grandchildrice's picture
Update defi @ 2026-05-08T04:25:45Z
aacc2c0 verified
metadata
language:
  - en
license: mit
pretty_name: SPECA Vulnerability Reports
tags:
  - security
  - smart-contracts
  - vulnerabilities
  - audit

SPECA Vulnerability Reports

A normalized corpus of public smart-contract audit findings, curated by the SPECA project. Each row is one expert-judged audit issue, deduplicated across public competitive-audit platforms.

The dataset is split into one config per security domain (defi, lending, oracle, …). HuggingFace auto-detects each <domain>/ folder as a config; pick the domain you want at load time.

Loading

from datasets import load_dataset

# A specific domain (recommended).
ds = load_dataset("NyxFoundation/vulnerability-reports", "defi", split="train")

# Or, from inside the SPECA repo:
from scripts.datasets.load import load_findings
df = load_findings(domain="defi").to_pandas()

Schema

Field Type Description
id string Stable key, <platform>:<contest-slug>:<issue_id>.
source_platform string One of code4rena, sherlock, codehawks.
contest string Slugified contest identifier.
issue_id string Platform-local issue / finding id, #-stripped.
severity string High / Medium / Low / Info.
title string Verbatim issue title from the upstream platform.
description string Verbatim issue body.
source_url string Best-effort upstream link (deterministic for code4rena; may be empty for others — check the scraper output if you need a guaranteed URL).
domain string Matches the config name (defi, lending, …).
scraped_at string ISO 8601 UTC timestamp of the underlying scrape that produced this row.

Per-build state for each domain — row count, scrape time, source CSVs, speca_commit — lives in <domain>/manifest.json rather than this card, so re-publishing one domain doesn't churn another's metadata.

Provenance

All findings originate from public competitive-audit platforms:

  • Code4rena — contest reports published openly on GitHub under the code-423n4 org.
  • Sherlock — contest reports published via Sherlock's public site and their sherlock-audit GitHub org.
  • CodeHawks — contest reports published on the CodeHawks platform.

This dataset redistributes the publicly accessible finding metadata (title, description, severity, source URL). The source_url column points back to the upstream record. If you are the original author of a finding and want it removed, please open an issue on the SPECA repository.

How this dataset is built

The build pipeline lives in scripts/datasets/ of the SPECA repo:

  1. scripts/scrape_*.py pulls raw data from each platform into CSVs under benchmarks/data/defi_audit_reports/.
  2. scripts/datasets/build_derived.py normalizes those CSVs (and the curated csv/similar_audit_findings.csv) into the schema above and emits a parquet + manifest under dist/datasets/<domain>/.
  3. scripts/datasets/publish_hf.py pushes the parquet plus this README to NyxFoundation/vulnerability-reports on the main branch, scoped to the published domain's folder.

The .github/workflows/datasets-publish.yml workflow runs the last two steps on a self-hosted runner via workflow_dispatch.

License

The schema, build code, and dataset card are MIT-licensed. Original finding text is reproduced for research / educational use under the public terms of each upstream platform; consult the source URL for the authoritative version.