prompt
listlengths
2
2
source
stringclasses
3 values
severity
stringclasses
5 values
category
stringclasses
186 values
has_code
bool
2 classes
has_poc
bool
2 classes
reference_response
stringlengths
23
5k
firm
stringclasses
26 values
quality_score
float64
0
5
protocol
stringclasses
398 values
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
token
true
false
## Gas: Use `Short-Circuiting` rules to your advantage ### Description When using logical disjunction (`||`) or logical conjunction (`&&`), make sure to order your functions correctly for optimal gas usage. In logical disjunction (`OR`), if the first function resolves to true, the second one won’t be executed and henc...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
true
false
## Low: Incorrect comment in the ERC721Bridge contract regarding storage layout ### Description The comment in the `ERC721Bridge` contract states that there are 50 reserved storage slots. However, it should indicate that 49 slots are reserved, not 50. This discrepancy arises because the combined storage slots of the `...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
liquidation
true
false
## Low: **Misleading error message [2]** ### Description **Description** In `SecondaryCollateralizationBWT.sol`, there is a modifier: **Recommendation**: Replace **"should be pool"** with **"should be governance"**.
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
dos
true
false
## Low: Reward restaking creates unnecessary unbonding in edge cases ### Description **Description:** The `PolygonStrategy::restakeRewards()` function is publicly callable by anyone, allowing rewards to be restaked immediately before the `PolygonStrategy::unbond()` function is called. In specific scenarios, this can ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: ROUTER() can not be updated for private or public vaults ### Description `ROUTER()` is an immutable data for any `ClonesWithImmutableArgs.clone` that uses `AstariaVault`. That means for example if there is an issue with the current hardcoded `ROUTER()` or that it needs to be upgraded, the current public/privat...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: Users can avoid paying target token fees ### Description When `AegisVaultCore.performUpKeep` is called by the rebalancer keeper there is a fee that is applied over the target tokens being rebalanced, and the fee is sent to the `feeRecipient` address. Users can avoid paying their share of the fee by calling th...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Code Optimization ### Description ## Subscription Function Update In `subscription::get_spot_subscription_response`, deposit funds first before adding refund messages to ensure the correct order of operations and avoid potential issues related to fund management. By depositing funds first, the revised funct...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
initialization
true
false
## High: Bidders' funds may become locked due to inconsistent price order checks in MaxPriorityQueue and the _claimBid function. ### Description In the `MaxPriorityQueue`, `bids` are ordered by decreasing `price`. We calculate the `marginal price`, `marginal bid ID`, and determine the `auction winners`. When a `bidder...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
true
false
## High: No LSTs transfer on node operator withdrawals resulting in stuck funds and loss for node operators ### Description Inside `OperatorStakingPool`, node operators are required to stake their LSTs. Total LST staked and node operators balances are tracked by state variables: ```Solidity // stores the LST share ba...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
access-control
false
false
## Medium: Potentially unrestricted account withdrawals ### Description This warning is about any user potentially being able to withdraw advisor's share in here: https://github.com/erwan-rouzel/b-cube-ico/tree/451e249a7200ea094fdfa1baa1a50cb7b17233f2/contracts/Treasury.sol#L158 and private sale participant's share in...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
storage
false
false
## Low: Guardian Function Selector Insufficient for Upgradeable Contract ### Description **Update** Marked as "Acknowledged" by the client. The client provided the following explanation: > No modification is necessary. The Guardian is primarily used for Solv Fund investments. If there are contract upgrades for the co...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
storage
false
false
## Low: Missing Storage Gaps ### Description **Update** Marked as "Acknowledged" by the client. The client provided the following explanation: > Care will always be taken during upgrades to ensure there are no storage collisions. By convention, state variables will never be added directly to SophonFarming.sol, but ra...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
true
false
## Medium: Caller of Upkeep may skip step 11 to save gas ### Description In Upkeep.sol, `performUpkeep()` is expected to be called by anyone who wishes to earn the 5% incentive. The function runs through steps 1 to 11, each wrapped in a try/catch block to prevent reversions from blocking the entire function. A dishon...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
front-running
false
false
