prompt listlengths 2 2 | source stringclasses 3
values | severity stringclasses 5
values | category stringclasses 186
values | has_code bool 2
classes | has_poc bool 2
classes | reference_response stringlengths 23 5k | firm stringclasses 26
values | quality_score float64 0 5 | protocol stringclasses 398
values |
|---|---|---|---|---|---|---|---|---|---|
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | reentrancy | true | false | ## Low: Remove redundant ReentrancyGuardUpgradeable inheritance
### Description
The ReentrancyGuardUpgradeable `nonReentrant` is not used in PhiNFT1155.sol contract. Consider removing the inheritance. | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Shorthand way to write if / else statement
### Description
The normal if / else statement can be refactored in a shorthand way to write it:
1. Increases readability
5. Shortens the overall SLOC.
The above instance can be refactored in:
Other instances: | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | true | false | ## Low: Superfluous ERC20 approval in `aaveBorrow`
### Description
`Treasury.sol#L318-L321`
In the `Treasury` contract's `aaveBorrow` method, the ERC20 allowance is increased for the `AaveV3TreasuryConnector` contract. However, the connector's `borrow` method does not pull tokens from the treasury, but transfers the... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | true | false | ## Low: Lack of Mempool Verification in Deposit and Redemption Processes
### Description
The current implementation of the Atlas protocol lacks proper verification against the appropriate mempool in both the deposit and redemption processes. Specifically:
* During the deposit process, regarding the minting of **atBTC... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | true | false | ## Low: Use Of Custom Errors Instead Of Revert Strings May Help Reduce Gas Usage
### Description
In Solidity smart contract development, replacing hard-coded revert message strings with the `Error()` syntax is an optimization strategy that can significantly reduce gas costs. Hard-coded strings, stored on the blockchai... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | liquidation | true | false | ## Medium: User collateral NFT open auctions would be sold as min price immediately next time user health factor gets below the liquidation threshold, protocol should check health factor and set auctionValidityTime value anytime a valid action happens to user account to invalidate old open auctions
### Description
Att... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | oracle | false | false | ## Medium: Consider alternative price feed + ensure _minLockPeriod > 0 to prevent flash loan attacks
### Description
_Submitted by hickuphh3, also found by 0x1f8b_
It is critical to ensure that `_minLockPeriod > 0` because it is immutable and cannot be changed once set. A zero `minLockPeriod` will allow for flash loa... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | liquidation | true | false | ## High: Maximum slippage shouldn’t be updated for the current batch ✓ Fixed
### Description
When anyone submits a new order, the batch price is updated and it’s checked whether the price slippage is acceptable. The problem is that the maximum slippage can be updated during the batch and traders cannot be sure that pr... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: DsrHyperdriveDataProvider 's _pricePerShare() is missing a 0check
### Description
The `_pricePerShare()` function in `DsrHyperdriveDataProvider` is missing a check for `_totalShares`, which is used as the denominator in the following division:
```solidity
return (totalBase.divDown(_totalShares));
```
This im... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: If token get's unwhitelisted, users will be unable to claim the `plenty` they've accrued prior to the unwhitelist
### Description
Users might lose their `plenty`
### Impact
Loss of funds | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | other | true | false | ## Gas: If's/require() statements that check input arguments should be at the top of the function
### Description
Checks that involve constants should come before checks that involve state variables, function calls, and calculations. By doing these checks first, the function is able to revert before wasting a Gcoldslo... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | storage | true | false | ## Gas: State variable can be packed into fewer storage slots by truncating timestamp
### Description
The EVM works with 32 byte words. Variables less than 32 bytes can be declared next to each other in storage and this will pack the values together into a single 32 byte storage slot (if values combined are `<=` 32 by... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | initialization | true | false | ## Medium: Seeding via Unix epoch generates less entropy than expected
### Description
When a new `CanisterEnv` is created, its internal pseudorandom number generator (PRNG) is seeded twice with the epoch in nanoseconds, a 16-byte value, to meet the 32-byte seed requirement. The current Unix epoch time in nanoseconds ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Failure To Update Estimated Fare
### Description
## Request Ride Implementation Overview
In `request_ride`, after creating a new `Fare` object (`fare`) and adding it to the dynamic storage (`df::add`), `fare::estimate_fare` is called to calculate the estimated fare. However, the `Fare` object stored in the dy... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | false | false | ## Medium: Unhandled Native Asset Provision
### Description
## FCN Functions and Their Status
`fcnSettleVault` and `fcnRepayBond` are currently not marked as payable, which prevents them from handling the provision of native assets. In cases where an FCN product is set up to utilize native Ether as a deposit asset, t... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Inconsistent rebase bound
### Description
When minting OUSD tokens, there will be a rebase if the [amount equals the threshold](https://github.com/OriginProtocol/origin-dollar/blob/bfe0ac8e5d7c05b9bf1021fafb25e0aed8a6ed45/contracts/contracts/vault/VaultCore.sol#L129). However, when [redeeming](https://github.c... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | initialization | true | false | ## Medium: Invalid Ancestor Lookup Leading to Out-of-Bounds Array Access
### Description
When finding an ancestor via the `_findTraceAncestor` function, the code allows specifying the global flag, which limits the ancestor search to the split depth. When `_global` is set to `false`, the function uses the `_pos.traceAn... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | liquidation | true | false | ## Low: Deleting CollateralTypes from the CollateralLiquidationPriority allows traders to be liquidated for free and getting back their full collateral as if they were not liquidated.
