Sujith Somraaj
Security Researcher at Spearbit
An industry-leading security researcher with a proven track record. I partner with your team to help secure your codebase through vCISO services and comprehensive security reviews.

Sujith’s ability to recognize complex code patterns and deeply understand crosschain protocols has been instrumental in securing $100M+ at Superform over the past few years. Plus he once got me to the airport to catch an international flight with less than an hour to takeoff. That’s commitment, not just to security. Imagine him looking at your codebase.
— Vikram, CEO of Superform
EXPERTISE && EXPERIENCE
Audited leading web3 protocols
EXPERTISE && EXPERIENCE
Audited leading web3 protocols


Professional Journey
Current roles and responsibilities in the blockchain security landscape
Conducting comprehensive security audits for leading blockchain protocols (Go, Rust) and smart contracts. Specialized in identifying vulnerabilities across DeFi, Bridge, and Infrastructure.
Visit SpearbitProviding ongoing security assessments and advisory services for Li.Fi's cross-chain bridge aggregation protocol to ensure secure token transfers across multiple blockchains.
Visit Li.FiLeading security strategy for Superform's cross-chain yield marketplace. Responsible for establishing security standards and conducting internal reviews.
Visit SuperformDiscovering a vulnerability in Relay Bridge Solver Signature API
An in-depth analysis of a critical vulnerability found in the Relay Bridge Solver Signature API and the responsible disclosure process.
Discovering a vulnerability in Hyperlane RateLimited ISM
Technical breakdown of a significant security flaw in Hyperlane's RateLimited ISM implementation and how it was fixed.
Writing Cross-Chain PoC Using Pigeon
A guide on effectively creating proof-of-concept demonstrations for cross-chain vulnerabilities using the Pigeon testing framework.
ARTICLE | PUBLISHED | TAG | ACTION |
---|---|---|---|
Discovering a vulnerability in Relay Bridge Solver Signature APIAn in-depth analysis of a critical vulnerability found in the Relay Bridge Solver Signature API and the responsible disclosure process. | Feb 12, 2024 | Bug Bounty | |
Discovering a vulnerability in Hyperlane RateLimited ISMTechnical breakdown of a significant security flaw in Hyperlane's RateLimited ISM implementation and how it was fixed. | Jan 24, 2024 | Bug Bounty | |
Writing Cross-Chain PoC Using PigeonA guide on effectively creating proof-of-concept demonstrations for cross-chain vulnerabilities using the Pigeon testing framework. | Dec 18, 2023 | Research |