## Low: Potential MEV Attack When Users Commit ### Description Pool keepers play a key role in asserting regular price updates are made to a leveraged pool following the execution of any pending commits. A frontrunning interval exists within the regular update interval such that any commitments made during this frontr...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
rounding
true
false
## Low: Divide before multiply ### Description Solidity's integer division truncates. Thus, performing division before multiplication can lead to precision loss. There are 2 instances of this issue:
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
false
false
## Low: Host shouldn't be able to disable emergencyExecute ### Description https://github.com/code-423n4/2023-05-party/blob/main/contracts/party/PartyGovernance.sol#L816-L819 Emergency execute is a protective measure so that the PartyDAO can execute any arbitrary function as the Party contract and move assets. This i...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
liquidation
false
false
## Medium: When the prime rate is updated by the oracle, the values of the sub-rates are not ajdusted accordingly, which can cause loss of assets for borrowers ### Description When the `LendingPool` is deployed there is an initial prime rate set and the other sub-rates (base, optimal, max) are derived from the prime r...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
liquidation
true
false
## Low: UNCHECKED MAX LOAN-TO-VALUE RATIO ### Description The `whitelist_collateral` function in the **krp-cdp-contracts/central\_control** contract does not verify that `max_ltv` parameter is lower than 1. If it is mistakenly set to a value greater than 1, users will be able to redeem more coins than the value of the...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: Use of custom errors instead of revert strings may help reduce gas usage ### Description In Solidity smart contract development, replacing hard-coded revert message strings with the `Error()` syntax is an optimization strategy that can significantly reduce gas costs. Hard-coded strings, stored on the blockchai...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
access-control
false
false
## Medium: Centralized entities with excessive permissions ### Description **Severity**: Medium **Status**: Acknowledged **Description** The setHandler function from Vester.sol and VesteNPL.sol contracts allows a governance to set a new handler address and activate or deactivate it. The entity with this privilege ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: `fee` can change without the consent of users ### Description _Submitted by Picodes, also found by 0xNineDec, 0xsanson, antonttc, berndartmueller, BowTiedWardens, catchup, dirk_y, Alex the Entreprenerd, horsefacts, Metatron, sseefried, and unforgiven_ ### Impact Fees are applied during `withdraw`, but ca...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
access-control
false
false
## Medium: Approval Not Updated when Changing the Marketplace Address in `TalentirTokenV1` ### Description **Update** In PR-41, the team added functionality that allows the `owner` to remove approval of an address for a list of user wallets. This functionality adds some centralization risk, as the owner is free to rev...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
oracle
true
false
## Low: Unused response parameter should be removed ### Description **Description:** The `_estimatedCollateralValueUSD` parameter decoded from the Chainlink Functions response and passed as an argument to `AutoRedemption::legacyAutoRedemption` is not used and can be removed: **The Standard DAO:** Fixed by commit [59...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
overflow
true
false
## Low: Casting from `u64` to `i64` causes genuine deposit requests to fail in `deposit` function ### Description **Description:** The `deposit` function in `deposit.rs` casts the amount value( the amount of tokens trader is willing to deposit) which is of type `u64` to `i64` when `deposit_all` is set to `true`. When ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
overflow
false
false
## Low: calculateDepositBonus() doesn't take into account sharesExiting ### Description The function `calculateDepositBonus()` doesn't take into account `sharesExiting`, while `calculateRedeemPenalty()` does. As confirmed by the project, `calculateDepositBonus()` should also do this. ### Recommendation Change functio...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
access-control
false
false
## Medium: `TimelockSafeGuard.updateMinDelay` Lacks Minimum and Maximum Limits ### Description The `TimelockSafeGuard.updateMinDelay` function allows the `DEFAULT_ADMIN_ROLE` to set any value for the **\_minDelay**, including an unreasonably large value that could effectively freeze all future proposals. Proposals wit...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
dos
false
false
## Low: `Beacon`'s gas helper functions can underestimate the gas limit required for `lzReceive()` ### Description The `getSendOptions()` and `getReadOptions()` functions of the `Beacon` contract are helper functions that can be used to estimate the gas limit for the `lzReceive()` call. However, these calculations do ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: On-chain logic cannot reliably prevent a malicious beneficiary from purchasing tokens at a discount ✓ Fixed ### Description The `buy()` function contains unique logic for identifying and processing an investment by the beneficiary: **code/contracts/DecentralizedAutonomousTrust.vy:L650-L658** ``` elif(self....