### Description
Removing a CollateralType from the CollateralLiquidationPriority causes that accounts can be liquidated for free withou... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: [03] `TestInsertLeaf` has an incorrect assertion
### Description
In `TestInsertLeaf` when 4 nodes are inserted the last assertion is incorrect. It asserts the node with height `1`, `localNodeIndex` `1`, and data `hash34[:]`. It should have been height `0`, `localNodeIndex` `0`, and data `hash1234[:]` instead.
... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | token | true | false | ## Medium: Attacker can DOS `privateMint()`
### Description
Function `privateMint()` calls `permit()` to set the allowance before token transfer:
```solidity
IERC20Permit(address(paymentToken)).permit(permit.owner, address(this), permit.value, permit.deadline, v, r, s);
usdPlusAmount = permit.value;
_issue(pay... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Public Functions Could Be Declared External
### Description
**Severity**: Informational
**Status**: Resolved
**Description**
In Solidity, functions can be declared as public or external. While both visibility specifiers allow functions to be called from outside the contract, external functions are generally... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | front-running | true | false | ## High: Token bound account may not be deployed at the counterfactual address
### Description
Kimap._mint() is supposed to deploy a token-bound account (TBA) at a counterfactual address. However, if this mint transaction is frontrun with another mint transaction, then the TBA is deployed at a different address, break... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | other | false | false | ## Gas: Improve the error being thrown
### Description
This is an informational finding. The error being thrown can add more information to make it clearer.
### Impact
Improving the error being thrown can make things clearer for users or developers. | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Code Refactoring
### Description
## Code Review and Suggestions
## 1. `fstMOVE::rebaseByShareRate`
In `fstMOVE::rebaseByShareRate`, `nextShareRate_` is validated against the last recorded share rate. However, this may not accurately reflect the current state of the share rate, as it is dynamic and updates ove... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | other | true | false | ## Gas: Use calldata instead of memory for function arguments that do not get mutated
### Description
When you specify a data location as `memory`, that value will be copied into memory. When you specify the location as `calldata`, the value will stay static within calldata. If the value is a large, complex type, usin... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | logic | true | false | ## Medium: Incorrect calculations can occur when calling `Position._marketBuy` and `Position._marketSell` functions that do not include maker fee in `_fee`
### Description
When the following `Position._marketBuy` and `Position._marketSell` functions calculate `_fee`, the maker fee is not included.
When the `Position... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | access-control | true | false | ## Medium: Lack of events for critical operations
### Description
Several critical operations do not trigger events. As a result, it will be difficult to review the correct behavior of the contracts once they have been deployed. For example, the `setRelayer` function, which is called in the `MosaicVault` contract to s... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | false | false | ## Medium: min_rate_at_target is given as apr but morpho blue uses it as apy
### Description
Morpho Blue is compounding the interest, see [Morpho.sol#L477](https://example.com/Morpho.sol#L477). The `MIN_RATE_AT_TARGET` specified here is given as a value that would result in a 0.1% APR (annual percentage rate, non-comp... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | oracle | false | false | ## High: Asymmetric liquidity provision to geometric pool can allow attacker to purchase at flat oracle price, irrespective of trade size.
### Description
Asymmetric liquidity provision to geometric pool can allow attacker to purchase at flat oracle price, irrespective of trade size.
