prompt
listlengths
2
2
source
stringclasses
3 values
severity
stringclasses
5 values
category
stringclasses
186 values
has_code
bool
2 classes
has_poc
bool
2 classes
reference_response
stringlengths
23
5k
firm
stringclasses
26 values
quality_score
float64
0
5
protocol
stringclasses
398 values
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
low
other
false
false
## Low: Cache storage reads in `FundFlowController::performUpkeep` ### Description `FundFlowController::performUpkeep` contains a lot of repetitive reads of storage variables like: `curUnbondedVaultGroup`, `unbondingPeriod`, `claimPeriod`, `timeOfLastUpdateByGroup[curUnbondedVaultGroup]` and `timeOfLastUpdateByGroup[...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Owner Can Only Sweep Tracked Assets From Risk Fund ### Description The risk fund's [sweep](https://github.com/VenusProtocol/protocol-reserve/blob/ca8f8ba3dfcf6f13d2db4ac230ac9337950525f6/contracts/ProtocolReserve/RiskFundV2.sol#L114) function only allows the owner to transfer funds that have been [deposited by...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
front-running
false
false
## Medium: Courier can be cheated to avoid fees ### Description Source: https://github.com/sherlock-audit/2023-10-aloe-judging/issues/61 ## Found by roguereddwarf, rvierdiiev User can avoid paying fees to courier by providing his address. ## Vulnerability Detail Courier is the entity that will get some percentage o...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
true
false
## High: `_splitWithdrawRequest` will make invalid withdraw requests in an edge case ### Description When an account is deleveraged, _splitWithdrawRequest is called so that pending withdraw requests of the account that is being liquidated are split between them and the liquidator. However when the account is being ful...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
medium
oracle-manipulation
true
true
## Medium: Incorrect haircut asset value conversion in `STBL_PT1_Issuer::generateMetaData` ### Description `STBL_PT1_Issuer::generateMetaData` (and its `STBL_LT1_Issuer` counterpart) uses the wrong oracle conversion function when calculating `haircutAmountAssetValue`, resulting in mathematically incorrect values being...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: Deleverage will revert for markets in closed hours ### Description The deleveraging safety mechanism is designed to automatically close positions in a specific order, prioritising the most profitable positions first. However, if a position is opened in a market that is currently closed, the deleveraging flo...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
storage
false
false
## Medium: Memory Corruption on Load From Storage ### Description In the `Storage` library, the [`load` function](https://github.com/latticexyz/mud/blob/12a9eb1afb18a7f7cb43d774cabb2d5af7c74e6b/packages/store/src/Storage.sol#L183) can load data from a storage location into a memory pointer location. The loaded data ca...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
overflow
true
false
## Medium: Insufficient intermediate value precision in StableSwap calculations ### Description The `calculate_stableswap_y` function uses `Uint256` for intermediate calculations which can cause arithmetic overflow errors when dealing with large token amounts, especially for tokens with high decimal places (e.g. 18 de...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
access-control
true
false
## Medium: Potential Owner Lockout ### Description ## RemoveGroupUser Instruction `RemoveGroupUser` instruction allows the removal of the group owner from the user list. However, the provided code snippet for `AddGroupUser` does not contain functionality for adding a user with the Owner role. This implies that once t...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
true
false
## Low: handleOp function is redundant [core] ### Description In the `EntryPoint` contract, in addition to the `handleOps` function documented in the [EIP-4337 specification](https://eips.ethereum.org/EIPS/eip-4337), there is also a `handleOp` function that just implements the special case of `handleOps` where there i...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Recommendation: Remove MixinAbstract and fold MixinStakingPoolRewards into MixinFinalizer and MixinStake  Won't Fix ### Description After implementing and `MixinAbstract` serves little utility except as a way to pull functionality from `MixinFinalizer` into `MixinStakingPoolRewards`. The abstract pattern add...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
dos
false
false