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
true
false
## Low: Missing Call to `\_\_ReentrancyGuard\_init()` in the initialize() Function ### Description Most contracts use the delegateCall proxy pattern, and hence their implementations require the use of `initialize()` functions instead of constructors. This requires derived contracts to call the corresponding init funct...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
token
true
true
## Medium: User can silently burn tokens in the GNTDeposit withdraw function ### Description Only the Concent user should be able to burn tokens, but normal users can work around this restriction using the `withdraw` function to transfer tokens to the special address `0xdeadbeef`. This effectively allows tokens to be ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Users can avoid paying borrowing fees ### Description Users might submit an account they control as the `fee_account`. If the intention is to use just one account to gather fees, consider hardcoding the address instead of passing it as an argument: `src/processor/swap.rs#L78`
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: EXPERIMENTAL KEYWORD USAGE ### Description **ABIEncoderV2** is enabled and using experimental features could be dangerous in live deployments. The experimental ABI encoder does not handle non-integer values shorter than 32 bytes properly. This applies to bytesNN types, bool, enum and other types when they are ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
signature
true
false
## Low: Simplify `depositWithSignature` function ### Description The parameter `approveMax` of `depositWithSignature` function could be removedready, the permit `assets` should be always equal to deposit `assets` File: /src/sfrxETH.sol
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
token
true
false
## Medium: Token Transfer Reverts Leading to Blocked Foreclosure ### Description The `_executeForeclosure` function is invoked during the foreclosure flow to execute the logic required to repay unsecured debt. Using the assets withdrawn from the lender, it repays the borrowed amount, subtracts the fee, and sends the r...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: Hardcoded Stable Token Price in VaultPriceFeed.sol ### Description Severity : Low Status : Acknowledged Description In the VaultPriceFeed.sol contract, the price of stable tokens is hardcoded as 1e30, it assumes that all stable tokens will indefinitely maintain their peg to their underlying assets. This ass...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
front-running
false
false
## High: Frontrunning Matched Funds for Unfair Gains ### Description ## Potential for Frontrunning in Matching Funds There is potential for frontrunning when matching funds are allocated. This issue arises due to the way matched amounts are distributed. The emojicoin arena module features a mechanism where users may ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
front-running
false
false
## Medium: DoS: Attacker May Front-Run `createSplit()` With A `merkleRoot` Causing Future Transactions With The Same `merkleRoot` to Revert ### Description _Submitted by kirk-baird_ A `merkleRoot` may only be used once in `createSplit()` since it is used as `salt` to the deployment of a `SplitProxy`. The result is a...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
initialization
true
false
## Gas: Refactor `PublicStockOnRamp::initializedNavProvider`, `BaseOffRamp::nonZeroLiquidityProvider` into internal functions to prevent identical storage reads ### Description **Description:** `PublicStockOnRamp` has a modifier `initializedNavProvider` that reads the `navProvider` storage slot, but then later on in t...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
overflow
false
false
## Low: Integer Overflow on Empty List in onlyCompatibleInputArrays ### Description Description The modifier onlyCompatibleInputArrays verifies whether two lists of uint256 satisfy certain conditions, namely: •both lists should be of the same length, •the numbers inside the list are ascending. When both lists are empt...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
dos
true
false
## Medium: Incorrect Absolute Value Calculation in `_abs` Function Leads To DoS on Tokens with More Than 18 Decimals ### Description **Severity** **Impact:** High **Likelihood:** Low **Description** The function `_abs(int256 x)` is designed to return the absolute value of the input `x`. However, due to an error in...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
token