### Impact
This allows an attacke... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: Keepers loss gas is never accounted
### Description
When keepers send excess gas, the excess gas is accounted in Diamonds storage so that keeper can compensate itself later. However, losses are never accounted due to math error in calculating it.
### Impact
In a scaled system, these fees will accumulate si... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | front-running | true | false | ## High: Commitment scheme does not prevent frontrunning
### Description
The commitment scheme used in **KinoAccount9CharCommitMinter** is intended to prevent frontrunning, according to the technique outlined by **labelhash**. However, as it is written, it does not require that the commit is strictly older than the cu... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | other | true | false | ## Gas: Using `> 0` costs more gas than `!= 0` when used on a `uint` in a `require()` statement
### Description
This change saves [6 gas](https://aws1.discourse-cdn.com/business6/uploads/zeppelin/original/2X/3/363a367d6d68851f27d2679d10706cd16d788b96.png) per instance
*There is 1 instance of this issue:* | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Deadline is Commented Out in `SwapActions.swapExactInput()`
### Description
The deadline parameter is not used in `SwapActions.swapExactInput` is commented out:
```solidity
ISwapRouter.ExactInputParams memory params = ISwapRouter.ExactInputParams({
path: path,
recipient: address(this),
> // deadline: d... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: Pool owners can prevent withdrawals of specific receipts
### Description
_Submitted by IllIllI_
Pool owners can prevent withdrawals of specific receipts without impacting any other functionality
### Proof of Concept
Reciepts are non-transferrable, so a malicious owner can monitor the blockchain for recei... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: `tokenRate_` and `rateL1Timestamp_` are not checked
### Description
`TokenRateOracle` can be initialized with random data https://github.com/lidofinance/lido-l2-with-steth/blob/792071cdeaf61de927cc144e8c1c02d5f5996a01/contracts/optimism/TokenRateOracle.sol#L79.
### Recommendation
We recommend adding a check t... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | true | false | ## Low: Lack of access control can lead to consistent failed plugin transactions
### Description
The `checkWear` function in the `WearChecker.sol` contract lacks proper access control, allowing any low-privileged user to call the function and manipulate the `dayUsage` state variable. This vulnerability enables an atta... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | other | false | false | ## High: Unpredicted reward amount necessary to pay out in the pool.
### Description
**Severity**: High
**Status**: Resolved
**Description**
Usually the reward distribution system has a fixed amount of reward token which is distributed linearly among participants based on the weight of their stake.
However, the cur... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | rounding | true | false | ## Low: Management fees can be avoided
### Description
If a strategy owner can take out credit, use it to turn a profit, and then repay the debt in the same block, the management fee will be eliminated. The management fee directly depends on two factors: the amount of total debt and the time between the calls to the r... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | front-running | true | false | ## Medium: Withdrawals from IchiVaultSpell have no slippage protection so can be frontrun, stealing all user funds
### Description
When a user withdraws their position through the `IchiVaultSpell`, part of the unwinding process is to trade one of the released tokens for the other, so the borrow can be returned. This t... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | false | false | ## Low: minDelay Set to Zero Undermines Security Council Purpose
### Description
The `Governance` contract is a timelock that allows scheduling operations that make critical changes to the protocol. These scheduled operations can be executed after waiting for a [`minDelay`](https://github.com/matter-labs/era-contracts... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Lack of cancellation mechanism for unfulfilled redemption requests in `OmoVault`
### Description
- The `OmoVault` contract implements an asynchronous redemption process where users create a redemption request to withdraw their deposited assets, these requests are fulfilled later by a whitelisted agent, however... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | front-running | false | false | ## Medium: Extra function
### Description
At lines
https://github.com/lidofinance/lido-dao/blob/801d3e854efb33ff33a59fe51187e187047a6be2/contracts/0.4.24/Lido.sol#L139-L142
and at lines
https://github.com/lidofinance/lido-dao/blob/801d3e854efb33ff33a59fe51187e187047a6be2/contracts/0.4.24/Lido.sol#L158-L165
similar act... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: Freezed Chain will never be unfreeze since `StateTransitionManager::unfreezeChain` is calling `freezeDiamond` instead of `unfreezeDiamond`
### Description
`StateTransitionManager::unfreezeChain` function is meant for unfreeze the freezed chain of passed `_chainId` param. While `freezeChain` function is mean... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | storage | false | false | ## Low: Certain Assumptions Are Made in the `PluginStorageLib` that Could Lead to Issues
### Description
**Update**
The upper bits are now cleared. Fixed in `dec1d76bf1916c32977679ea4161fe28c5fc87ef`.