## Low: Usage Concerns ### Description **Update** Marked as "Unresolved" by the client, and we believe the client has understood and acknowledged the issue. The client provided the following explanation: > Initially, only Velvett will make this setting. Moreover, the setting value is always planned to be 1. After a s...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Incorrect implementation of ERC165 ### Description The ERC165 standard is implemented incorrectly by `BaseCondition`. It should return `true` for any supported interface. But it also returns `true` for the interface with id `0x8b94fce4`. It's not clear what the interface with such an ID is because the `ICondit...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
true
false
## Low: TRST-L-1 Zero duration time causes divide-by-zero exception ### Description **Description:** linearVestingDuration is used as the total period from start to end of vesting in linear transmutation. It is set in the constructor and is fixed. There is no validation in construction that the variable is not set t...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Inadequate Error Message ### Description Within the `dry_run_deposit` function, the provided deposit transaction is verified to ensure it has not already been confirmed before proceeding with the transaction verification process. If the deposit transaction is found to be already confirmed, the transaction reve...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
solodit_api
high
Initial Deposit
false
false
Source: https://github.com/sherlock-audit/2022-11-buffer-judging/issues/81 ## Found by dipp, gandu, rvierdiiev, Ruhum, hansfriese, cccz, 0x52, ctf\_sec, joestakey ## Summary To calculate the exchange rate for shares in BufferBinaryPool it divides the total supply of shares by the totalTokenXBalance of the vault. T...
Sherlock
3.5
Buffer Finance
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
front-running
true
false
## Low: Games can be completed even after `gameTimeout` ### Description In `Flip` contract, a game can be completed even after `gameTimeout` : After the game timeout period, a losing player can frontrun `completeGame()` and call `cancelGame()` to escape losing their bet amount. Recommendations: Don't allow users t...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Upgrade to solidity 0.8.17 ### Description Solidity 0.8.17 released a bugfix where the optimizer could incorrectly remove storage writes if the code fit a certain pattern (see this security alert). This bug was introduced in 0.8.13. Since Connext is using the legacy code generation pipeline, i.e., compiling wi...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
true
false
## Low: CENTRALIZATION RISK: PRODUCT MANAGER CAN ALTER TOKEN RESERVES INDICATORS ### Description The `LiquidityPool` contract implements the `increaseLiquidity()` and `decreaseLiquidity()` functions. If called by the `Product Manager` (which is a role assigned by the contract owner) they can alter the values reported ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: `StakingVault::claimWithdraw` should revert if `assets` are zero ### Description **Description:** `StakingVault::claimWithdraw` should revert if `assets` are zero. **Syntetika:** Fixed in commit [2fe18df](https://github.com/SyntetikaLabs/monorepo/commit/2fe18df4891810f3daea17777ba7e1d9d7c80d0f). **Cyfrin:** ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Missing slippage protection on withdrawals ### Description _Resolved_ The deposit functions in the deposit pool contract take in a `minElyAssetExpected` value that acts as slippage protection. However, the withdrawal functions do not include such protection: As a result, users can receive unfavorable rates ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
liquidation
false
false
## High: Witch’s buy and payAll functions allow users to buy collateral from vaults not undergoing auctions ### Description The buy and payAll functions in the Witch contract enable users to buy collateral at an auction. However, neither function checks whether there is an active auction for the collateral of a vault....
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
initialization
false
false
## High: [ACKNOWLEDGED] Configuration addresses are not updatable in `FathomProxyWalletOwner` ### Description In the `constructor` of the contract `FathomProxyWalletOwner`, several `address` type variables, such as `bookKeeper`, `positionManager`, `collateralTokenAdapter`, `stablecoinAdapter`, and so on, are initializ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: `signatory` not checked ### Description `signatory` not checked: https://github.com/Gearbox-protocol/gearbox-contracts/blob/0ac33ba87212ce056ac6b6357ad74161d417158a/contracts/tokens/GearToken.sol#L330 ### Recommendation We recommend adding a check that correct `signatory` was recovered.