true
true
## Medium: Initial griefing attack possible ### Description The famous initial deposit attack is largely mitigated by the `+1` done in the asset/shares conversion. However, doing this attack can cause some strange behavior that could grief users (at high cost of the attacker) and leave the vault in a weird state: Her...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
medium
access-control
true
true
## Medium: Missing access control in `SDLVesting::stakeReleasableTokens` ### Description The [`SDLVesting::stakeReleasableTokens`](https://github.com/stakedotlink/contracts/blob/3462c0d04ff92a23843adf0be8ea969b91b9bf0c/contracts/vesting/SDLVesting.sol#L108) function is meant to be driven by a trusted staking bot, run ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
token
true
false
## Medium: Incorrect HARD\_CAP Configuration ### Description The contract defines the HARD\_CAP as follows: ``` uint256 public constant HARD_CAP = 110_000_000 ether; // <= 110_000_000e18 ``` This configuration assumes 18 decimal places, which is standard for many ERC20 tokens. However, the contract explicitly defi...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
false
false
## High: Delayed price increase after target amount raised ### Description The [token price](https://github.com/fiinu/smart-contract/blob/7589b9d137bbf902e142e4f0476b06976e390bdb/FiinuCoin.sol#L194%5D) is meant to start increasing after the target amount of 100,000 ETH has been raised. However, due to the ordering of ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
oracle
false
false
## High: Precision error in \_fetchTWAP causes vesting to be free after initial lockdrop period ### Description **Details** [BlueberryStaking.sol#L830-L843](https://github.com/Blueberryfi/blueberry-staking/blob/efaf7fc690e38914ba475d5ac61a4d0bd3f45c0d/src/BlueberryStaking.sol#L830-L843) // Adjust for decimals if...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: Unused field in Package ### Description **Description** Field “status” of package structure is unused. In order to decrease storage usage is better to remove it and replace mapping for Packages to mapping for maxPayout numbers. **Recommendation**: Remove Package structure and use mapping(uint=>uint) to trac...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
initialization
false
false
## Gas: Use of post-Increment ( i++) in loop leads to extra gas used ### Description In Solidity, using the post-increment operator (`i++`) instead of the pre-increment operator (`++i`) may slightly increase gas usage. The post-increment operator temporarily stores the initial value before incrementing, resulting in u...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
low
other
true
false
## Low: Remove `< 0` checks for unsigned variables since they can't be negative ### Description Remove `< 0` checks for unsigned variables since they can't be negative: File: `src/DropBox.sol` ```solidity 538: if (_randomWords[i] <= 0) revert InvalidRandomWord(); ```
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
oracle
true
false
## Low: Calling process function will not revert even if two oracle nodes of the same type are used ### Description Report type: Smart Contract Target: https://testnet.snowtrace.io/address/0xA758c321DF6Cd949A8E074B22362a4366DB1b725 Impacts: * Contract fails to deliver promised returns, but doesn't lose value ## D...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: `CardAllocationPool` should use `ERC1155HolderUpgradeable` ### Description _Resolved_ `CardAllocationPool` is an upgradable contract, but currently uses `ERC1155Holder` instead of `ERC1155HolderUpgradeable`. While this does not impact functionality, it is considered best practice to use the upgradeable contra...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
initialization
true
false
## High: Beneficiary cant get `fairSideConviction` NFT unless they only claim once, and only after it's fully vested ### Description _Submitted by WatchPug, also found by cmichel_ Based on the context, once the beneficiary claimed all their vesting tokens, they should get the `fairSideConviction` NFT. However, in th...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: [04] Bps parameters are not validated to not exceed 1e4 ### Description https://github.com/code-423n4/2023-10-party/blob/b23c65d62a20921c709582b0b76b387f2bb9ebb5/contracts/crowdfund/ETHCrowdfundBase.sol#L165 https://github.com/code-423n4/2023-10-party/blob/b23c65d62a20921c709582b0b76b387f2bb9ebb5/contracts/cro...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
signature
