Trusted by 50+ Web3 Projects Worldwide

Sujith Somraaj

Security Researcher at Spearbit

An industry-leading security researcher with a proven track record. I partner with your team to help secure your codebase through vCISO services and comprehensive security reviews.

superform-logo
superform-logo
superform-logo
protecting industry leaders
50+
Security Reviews
500+
Vulnerabilities
$10B+in value being protected
Security Researcher
Sujith Somraaj - Web3 Security Expert

Sujith’s ability to recognize complex code patterns and deeply understand crosschain protocols has been instrumental in securing $100M+ at Superform over the past few years. Plus he once got me to the airport to catch an international flight with less than an hour to takeoff. That’s commitment, not just to security. Imagine him looking at your codebase.

— Vikram, CEO of Superform

EXPERTISE && EXPERIENCE

Audited leading web3 protocols

logo
logo
logo
logo
logo
logo
logo
logo
logo
logo

Professional Journey

Current roles and responsibilities in the blockchain security landscape

2023 - Present

Security Researcher

Spearbit
Freelance

Conducting comprehensive security audits for leading blockchain protocols (Go, Rust) and smart contracts. Specialized in identifying vulnerabilities across DeFi, Bridge, and Infrastructure.

Visit Spearbit
2023 - Present

Independent Auditor

Li.Fi
Freelance

Providing ongoing security assessments and advisory services for Li.Fi's cross-chain bridge aggregation protocol to ensure secure token transfers across multiple blockchains.

Visit Li.Fi
2025 - Present

CISO

Superform
Part-Time

Leading security strategy for Superform's cross-chain yield marketplace. Responsible for establishing security standards and conducting internal reviews.

Visit Superform
Bug BountyFeb 12, 2024

Discovering a vulnerability in Relay Bridge Solver Signature API

An in-depth analysis of a critical vulnerability found in the Relay Bridge Solver Signature API and the responsible disclosure process.

Bug BountyJan 24, 2024

Discovering a vulnerability in Hyperlane RateLimited ISM

Technical breakdown of a significant security flaw in Hyperlane's RateLimited ISM implementation and how it was fixed.

ResearchDec 18, 2023

Writing Cross-Chain PoC Using Pigeon

A guide on effectively creating proof-of-concept demonstrations for cross-chain vulnerabilities using the Pigeon testing framework.