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
false
false
## Low: Mismatch Between Function Name and String for Access Control ### Description **Update** Marked as "Fixed" by the client. Addressed in: `4626a1032510390627728a998b0aa19e8eaa3682`. **File(s) affected:**`isolated-pools: contracts/Rewards/RewardsDistributor.sol` **Description:** In the `setLastRewardingBlocks()`...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Checking array lengths match is missing ### Description ## Context (No context files were provided by the reviewer) ## Description/Recommendation - OlasMech.sol#L97-L98 - BalanceTrackerBase.sol#L231-L234 ## Valory These functions are called internally or externally from upper-level functions that have done ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: multi-token standard is not used ### Description ERC-1155 is a smart contract interface that can represent and control any number of fungible and non-fungible token types. In this way, the ERC-1155 token can do the same functions as an [ERC-20](https://ethereum.org/en/developers/docs/standards/tokens/erc-20/) ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
high
signature
true
true
## High: `FloodPlain` selector extension does not prevent `IFulfiller::sourceConsideration` callback from being called within pre/post hooks ### Description The `FloodPlain` contracts implement a check in `Hooks::execute` which intends to prevent spoofing by invoking the fulfiller callback during execution of the pre/...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
liquidation
false
false
## Medium: Vault.maxRedeemInternal should always underestimate when user has a controller enabled ### Description In the current implementation of `Vault.maxRedeemInternal`, the function underestimates the amount that the user can redeem/withdraw to zero if the owner has enabled the asset as collateral and has a contr...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
signature
true
false
## Low: Lack of contract existence check on target address ### Description The `signedDataExecution` function lacks validation to ensure that the `target` argument is a contract address and not an externally owned account (EOA). The absence of such a check could lead to potential security issues, particularly when exe...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: VULNERABLE THIRD-PARTY DEPENDENCIES ### Description The scoped repository uses multiple third-party dependencies. Using vulnerable third-party libraries can result in security vulnerabilities in the project that can be exploited by attackers. This can result in data breaches, theft of sensitive information,...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
access-control
true
false
## Medium: Zero-address Permit Signer Disables All Access Controls ### Description When `sonarConfig.permitSigner` is set to `address(0)`, the signature verification is completely bypassed. The only remaining check is `require(signature.length == 0)`, which means anyone can craft their own `PurchasePermitWithAllocatio...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
initialization
false
false
## High: Stars.sol wrong constructor arguments ### Description **Description** "_initialHolders" variable was listed twice. **Recommendation**: change variables to match constructor’s expectation: - address _admin; - address[] memory _initialHolders; - uint256[] memory _premintedAmounts; - uint256 _inflationBasis...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: The `ServiceRejected` status is ignored in the `addEth` and `makeBeaconDeposit` functions of the `PwpOrgUnlimitedEthDepositor` contract ### Description https://github.com/p2p-org/eth-staking-fee-distributor-contracts/blob/30a7ff78e8285f2eae4ae552efb390aa4453a083/contracts/p2pEth2Depositor/P2pOrgUnlimitedEth...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
flash-loan
true
false
## High: Voting Power Snapshot Missing ### Description Voting power is based on current balance, not a snapshot at proposal creation\ ```Solidity function castVote(uint256 proposalId, bool support) external override returns (uint256) { ProposalCore storage proposal = _proposals[proposalId]; if (proposal.startT...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
rounding
true
false
## Low: No sanity check on creating pair for rounding issues ### Description When the liquidity goal is reached, the token creates UniV2 pair and supplies Token + ETH. As you can see, the contract forwards `currentEth`, i.e. expects that it has sufficient balance: Consider adding a sanity check to ensure it will nev...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
false
false
## Low: Ownership Can Be Renounced ### Description **Update** Marked as "Acknowledged" by the client. The client provided the following explanation: > Intentional design choice **File(s) affected:**`Vepoch.sol` **Description:** If the owner renounces their ownership, all ownable contracts will be left without an ow...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
initialization
false
false