true
false
## Low: Replay attack In `StakingPool.sol` ### Description The `StakingPool.sol` contract is designed to handle multiple `Staking.sol` contracts, e.g., SXT and USDC, because the owner can use `StakingPool.sol#addStakingContract()` for that. When the user calls `Staking.sol#claimUnstake()`, the SXT Chain will perform ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
false
false
## Low: Unnecessary `Ownable2StepUpgradeable` inheritance in `Router` ### Description The `Router` contract inherits both from `Ownable2StepUpgradeable` and from `AccessManagedUpgradeable` via `Dispatcher`. It looks as if originally, `Ownable2StepUpgradeable` might have been used to manage ownership and access control...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
true
false
## Low: Lack of event emission after critical `initialize()` functions ### Description To record the init parameters for off-chain monitoring and transparency reasons, please consider emitting an event after the `initialize()` functions:
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
token
false
false
## High: Owner is able to withdraw reward tokens. ### Description **Description** Bribes.sol: function recoverERC20(). Owner is able to withdraw any tokens from the contract, including reward tokens, which might lead to errors in reward distribution. In case, owner is set to a DAO contract, this can potentially be us...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
false
false
## Low: Clickjacking Vulnerability in failsafe.eleoslabs.io ### Description **Severity** : Low **Status**: Resolved **Description** : Clickjacking, also known as UI Redress Attack, is a malicious technique where an attacker tricks a user into clicking on something different from what the user perceives. In this ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
false
false
## High: Extrinsic with multiple storage mutations isn’t annotated with #[transactional] ### Description **Occurs**: Basilisk-node/pallets/duster/src/lib.rs:197 Basilisk-node/pallets/nft/src/lib.rs:84,107 Not using #[transactional] can lead to storage corruption. **Recommendation**: Use #[transactional] for every ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
true
false
## High: Seller Pays Buyer's Trade Fee in Token Swaps, Leading to Systematic Theft of Funds ### Description The inconsistent fee deduction logic in token swap settlement will cause a direct loss of funds for sellers as buyers execute token swap trades where the buyer's trade fee is deducted from the seller's proceeds ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: refundDestination cannot be configured ### Description The `refundDestination` address determines where excess funds from a swap execution are sent to. Currently, this value is not used by the `swapTokens()` function. ### Recommendation Consider checking for a configured `refundDestination` when encoding the U...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: `ConfigurablePause.sol` some indexed parameters are not particularly useful ### Description **Not sure it makes sense to index this** https://github.com/solidity-labs-io/kleidi/blob/1a06ac16bc99d0b4081281329d03064c3737f5e4/src/ConfigurablePause.sol#L46-L47 That would be helpful to find all events at a time,...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: NatSpec is incomplete ### Description *There are 19 instances of this issue:* https://github.com/code-423n4/2022-07-golom/blob/e5efa8f9d6dda92a90b8b2c4902320acf0c26816/contracts/core/GolomTrader.sol#L162-L170 https://github.com/code-423n4/2022-07-golom/blob/e5efa8f9d6dda92a90b8b2c4902320acf0c26816/contracts...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
storage
false
false
## Low: UPGRADE TO AT LEAST PRAGMA 0.8.10 ### Description Gas optimizations and additional safety checks are available for free when using newer compiler versions and the optimizer. * Safemath by default since 0.8.0 (can be more gas efficient than the SafeMath library) * Low level inline: as of 0.8.2, leads to cheape...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
rounding
true
false
## Medium: Collateral Decimals Mismatch ### Description ## Notional Size Calculation in Exchange Contract Within Exchange, specifically in the computation of `notionalSize` during the `executeOrder` process, a calculation occurs for determining the exponent needed to adjust the `notionalSize` precision. ## Exchange....
