x86)";

        return Expertise({
            smartContractSecurity: smartContractSecurity,
            auditAndResearchTools: auditAndResearchTools,
            onChainIntelligence: onChainIntelligence,
            evmInternals: evmInternals,
            programming: programming
        });
    }
}

Smart India Hackathon Winner | Top 1% TryHackMe | Active Bug Bounty Hunter | Web3 CTF Competitor


Professional Experience

Independent Web3 Security Researcher

July 2025 – Present

Smart Contract Auditing & Exploit Research:
  - Manual and automated auditing of DeFi protocols and ERC standards
  - Exploit development for reentrancy, access control, and storage collision bugs
  - Delegatecall abuse, proxy pattern vulnerabilities, and upgrade mechanism flaws
  - Flash loan attack simulations and economic attack modeling
  - Responsible disclosure to Web3 projects and bug bounty platforms (Immunefi, Code4rena)

CTF & Competitive Research:
  - Ethernaut CTF — all levels solved using Foundry with documented exploit scripts
  - Damn Vulnerable DeFi — DeFi-specific attack research (flash loans, oracle manipulation)
  - Paradigm CTF — EVM-level exploit and cryptographic challenge research
  - Write-ups covering vulnerability breakdowns from first principles

Technical Arsenal

Smart Contract Security & Auditing

Solidity Foundry Hardhat Slither Echidna

EVM & Bytecode Analysis

EVM Mythril Tenderly Etherscan

On-Chain Intelligence & Forensics

Dune Chainalysis Python Web3.py

Programming & Scripting

Solidity Python JavaScript Bash

Platforms & Frameworks

Linux Docker Git Ethereum


Certifications & Achievements

TryHackMe

Top 1% Globally Jr. Penetration Tester

SIH Winner

Smart India Hackathon Government Recognition

Cisco Certified

Junior Cybersecurity Analyst Networking Basics

Bug Bounty

Active Researcher Immunefi & Code4rena


Core Competencies

Smart Contract Security EVM & Protocol Research On-Chain Intelligence
Web App VAPT Opcode-Level Debugging Blockchain Forensics
Smart Contract Auditing Bytecode & ABI Analysis Fund Tracing & Attribution
DeFi Exploit Research Proxy & Upgrade Patterns MEV Pattern Analysis
Reentrancy & Access Control Storage Layout Analysis Wallet Clustering
Flash Loan Attack Modeling Gas Optimization Review Exploit TX Monitoring
Responsible Disclosure Fuzzing & Formal Verification Threat Actor Profiling (On-Chain)

Pinned Loading

  1. Threat-intel-platform Threat-intel-platform Public

    Threat Intelligence Platform is a Python-based project aimed at automating the collection, correlation, and visualization of cyber threat data from various open sources (OSINT). It’s designed to he…

    Python 1

  2. Vulnerability-Scanner Vulnerability-Scanner Public

    Vulnerability Scanner is a Bash-based automated reconnaissance and vulnerability scanning tool designed for penetration testers and cybersecurity professionals. It allows users to perform fast and …

    Shell 1

  3. Threat-Detection Threat-Detection Public

    Threat Detection is a real-time AI-powered system that detects harmful weapons like guns and knives using the YOLOv5 object detection model. Designed to enhance public and private security, the sys…

    Jupyter Notebook

  4. Sign-Language-Project Sign-Language-Project Public

    It is a project made in python using Google mediapipe library. It can recognize the pose you are making up with your hand.

    Python 2

  5. SrishtiCode.github.io SrishtiCode.github.io Public

    My portforlio website.

    HTML

  6. Tryhackme Tryhackme Public

    Master cybersecurity skills with this TryHackMe free path, includes a collection of my write-ups, solutions and progress tracking.