## Medium: Revert on swaps involving non-delegated ERC721 pairs through RouterCollection ### Description The current design of the router and factory system for delegated pairs (non-wrapped ERC721 tokens) introduces a significant limitation: 1. **Pair Not Marked as Delegated**: The `delegates` mapping for a pair is o...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
liquidation
true
false
## Low: [10] Adversary can front-run admin's state update and parameter update ### Description Admin has the authorization to update the parameter setting such as fee, epoch length, liquidation auction window, enable / disable the flashAuction, pause the protocol by calling the file function in AstariaRouter.sol, Coll...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
overflow
true
false
## Low: Getter reverts for holders without vesting ### Description The function `getLastVestingScheduleForHolder` reverts if the holder does not have any vesting schedules because it attempts to access an index that is out of bounds. This happens due to the computation `holdersVestingCount[holder] - 1`, which results ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
oracle
true
false
## Low: Setting LTV configs without a configured oracle makes EVKunusable ### Description The `setLTV` function is used to set a new LTV configuration for a new or existing collateral address. However, it isn't checked whether the added collateral has a configured oracle. If collaterals are added without a configured ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
false
false
## High: HARDCODED PRIVATE KEYS STORED ON DISK ### Description During the assessment, we have identified that the Anatha Desktop Wallet leaks private keys for wallets that belong to the Anatha Organization. The private keys in the `[Installation Folder]/resources/app.asar` file. Any attacker who installs the Anatha De...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
cross-chain
false
false
## Medium: Gamer rewards are reduced due to fund pulls before accrual of rewards ### Description During rebalancing, funds can be pulled from yield generating protocols before rewards (reward per DERBY token) were calculated. Gamers may receive reduced rewards even though the allocated funds remained in protocols over...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Stricter Proc-Macro Usage Requirements ### Description ## Procedural Macros and Bug Detection Procedural macros are used throughout the codebase to remove boilerplate code and centralize logic. While this technique is generally useful, it can also make some bugs harder to spot if they occur during the resolut...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
oracle
true
false
## Low: [12] Constant redefined elsewhere ### Description Consider defining in only one contract so that values cannot become out of sync when only one location is updated. A [cheap way](https://medium.com/coinmonks/gas-cost-of-solidity-library-functions-dbe0cedd4678) to store constants in a single location is to cre...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
overflow
true
false
## Gas: LinearDistributor.sol has code that needs to be UNCHECKED in many places ### Description Solidity version 0.8+ comes with implicit overflow and underflow checks on unsigned integers. When an overflow or an underflow isn’t possible (as an example, when a comparison is made before the arithmetic operation), some...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
oracle
false
false
## Low: Validator Exit Status and `valIndex` Not Verified ### Description The `validateExitRequests` function in `SubmitExitRequestHashesUtils` verifies many aspects of an exit request—such as module and node operator ID ranges, public key length, and duplicate keys. However, it does not check whether the validator ha...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
rounding
true
false
## Low: Division by Zero in \_compound() Not Prevented ### Description The `_compound()` function in `SwapManager` performs a division using the `totalColl` parameter without validating that it is non-zero. This introduces a risk of a division by zero error, which would revert the transaction and prevent the function ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: [Fixed] Actions are undefined at the exact time of oToken expiry ### Description The `oToken` contract defines an [expiration time](https://github.com/opynfinance/GammaProtocol/blob/d151621b33134789b29dc78eb89dad2b557b25b9/contracts/Otoken.sol#L35) in which certain operations will no longer be active due to...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Nominees excluded using `excludeNominee()` cannot be added back using `includeNominee()` ### Description In `SecurityCouncilNomineeElectionGovernor`, once nominees are excluded from the election by the nominee vetter using [`excludeNominee()`](https://github.com/ArbitrumFoundation/governance/blob/c18de53820c50...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
false
false