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
front-running
true
false
## Medium: Withdrawing all funds at once to vault can be DoS attacked by frontrunning and locking dust ### Description _Submitted by berndartmueller, also found by minhquanym_ All funds can be migrated (withdrawn) at once to the caller vault by using the `BaseStrategy.withdrawToVault` function which internally calls ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
flash-loan
false
false
## Low: Interaction with External Contracts ### Description **Update** The client acknowledged this issue. **File(s) affected:**`Sleeves.sol`, `ERC20Rewarder.sol`, `PDTStakingBatch.sol` **Description:** The protocol relies on the functionalities of external contracts. Therefore, the security of the project depends o...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: Lack of input validation in replacePool() allows curated pool limit bypass in Router.sol ### Description ## Handle 0xRajeev ## Vulnerability details ## Impact There is no input validation in replacePool() function to check if oldToken exists and is curated. Using a non-existing oldToken (even 0 address...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
liquidation
true
false
## Medium: Restricted Token Redeem Period When lagDuration == 0 ### Description If `lagDuration` == 0, users may have only a limited period, potentially just 1 hour in a day, to claim their token. When `lagDuration` == 0, the pool is not time-locked. Therefore, users are supposed to redeem their tokens instantly. Howe...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
rounding
false
false
## High: Significant Rounding Error in Loan-to-Value Calculation ### Description **Description:** In the getLTVOfLoan function, the calculation of the loan-to-value (LTV) ratio involves a division by 1e18 for both tokenLendingTotalValue and tokenCollateralTotalValue. This division can lead to a significant loss of pr...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
reentrancy
true
false
## Low: Risk of out-of-gas revert due to use of transfer() in claimFees ### Description The `VaultFactory.claimFees` function uses the low-level `transfer()` operation to move the collected ETH fees to another arbitrary address. The `transfer()` operation sends only 2,300 units of gas with this operation. As a result,...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Wrong player ID in `EthPrizeAwarded` event ### Description _Acknowledged_ The `awardEthPrize` and `awardEthPrizeBatch` functions emit playerId: 0 to indicate no player association. However, `nextPlayerId` starts from 0, meaning the first player added has `playerId` 0. This creates ambiguity in off-chain index...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
storage
false
false
## Medium: Incorrect storage slot assignments ### Description We have the extracted storage layout of the GNSMultiCollatDiamond contract. ``` | Name | Type | Slot | Offset | Bytes | | _initialized | uint8 | 0 | 0 | 1 | | _initializing | bool | 0 | 1 | 1 | | addressStore | AddressStore | 1 | 0 | 1632 ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: `collectedFee` can be easily inflated. ### Description **Severity**: Medium **Status**: Resolved **Description** The `calculateSetupRate()` and `calculateUpDownRate()` functions within the `Treasury.sol` smart contract calculates the amount of fees and updates the global variable `collectedFee` among ot...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
signature
false
false
## Low: Remove commented-out function ### Description A legacy version of `isValidSignature()` still remains commented-out in `ERC4337Account`. This function is now implemented in the inherited `ERC1271` contract, so the commented-out version can be removed. ### Recommendation Remove the commented-out `isValidSignatu...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
solodit_api
medium
other
false
true
When `MIN_VOTING_POWER_REQUIRED` is changed, tokenIDs with votes lower than `MIN_VOTING_POWER_REQUIRED` will not be able to vote through the delegate function, but previous votes will not be affected.<br> Since `MIN_VOTING_POWER_REQUIRED` is mainly used to reduce the influence of spam users, changing this value should...