**Update**
Other 3 suggestions have been acknowledged with the comment: "Zero values are an acceptable thing to incl... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: `getAllTrades` and `getAllTradeInfos` should exit the loop earlier
### Description
`getAllTrades` and `getAllTradeInfos` will loop over all traders and `Trade`/`TradeInfo` to get the array of data, based on the provided `_offset` and `_limit`. However, the loop will continue even when `currentTradeIndex` reach... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: wrong condition checking in price calculation
### Description
_Submitted by CertoraInc_
[LiquidityProviders.sol#L180-L186](https://github.com/code-423n4/2022-03-biconomy/blob/04751283f85c9fc94fb644ff2b489ec339cd9ffc/contracts/hyphen/LiquidityProviders.sol#L180-L186)
The `getTokenPriceInLPShares` function ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | true | false | ## Low: Duplicate Account Initializers
### Description
## Account Initialization Issues with Constraints in Anchor
If an account marked with both `init` and `zero` constraints in Anchor is utilized in multiple locations within a context, and the same account is referenced, it may result in incorrect initialization. S... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Unnecessary storage update.
### Description
**Description**
IndexVaultV1.sol: function removeVault().
During removal of the vault, the storage variable ‘totalWeight’ is being updated, where the
weight of the vault is subtracted from total weight. However, due to restriction in line 93(The
weight of the vault ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | cross-chain | false | false | ## Low: Unused return value from executeTransaction
### Description
The [`executeTransaction`](https://github.com/compound-finance/comet/blob/2eb33b5e8454dba148373b6cb64ede4f7436fad7/contracts/vendor/Timelock.sol#L76) function from the [`Timelock`](https://github.com/compound-finance/comet/blob/2eb33b5e8454dba148373b6... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Withdrawal Rent Exemption Check
### Description
## Thread Withdraw
In `thread_withdraw`, it is recommended to check if the rent exemption is still valid or not, as this function withdraws lamports directly from the thread account.
## RUST
## Remediation
Check if the withdrawal would put the account balance... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: GnosisSafe contract does not fully match known implementation
### Description
Contracts in the [`GnosisSafe.sol` file](https://github.com/AugurProject/augur/blob/67c0fec95e65fca8d27751f28a6c06e5247978c6/packages/augur-core/source/contracts/GnosisSafe.sol) do not entirely match any of the known implementations ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | cross-chain | true | false | ## Low: An Authorized user can remove himself from authorization
### Description
In Authorizable.sol, there is a function `removeAuthorization()` whereby an Authorized user can remove authorization from an authorized account.
There is no check to make sure the authorized user cannot remove himself. If the authorized... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Snapshot Amendments May Lead To Leaf Verification Failures
### Description
The function `verifyLeaves()` may incorrectly return `false` if `rocketNetworkVoting.getVotingPower()` calculates a different `maxStakePercent` between proposal creation and leaf verification. If this occurs, a valid leaf may return `fa... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | true | false | ## Low: Use additional checks for transferFrom()
### Description
Several functions transfer tokens via `transferFrom()` without checking the return code. Some of the contracts are not covering edge cases, like non-standard ERC20 tokens that do not:
- revert on failed transfers.
- Some ERC20 implementations don’t rever... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: Lack of processedTxnHashes[] check in storeUnopenedCommitment()
### Description
A bidder can avoid paying for successful commitments due to a lack of `processedTxnHashes[]` check in `storeUnopenedCommitment()`. In the new implementation of `openCommitment()`, there is a new mapping `processedTxnHashes[]`, w... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | signature | true | false | ## High: Successful transactions are not stored, causing a replay attack on ``redeemDepositsAndInternalBalances``
### Description
in `redeemDepositsAndInternalBalances` there is no validation about the parameters that have been used which should be stored and should not be reused.
As a result, parameters that have al... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: `DIVISIONER` is inconsistent across contracts
### Description
The constant `DIVISIONER` declared in `GovernorBravoDelegateMaia.sol` is 1 ether (1e18), but in `BoostAggregator.sol` it is 10000. In `BranchPort.sol` it's called 1e4.