## Low: If OWR is used with rebase tokens and there's a negative rebase, principal can be lost ### Description The `OptimisticWithdrawalRecipient` is deployed with a specific token immutably set on the clone. It is presumed that that token will usually be ETH, but it can also be an ERC20 to account for future integrat...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
other
true
false
## Gas: bidAmount validation can be optimized ### Description For English and `BUY_IT_NOW_WITH_BIDS` auctions, the function `_validateBuyItNowBidAndEnglishAuctionBid()` is called to validate that the bid amount is greater than the last bid as well as the reserve price. ### Recommendation Check against the reserve onl...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
reentrancy
false
false
## Low: The "nonReentrant" modifier should be placed before other modifiers ### Description In order to avoid reentrancy in other modifiers, the `nonReentrant` modifier should be placed before all other modifiers. The behavior was identified in the following instances: `- contracts/core/pools/cachePool/CachePool.sol...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
token
false
false
## Medium: Create public Token Integration Checklist ### Description At first glance, Sets appear to be able to deal with any form of ERC20 tokens, but that might not be true in practice. There exist some tokens that use extension standards or generally don’t follow a standard specification which could potentially cau...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
access-control
false
false
## Medium: Incorrect `updateGlobalExchangeRate` implementation ### Description _Submitted by xYrYuYx_ #### Impact `UpdateGlobalExchangeRate` has incorrect implementation when `totalGlobalShares` is zero. If any user didn't start stake, `totalGlobalShares` is 0, and every stake it will increase. but there is possibil...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: Not enforcing a default strategy for new assets ### Description The [`supportAsset` function](https://github.com/OriginProtocol/origin-dollar/blob/bf4ff28d5944ecc277e66294fd2c702fee5cd58b/contracts/contracts/vault/VaultAdmin.sol#L139) allows the governor to add a new asset to the `VaultCore` contract, but i...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
false
false
## High: Incorrect check for calldata overrun in CALLDATACOPY ### Description The intention of the code is to check `offset + size length $ :LT,JMPC(opCALLDATACOPYX0, opCALLDATACOPYloop) ``` But at this point `A` contains `txCalldataLen + size` and `B` contains `offset`, so it checks `txCalldataLen + size < offset`, ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
rounding
true
false
## Low: Unnecessary complexity in `calculateLiquidityTokenAmountWithoutFee` ### Description **Description:** The `SecuritizeOffRamp::calculateLiquidityTokenAmountWithoutFee` function contains unnecessary complexity through its three-branch conditional logic that handles decimal conversions between asset and liquidity ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
token
true
false
## Medium: Vaults steal rebasing tokens' rewards ### Description _Submitted by IllIllI, also found by horsefacts and smiling_heretic_ Rebasing tokens are tokens that have each holder's `balanceof()` increase over time. Aave aTokens are an example of such tokens. ### Impact If rebasing tokens are used as the vault t...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
true
false
## Low: CENTRALIZATION RISK: PRODUCT MANAGER CAN WITHDRAW ARBITRARY AMOUNTS FROM LIQUIDITY POOLS ### Description The `LiquidityPool` contract implements the external `transfer` function, which allows any account with the `ProductManger` role to withdraw arbitrary amounts of tokens from existing liquidity pools. In cas...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
low
other
true
false
## Low: `UniquenessTests` incorrectly refers to the caller being included in the call identifier computation ### Description `UniquenessTests::test_CallIdIncludesCaller` is implemented based on the assumption that the call identifier will differ when called by two different addresses as the caller is included in the c...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
storage
true
false
## Medium: Lack of checks in the `init` function of `NFTMintSale` and `NFTMintSaleMultiple` contracts ### Description The `init` function in both the `NFTMintSale` and `NFTMintSaleMultiple` contracts currently lacks checks to prevent certain scenarios that can lead to unintended consequences. Firstly, there is no chec...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Optimization: Redundant Checks in depositWithPermit Function ### Description **Severity**: Informational **Status**: Resolved **Location**: Pool.sol **Description**: The current implementation of the depositWithPermit function uses the deposit function, which performs redundant checks that depositWithPerm...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: [09] Function Names don’t match intent ### Description `totalSupply`, `totalSupplyAt`, `supplyAt` in `VotingEscrow.sol` refer to voting power, not locked supply. This causes confusion to developers or auditors onboarding to the codebase.