Code4rena
5
Golom
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
overflow
true
false
## Medium: Overflow In Calculation Of Delta A ### Description The `numberator` value is not validated before running `u256::shlw` on it. As a result, the non-zero bytes might be removed, which leads to an incorrect calculation of the value. ```rust let numberator = u256::shlw(full_math_u128::full_mul(liquidity, sqrt_...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
low
token
true
false
## Low: Unsafe transfer of non-standard ERC-20 tokens ### Description The `DistributionManager` uses the standard ERC-20 `transfer()` function instead of a safe transfer equivalent when distributing reward tokens to controllers. While the reward token (QI) is a known, trusted contract that conforms to the ERC-20 speci...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
signature
false
false
## Low: Outdated Cosmos SDK ### Description The EMoney Appchain project is currently using an outdated version of the Cosmos SDK (v0.46.13). This version is affected by multiple security vulnerabilities of varying severity. **Identified Vulnerabilities:** 1. ASA-2024-002 (GHSA-2557-x9mg-76w8) - Severity: Moderate ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Penalty calculation in `previewRedeem` rounds in the wrong direction ### Description The `previewRedeem` method in `AutoPxEth` calculates the penalty with the following code: The issue is that the math rounds down the penalty, but following the ERC4626 standard you should follow best security for the vault a...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
oracle
true
false
## Medium: Max Allowed Deviation of 500 (5%) Is Too High for `Engine` Logic ### Description Excessive price-deviation ceiling (±5%) enables loss and manipulation. `MAX_PRICE_DEVIATION_UPPER_BOUND = 500` lets operators configure assets to mint when the oracle reads **$0.95–$1.05** for a $1 stable (USDC/USDT). That’s u...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
high
access-control
true
false
## High: Missing access control on critical `FeeController` setters ### Description `FeeController.setFunctionFeeConfig()`, `setTokenGetter()`, and `setGlobalTokenGetter()` are declared `external` but have **no modifier** restricting the caller. Any account can freely (re)configure fee percentages, token-getter addres...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Use the Address library. ### Description **Description** Lines 51-52, function withdraw(). Sending ether should be performed with the function Address.sendValue, which already performs all necessary validations. **Recommendation**: Use Address.sendValue instead.
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
solodit_api
high
Lending Pool
true
true
Source: https://github.com/sherlock-audit/2024-03-woofi-swap-judging/issues/68 The protocol has acknowledged this issue. ## Found by mstpr-brainbot ## Summary The pool can be drained just as it was during the incident that occurred previously. ## Vulnerability Detail `maxNotionalSwap` and `maxGamma` and the new mat...
Sherlock
4.666667
WOOFi Swap
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
low
oracle-manipulation
true
false
## Low: Missing array length check ### Description The `ChainlinkOracle::quoteFungibles` function assumes that the `fungibles` and `amounts` arrays passed as arguments are of equal length. It iterates over `fungibles.length` and accesses `amounts[i]` for each index. If `amounts.length` is less than `fungibles.length`,...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Accidentally sent native currency is not refunded for intents ### Description While `Eco7683OriginSettler._openEcoIntent()` refunds any `msg.value` sent in excess of `intent.reward.nativeValue`, it does so only if `intent.reward.nativeValue > 0`. An intent creator who accidentally sends native currency but wit...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
dos
true
false
## Low: Lido stake rate limit could lead to unexpected reverts ### Description To mitigate the effects of a surge in demand for stETH on the deposit queue, Lido has implemented a rate limit for stake submissions. This rate limit is ignored by the `lidoSwapWethToWstEth` method of the Swapper library, potentially leadin...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Use of tx.origin to Validate EOA Sender ### Description In the [`OnlyEOAPolicy`](https://github.com/ironblocks/onchain-firewall/blob/8f4fcf861d53c835ed005db67b8af4037464e0ca/contracts/policies/OnlyEOAPolicy.sol#L20), the sender is considered an EOA if `sender == tx.origin`. If the transaction is coming via a t...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
overflow
true
false