### Recommendation
Consider using the same `DIVISIONER` name and value to be ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | false | false | ## Medium: Missing Share Index Update
### Description
## Market Modification and Share Indexes
In the `market_two::modify_market_setting` instruction, the farm emission rates are updated without properly adjusting the relevant share indexes. Share indexes track how rewards are distributed to participants. These index... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | other | true | false | ## High: repayBorrow is inaccessible by overdue borrowers
### Description
User facing UToken's `repayBorrow() -> _repayBorrowFresh()` will be reverted when borrower is overdue, making it permanently impossible to pay the debt within the system.
### Impact
The total impact is permanent fund freeze for the lenders of a... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | oracle | true | false | ## Medium: min max price on getMarketTokenPrice is not utilized such that deposit and withdrawal can use the same price, leading to free tx for cost-free manipulation
### Description
min max price on getMarketTokenPrice is not utilized such that deposit and withdrawal can use the same price, leading to free tx for cos... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | initialization | true | true | ## High: Malicious token creator can block the token `buy/sells`
### Description
When a token is created, the creator can specify the `creatorFeeRecipient`, which will be used for sending the corresponding fees. Then in the `TokenFactory` contract, the functions `buyWithReferral`, `buyWithReferralWithExactEth`, and `s... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | rounding | false | false | ## Low: Withdrawal process could result in flooring
### Description
When a share holder uses either the [`withdraw`](https://github.com/1inch/fixed-rate-swap/blob/b1600f61b77b6051388e6fb2cb0be776c5bcf2d1/contracts/FixedRateSwap.sol#L151) or the [`withdrawFor`](https://github.com/1inch/fixed-rate-swap/blob/b1600f61b77b... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Incorrect Values Returned in ReserveLibrary `withdraw` Function
### Description
The `withdraw` function in the `ReserveLibrary` returns incorrect values, specifically for the `amountWithdrawn`, `amountScaled`, and `amountUnderlying` parameters. This can inconsistent state and incorrect data being used by the c... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | true | false | ## Low: Lack of event generation
### Description
Multiple critical operations do not emit events. This creates uncertainty among users interacting with the system.
The `setRateControlThresholds` function in the `RootERC20PredicateFlowRate` contract does not emit an event when it updates the `largeTransferThresholds` ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: Vulnerability related to ‘Optimizer Bug Regarding Memory Side Effects of Inline Assembly’
### Description
Solidity versions 0.8.13 and 0.8.14 are vulnerable to a recently reported [optimizer bug](https://blog.soliditylang.org/2022/06/15/inline-assembly-memory-side-effects-bug/) related to inline assembly. S... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | other | true | false | ## Gas: `<array>.length` should not be looked up in every loop of a `for-loop`
### Description
Reading array length at each iteration of the loop consumes more gas than necessary.
In the best case scenario (length read on a memory variable), caching the array length in the stack saves around 3 gas per iteration.
In t... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | true | false | ## Low: Missing check to avoid circular dependencies among RTokens
### Description
When BasketHandler switches basket to new reference amounts, it calls `trackStatus()`:
```Solidity
File: BasketHandler.sol
158: function refreshBasket() external {
159: assetRegistry.refresh();
160:
161: require(
162: main.hasRole... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Unused variables
### Description
**Severity**: Informational
**Status**: Resolved
**Description**
gov and BASE_RATE variables in the Formula contract are not used at all.
**Recommendation**:
Remove the unused variables. | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: [08] Contradictory `base_path` existence check in clean command
### Description
While not directly causing failures, it indicates a flaw in the logic flow and could mask other issues.
### Proof of concept
In the `validate_manifest` function of the Move VM’s clean command, there is a contradiction where it c... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Stale Price Usage in Inactive Asset Settlement
### Description
The `reduce_inactive_asset_position` function allows settlement involving inactive synthetic assets.
However, it uses `get_synthetic_price` without validating the freshness of the price. Since inactive assets cannot have their prices updated (`_se... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Use explicit size declarations
### Description
Using explicit size declarations helps avoid confusion and ensures that developers are aware of the exact variable size they are working with. This practice promotes better code quality, reduces the potential for errors, and enhances the overall maintainability of... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | solodit_api | high | Business Logic | true | true |
To withdraw, a user needs to convert his collateral for the base token. This is done in the **withdraw** function in Collateral.