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
true
false
## Low: Missing supportsInterface functions ### Description According to EIP-165, a contract’s implementation of the `supportsInterface` function should return true for the interfaces that the contract supports. Outside of the dependencies and mocks directories, only one Paraspace contract has a `supportsInterface` fu...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
front-running
true
false
## Medium: Economical games that can be played to gain MEV ### Description *Disclaimer from warden: Developers did an extremely good job writing the protocol, however, these are some aspects that I think are missed in the design stage and can be considered. Look at it as a food for thought in future designs.* ### Imp...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
false
false
## Low: Internal Accounting Mechanism is Incompatible With Tokens That Charge Fees ### Description The vault implementation uses an internal accounting mechanism to keep track of the assets inside the vault and the shares minted during operations such as deposits. However, the same mechanism does not support fee-on-tr...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
cross-chain
true
false
## Medium: User deposit may never be entertained from deposit queue ### Description Due to FILO (first in last out) stack structure, while dequeuing, the first few entries may never be retrieved. These means User deposit may never be entertained from deposit queue if there are too many deposits ### Impact User deposi...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
storage
false
false
## Medium: `depositUnderlying()` Can Result in Temporarily Stuck Funds ### Description **Update** Fixed in commit [4c4ae15](https://github.com/hifi-finance/hifi/commit/4c4ae15) by removing function `HifiProxyTarget.depositUnderlying()`, as suggested. **File(s) affected:**`packages/proxy-target/contracts/HifiProxyTarg...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
cross-chain
false
false
## Low: Signature expiry is not implemented in the protocol ### Description Let's say a user signs a bundle of transactions and expects the relayer to execute it, including a tip for him. Now if the gas price spikes up very quickly it can become not economically viable for the relayer to execute the bundle, so the tra...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
false
false
## Low: Use OpenZeppelin’s SafeERC20 Over Standard ERC20 ### Description The contracts use the ERC20 standard and not the recommended SafeERC20 standard from OpenZeppelin. ### Recommendation The development team has fixed the above issue by using the SafeERC20 library, as per commit `7db0e43`.
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
token
true
false
## High: withdrawRakeback() function will always be failed ### Description **Severity**: Critical **Status**: Resolved **Description** In the withdrawRakeback() function of the Treasury contract, it mints xyro tokens to the users. The current IERC20Mint interface has a mint() function which returns a boolean but th...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
flash-loan
false
false
## Gas: Redundant collateral balance check in `_openLoanMorpho` ### Description **Description:** `RockoFlashRefinance::_openLoanMorpho` contains a redundant check for collateral balance availability. The function verifies that the flash loan contract has sufficient collateral balance, but this check is already perform...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
other
false
false
## Gas: [11] State variables should be cached in stack variables rather than re-reading them from storage (2 instances) ### Description Deployment. Gas Saved: **5 007** Minimum Method Call. Gas Saved: **478** Average Method Call. Gas Saved: **1 117** Maximum Method Call. Gas Saved: **1 423** Overall gas change: **...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: Wormhole server supports TLS 1.0 and 1.1 ### Description TLS 1.0 and 1.1 are not considered to be modern, up-to-date encryption protocols and may facilitate downgrade attacks resulting in the loss of confidentiality. As both TLS 1.0 and 1.1 are deprecated, they should never be made available to users. ### ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
reentrancy
true
false
## Medium: Read-only reentrancy is possible ### Description The agToken might be minted wrongly as rewards due to the reentrancy attack. ### Proof of Concept There are `redeem/swap` logics in the `transmuter` contract and all functions don't have a `nonReentrant` modifier. So the typical reentrancy attack is possib...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
signature