## High: `FluidLocker::_getUnlockingPercentage()` uses 540 instead of `540 days` leading to stuck funds as the unlocking percentage will be bigger than `100%` and underflow ### Description [FluidLocker::_getUnlockingPercentage()](https://github.com/sherlock-audit/2024-11-superfluid-locking-contract/blob/main/fluid/pac...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Contracts specify outdated compiler version ### Description Some Parity contracts specify an outdated version of the Solidity compiler. The Solidity compiler is under active development. Each new version contains new checks and warnings for suspect code. **Figure 1:** Solidity releases new checks and warnings...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
liquidation
true
false
## Medium: Zero duration will fail all repayment attempt ### Description If a user sets a duration of **0** while borrowing a loan, repaying the loan will fail due to a "divide by zero" error, as `loanReceipt.duration` becomes **0**. This situation causes the user's loan to enter liquidation even if the user intended ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
true
false
## High: VaderRouter._swap performs wrong swap ### Description ## Handle cmichel ## Vulnerability details The 3-path hop in `VaderRouter._swap` is supposed to first swap **foreign** assets to native assets, and then the received native assets to different foreign assets again. The `pool.swap(nativeAmountIn, forei...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
false
false
## Low: Protocol Token Cannot Be Unpaused ### Description The `BaseERC20` contract implements the basic role management for the other contracts inheriting it. In particular, it handles the [`PAUSER_ROLE` role](https://github.com/DigitalMOB2/refi-protocol/blob/dc842fd071f225c9d1ff9ad4677b986970125cf9/contracts/tokens...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
true
false
## High: Incorrect math operation leads to underprediction of stored product ### Description **Severity** **Impact:** High **Likelihood:** High **Description** The function `swap` is used to exchange tokens. The contract keeps track of two values: a product and a sum of the virtual balances to calculate the exchan...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: [05] Functions need a more descriptive name ### Description Some functions say they set one thing but set something different and some function names are too ambiguous. - [`setTreasuryRewardCutRate()`](https://github.com/code-423n4/2023-08-livepeer/blob/main/contracts/bonding/BondingManager.sol#L167) and [_se...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
oracle
false
false
## Low: Missing events for only functions that change critical parameters ### Description The afunctions that change critical parameters should emit events. Events allow capturing the changed parameters so that off-chain tools/interfaces can register such changes with timelocks that allow users to evaluate them and co...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
access-control
true
false
## Medium: Missing a function to set royalties for specific tokenId ### Description The `resetDefaultRoyalty` function is used to clear the royalty information set for specific tokenId. ```solidity function resetDefaultRoyalty(uint256 _tokenId) external onlyRole(ADMIN_ROLE) { _resetTokenRoyalty(_tokenId); emit ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
initialization
false
false
## High: totalUsers of tree is missing one ### Description **Severity**: High **Status**: Resolved **Description** phenomanelTree.sol - totalUsers of tree reflects the number of participants in the tree. Despite that, right on deployment on constructor call, we have the owner of the contract added as one of the par...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
true
false
## Medium: Inconsistent effective swap fee calculations between `BunniQuoter::quoteSwap` and `BunniHookLogic::beforeSwap` due to incorrect application of hook and curator fees ### Description **Description:** While both `BunniQuoter::quoteSwap` and `BunniHookLogic::beforeSwap` are intended to contain the same fee logi...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
reentrancy
true
false
## Low: Transactor.DELEGATECALL Data Overwrite and selfdestruct Risks ### Description ## Security Analysis of Transactor Contract ## Severity: Low Risk **Context:** `Transactor.sol#L46-L53` **Description:** The Transactor contract contains a "general purpose" `DELEGATECALL` function that allows the owner to execute...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Withdrawal From Suspended Pool ### Description ## Withdrawal Issue in Solana Program The withdraw function in the provided Solana program does not include a check to verify whether the single-sided liquidity pool is suspended before allowing a withdrawal transaction to proceed. Pools are generally suspended u...
0