The WithdrawHook has some security mechanics that can be activated like a global max withdraw in a specific timeframe, also for users to have a withdraw limit for them in a specific timefra... | Code4rena | 5 | prePO |
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | reentrancy | false | false | ## Medium: Reenterable Withdrawal Pattern
### Description
Description
The withdrawal of funds from the Account contract is vulnerable to reentrancy.
function withdraw ( uint256 amount , address market ) external override {
ITracer _tracer = ITracer ( market );
require ( amount > 0, "ACT: Withdraw Amount <= 0");
Types ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Date validation is insu�ficient and returns imprecise timestamps
### Description
The `_verifyDate` function that implements date parsing from strings does not properly validate its input. The function `_verifyDate`, shown in Figure 1, is used to compute timestamps from a string representing a date (e.g. "12 Sep... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Suggeset verifying L2 sequencer's status
### Description
_Resolved_
Wish contracts are deployed on Base Chain. Base chain, as one L2 chain, as one best practice, use the L2 sequencer feed to verify the status of the sequencer when running applications on L2 networks.
Recommendation: Check L2 sequencer statu... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | oracle | true | false | ## Medium: Uniswap oracle prices can be manipulated
### Description
The protocol uses Uniswap V3 oracles to calculate the prices of the collateral tokens TitanX and DragonX. For the price of TitanX, the ETH/TITANX pool is used, while for the price of DragonX, both the ETH/TITANX and the TITANX/DRAGONX pools are used.
... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | oracle | false | false | ## Gas: Remove redundant pause checks
### Description
**Description:** 1) Remove redundant `botMethodsPaused` [check](https://github.com/SwellNetwork/v3-contracts-lst/blob/a95ea7942ba895ae84845ab7fec1163d667bee38/contracts/implementations/swETH.sol#L208-L210) in `swETH::reprice` as:
* this function is only called by ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | dos | false | false | ## High: Fix gas cost ETH transfer
### Description
ETH sending at this line
https://github.com/lidofinance/lido-dao/blob/5b449b740cddfbef5c107505677e6a576e2c2b69/contracts/0.4.24/Lido.sol#L301
uses 2300 gas amount, but gas price can be vary and it is possible that in future it may exceed gas limit.
### Recommendati... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | flash-loan | true | false | ## Gas: Remove redundant `morphoMarketId` validation checks in `_closeLoanMorphoWithShares` and `_openLoanPosition`
### Description
**Description:** `RockoFlashRefinance::_closeLoanMorphoWithShares` and `_openLoanPosition` contain redundant validation `morphoMarketId`. The reasons why this validation is redundant:
* ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | token | true | false | ## Gas: Unnecessary system fee transfer if fee is zero
### Description
In the `sendERC721UsingNative` function, the contract transfers the system fee to the treasure address without validation. If the fee is zero, this can lead to unnecessary gas consumption and potentially an unwanted extra transaction.
```solidity
... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | overflow | true | false | ## High: Integer Underflow in _getTargetOutput Due to Improper Type Casting
### Description
In the `AntiSandwichHook` contract, an integer underflow may occur due to the improper casting of a negative `int128` value to `uint128` in the [`_getTargetOutput`](https://github.com/OpenZeppelin/uniswap-hooks/blob/087974776fb... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | other | true | false | ## Gas: Check Arguments Early
### Description
Checks that require() or revert() statements that check input arguments are at the top of the function. Checks that involve constants should come before checks that involve state variables, function calls, and calculations. By doing these checks first, the function is able... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | false | false | ## Low: Ownership Can Be Renounced
### Description
**Update**
Marked as "Acknowledged" by the client. The client provided the following explanation:
> We kept it in case we need to make the contract immutable.
**File(s) affected:**`ParticleExchange.sol`
**Description:** If the owner renounces their ownership, all o... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | signature | false | false | ## High: Keypairs Generated by Dapps Might Be Unrecoverable Which Could Result in Loss of Funds ✓ Fixed
### Description
The current Snap implementation allows untrusted dapps to supply their own nonces for the generation of unique private keys tied to their identities. These nonces, which can be arbitrary and are not ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Outdated and vulnerable dependencies
### Description
Both Umee and Peggo rely on outdated and vulnerable dependencies. The table below lists the problematic packages used by Umee dependencies; the yellow rows indicate packages that were also detected in Peggo dependencies.
We set the severity of this finding... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | liquidation | false | false | ## Low: Incorrect Assignment Of Function Parameters
### Description
## Code Review
In `obligation.move`, lock assigns:
1. `lock_deposit_collateral` to `self.withdraw_collateral_locked`.