false
false
## Low: Unused variables and event. ### Description **Description** ChainportSideBridge.sol. The contract has unused variables maxLpDrainage Percent, minting Protection Time, erc20ToBep20Address, functionNameToNonce, maintainer WorkInProgress, lastLpDrainageInitTimestamp, totalMinted FromLastDrainageInit, isSignature...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
overflow
true
false
## High: The target weight check does not account for redeem request assets ### Description In the rebalance process, target balances depend not only on the configured target weights but also on the withdraw requests processed within the rebalance epoch. However, when the `_isTargetWeightMet` check is performed within...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
low
other
true
false
## Low: Cache `prize.probability` before first use ### Description In `SpinGame::_fulfillRandomness()`, `prize.probability` is first read in an `if` statement, and then cached immediately afterward: ```solidity if (prize.probability == 0) { continue; } uint64 prizeProbability = prize.probability; ``` This result...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
front-running
false
false
## Medium: DDOS in `BalLiquidityProvider` ### Description _Submitted by QuantumBrief_ DDOS to liquidity providers in BalLiquidityProvider. ### Proof of Concept * bal is equal to the contract’s balance of the asset: [BalLiquidityProvider.sol#L56](https://github.com/code-423n4/2022-05-aura/blob/4989a2077546a5394e365...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
front-running
false
false
## Medium: Fee can be set to 100% before order fulfillment ### Description **Severity** **Impact:** High, as it can mean the order recipient will receive nothing in exchange for his tokens **Likelihood:** Low, as it requires a malicious or compromised admin **Description** The `setFeeRate` method in `PumpV1` curre...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
cross-chain
false
false
## Medium: Attempts to Bridge WETH Using ZkStack_CustomGasToken_Adapter Will Fail ### Description In order to bridge tokens from Ethereum to a ZkStack blockchain using a custom gas token, the [`relayTokens` function](https://github.com/across-protocol/contracts/blob/5a0c67c984d19a3bb843a4cec9bb081734583dd1/contracts/c...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
token
false
false
## Medium: Lp token transfer without lock data transfer ### Description The `LPToken` contract allows LP tokens to be freely transferred between addresses. However, the protocol tracks liquidity lock data in the pool contract using the original depositor's address, not the token itself. When LP tokens are transferred ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Solidity compiler optimizations can be problematic ### Description The Reserve protocol contracts have enabled optional compiler optimizations in Solidity. There have been several optimization bugs with security implications. Moreover, optimizations are actively being developed. Solidity compiler optimizations...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
false
false
## Low: Ownership Can Be Renounced ### Description **Update** Marked as "Fixed" by the client. Addressed in: `ccddee41977586259b277afbba0ab10d59ce38bd`. The client provided the following explanation: > Added a two-step process for transferring ownership of the contract (Ownable2Step). renounceOwnership() is necessary...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
false
false
## Low: Lack of a check for the subject’s stake for reviewSlashProposalParameters ✓ Fixed ### Description In the `SlashingController` contract, the address with the `SLASHING_ARBITER_ROLE` may call the `reviewSlashProposalParameters()` function to adjust the slashing proposal to a new `_subjectId` and `_subjectType`. ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
true
false
## High: Incorrect Lock Removal Logic ### Description ## Remove Lock Record for Investor in Lock Manager The function `remove_lock_record_for_investor` in `lock_manager` is intended to swap the lock record at `lock_index` with the last lock in the investor’s lock list, then reduce the count of locks by one. However, ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: STRANGE CODE BEHAVIOUR ### Description The `updateRewardSpeed` function under `WeightedFarmingPool` does check for `years.length == months.length` which does not comply with the logic of the code on this context. Code Location ------------- ### Recommendation **SOLVED**: The `_years` argument used by the fun...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
front-running
true
false
## Medium: Order cancellation is prone to frontrunning and is dependent on a centralized database ### Description _Submitted by shung, also found by unforgiven_ Order cancellation requires makers to call `cancel()`, inputting the order as a function parameter. This is the only cancellation method, and it can cause tw...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Use Explicit Function Overrides ### Description ## FCNVault Explicit Function Overrides Use explicit function overrides in FCNVault. The use of explicit function overrides may improve the clarity and safety of contracts with inheritance by ensuring a defined implementation. ## List of Overridden Functions - ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
front-running
false
false
## High: Malicious maker could take advantage of partial fills to steal taker’s assets ### Description Orders from the [`OrderMixin`](https://github.com/1inch/limit-order-protocol/blob/4d94eea25e4dac6271bfd703096a5c4a4d899b4a/contracts/OrderMixin.sol) contract have the ability to be partially filled. To support partia...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Vulnerable versions of openzeppelin contracts-upgradeable is used ### Description The protocol's `package.json` currently relies on OpenZeppelin contracts-upgradeable version 4.3.2, which has a known high-severity vulnerability. The vulnerability poses a security risk to the protocol. Despite being out of the ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
overflow
false
false
## Low: Batched calls to activateBoost() can be DOSed ### Description Severity: Low Risk Context: BGT.sol#28 Description: The BGT contract inherits Multicallable.sol so that calls to activateBoost() can be batched together in a single transaction. However, this pattern is susceptible to griefing as a failure to a sing...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
true
false
## Low: `TransferHookState` account is over-allocated by 8 bytes ### Description The PDA is initialised with: but also adds 8 bytes at TransferHookState: Adding another “+ 8” in the #[account(init, …)] line adds a second header, so the account is created with 8 (extra) + 8 (in SIZE) + 673 (fields) = 689 bytes whil...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: _divUp(0, 0) returns 0 instead of reverting ### Description Calling `_divUp(x=0, y=0)` returns `0` whereas Solidity's in-built division would revert with a division-by-zero error. Note that `_divUp` is called with `y` set to an asset precision or the rate. The rate can be zero when coming from a `DSROracleBase...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
access-control
true
false
## Medium: Self-Calls Are Allowed to Execute Functions without a Runtime Validation Function ### Description **Update** The conditions have been changed as recommended. Fixed in `ef789cdb3fae133390d0464b36861fbae6cdd8b8`. **File(s) affected:**`account/UpgradeableModularAccount.sol` **Description:** In numerous insta...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
liquidation
true
false
## Low: Inconsistent Checks On Elevation Group ### Description ## Potential Inconsistencies in Protocol Verification The issue relates to potential inconsistencies in the protocol’s verification of elevation groups, loan-to-value (LTV) ratios, and liquidation threshold values. Elevation groups categorize assets based...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
token
true
false
## High: Wrong decimals in the calculation of liquidity amount during redemption ### Description **Description:** The contract `SecuritizeRedemption` provides a public function `redeem()` so that investors can redeem their asset (DS Token) for liquidity token. (Stable Coin) The parameter `_amount` represents the amoun...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
true
false
## Medium: Jailed validators are able to participate in voting ### Description When voting on an inbound or outbound ballot, the following check is performed: ```go func (k Keeper) VoteOnInboundBallot( ctx sdk.Context, senderChainID int64, receiverChainID int64, coinType coin.CoinType, voter string, ballotIndex...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
true
false
## Medium: BunniZone does not verify amAMM manager properly ### Description BunniZone is responsible for verifying the order fulfillers. It allows the am-AMM manager of the pool to fulfill orders. The issue is that the code doesn't check that currently the am-AMM isn't disabled through pool override or global override...
0