2. `lock_withdraw_collateral` to `self.deposit_collateral_locked`.
This assignment is incorrect and may result in unexpected conseq... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | solodit_api | high | initialization | true | false |
_Resolved_
## Severity
**Impact:** High
**Likelihood:** Medium
## Description
The `getNamespace` function contains incorrect assembly code that can lead to namespace collisions due to improper memory packing.
```solidity
function getNamespace(address account, address _caller) public pure returns (bytes32 resul... | Pashov Audit Group | 4.666667 | Biconomy_2025-11-26 |
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | front-running | false | false | ## Low: Incorrect Value Used for Slippage Calculations
### Description
The `LockZap` contract implements functionality to zap assets into liquidity and then stake the received LP tokens in the `MultiFeeDistribution` contract. In order to handle slippage and prevent sandwich attacks, [`LockZap` calculates](https://gith... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Inefficient size allocation pattern
### Description
The program implements an inefficient storage allocation strategy in the BondingCurve account structure. The code allocates `SIZE+175` bytes for each account when post-upgrade requirements with creator fee updates, leading to unnecessary resource consumption ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: `tokenURI` function would revert for all vestings created by `PublicSale` contract
### Description
All vestings created by the `PublicSale` contract would have an empty `tokenURI` field, meaning that the `tokenURI` function would revert for all such vestings:
While the EIP states that `tokenURI` should rever... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Incorrect error message in `_checkNotBlacklisted`
### Description
**Description:** The error message in following function says `WLFI: caller is blacklisted` even though the check is applicable on the input `account` address, not the caller address.
**Recommended Mitigation:** Consider changing the error me... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: Error in Updating _checkpoint in the increaseUnlockTime Function
### Description
## Lines of code
https://github.com/code-423n4/2022-08-fiatdao/blob/main/contracts/VotingEscrow.sol#L513-L514
## Vulnerability details
## Impact
The potentiel impact of this error are :
* Give wrong voting power to a user... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Lack of Distinction Between DELETE and Setting Value to 0
### Description
The `DELETE_UINT256` operation in the `_basePongHandler` function simply deletes a `uint256` value from storage, which effectively has the same outcome as setting the value to 0. This can lead to ambiguity in the protocol, as there is no... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | storage | false | false | ## Low: Comment improvements
### Description
## Context
- **AggregatorV3Interface.sol**: Lines 7-8
- **NAVProxyMPriceFeed.sol**: Lines 38-41
- **IUsualM.sol**: Line 117
- **UsualM.sol**: Line 270
## Description
## List of issues:
1. **IUsualM.sol#L117**: Misspelling, `deciamls` ⇒ `decimals`.
2. **UsualM.sol#L270**:... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: Inconsistent zero-address validation in Infrared.initialize()
### Description
In `Infrared.initialize()`, most addresses are checked for zero value, but the `_voter` address is not validated. This inconsistency can lead to potential issues if `_voter` is inadvertently set to the zero address, causing subsequen... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | overflow | true | false | ## Medium: Reducing the weight of a voted gaugetype will always revert
### Description
The `GaugeController` contract gives the opal team the ability to change the weight of gauge types. This is implemented in the `_changeTypeWeight()` function:
```solidity
function _changeTypeWeight(int128 gaugeType, uint256 weight)... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | front-running | false | false | ## Medium: SdtRewardReceiver#_withdrawRewards has incorrect slippage protection and withdraws can be sandwiched
### Description
The _min_dy parameter of poolCvgSDT.exchange is set via the poolCvgSDT.get_dy method. The problem with this is that get_dy is a relative output that is executed at runtime. This means that no... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | cyfrin_structured | low | initialization | false | false | ## Low: Zero addresses not checked in contracts constructors
### Description
In constructors of `DaiGoldAuction`, `TempleGold`, and `TempleGoldStaking` contracts, zero addresses are not validated. | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: Incorrect Balance Check in Validator Redelegation Process May Block Legitimate Rebalancing Operations
### Description
### Finding description and impact
The `processValidatorRedelegation` function in the StakingManager contract contains an incorrect balance check that could prevent legitimate rebalancing o... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | true | false | ## Low: [10] Users are not able to unstake their NFTs
### Description
The admin is not trusted. So in case the user/account has a staked and the admin calls `YieldStakingBase.sol#setNftActive()` function to deactivate that NFT in this protocol. The users now are not able to unstake their NFTs (it will revert).
To fi... | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.