prompt listlengths 2 2 | source stringclasses 3
values | severity stringclasses 5
values | category stringclasses 186
values | has_code bool 2
classes | has_poc bool 2
classes | reference_response stringlengths 23 5k | firm stringclasses 26
values | quality_score float64 0 5 | protocol stringclasses 398
values |
|---|---|---|---|---|---|---|---|---|---|
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | token | true | false | ## Gas: Use `Short-Circuiting` rules to your advantage
### Description
When using logical disjunction (`||`) or logical conjunction (`&&`), make sure to order your functions correctly for optimal gas usage. In logical disjunction (`OR`), if the first function resolves to true, the second one won’t be executed and henc... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | true | false | ## Low: Incorrect comment in the ERC721Bridge contract regarding storage layout
### Description
The comment in the `ERC721Bridge` contract states that there are 50 reserved storage slots. However, it should indicate that 49 slots are reserved, not 50. This discrepancy arises because the combined storage slots of the `... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | liquidation | true | false | ## Low: **Misleading error message [2]**
### Description
**Description**
In `SecondaryCollateralizationBWT.sol`, there is a modifier:
**Recommendation**:
Replace **"should be pool"** with **"should be governance"**. | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | dos | true | false | ## Low: Reward restaking creates unnecessary unbonding in edge cases
### Description
**Description:** The `PolygonStrategy::restakeRewards()` function is publicly callable by anyone, allowing rewards to be restaked immediately before the `PolygonStrategy::unbond()` function is called.
In specific scenarios, this can ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: ROUTER() can not be updated for private or public vaults
### Description
`ROUTER()` is an immutable data for any `ClonesWithImmutableArgs.clone` that uses `AstariaVault`. That means for example if there is an issue with the current hardcoded `ROUTER()` or that it needs to be upgraded, the current public/privat... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: Users can avoid paying target token fees
### Description
When `AegisVaultCore.performUpKeep` is called by the rebalancer keeper there is a fee that is applied over the target tokens being rebalanced, and the fee is sent to the `feeRecipient` address.
Users can avoid paying their share of the fee by calling th... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Code Optimization
### Description
## Subscription Function Update
In `subscription::get_spot_subscription_response`, deposit funds first before adding refund messages to ensure the correct order of operations and avoid potential issues related to fund management.
By depositing funds first, the revised funct... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | initialization | true | false | ## High: Bidders' funds may become locked due to inconsistent price order checks in MaxPriorityQueue and the _claimBid function.
### Description
In the `MaxPriorityQueue`, `bids` are ordered by decreasing `price`.
We calculate the `marginal price`, `marginal bid ID`, and determine the `auction winners`.
When a `bidder... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | other | true | false | ## High: No LSTs transfer on node operator withdrawals resulting in stuck funds and loss for node operators
### Description
Inside `OperatorStakingPool`, node operators are required to stake their LSTs. Total LST staked and node operators balances are tracked by state variables:
```Solidity
// stores the LST share ba... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | access-control | false | false | ## Medium: Potentially unrestricted account withdrawals
### Description
This warning is about any user potentially being able to withdraw advisor's
share in here: https://github.com/erwan-rouzel/b-cube-ico/tree/451e249a7200ea094fdfa1baa1a50cb7b17233f2/contracts/Treasury.sol#L158 and private sale participant's share in... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | storage | false | false | ## Low: Guardian Function Selector Insufficient for Upgradeable Contract
### Description
**Update**
Marked as "Acknowledged" by the client. The client provided the following explanation:
> No modification is necessary. The Guardian is primarily used for Solv Fund investments. If there are contract upgrades for the co... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | storage | false | false | ## Low: Missing Storage Gaps
### Description
**Update**
Marked as "Acknowledged" by the client. The client provided the following explanation:
> Care will always be taken during upgrades to ensure there are no storage collisions. By convention, state variables will never be added directly to SophonFarming.sol, but ra... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: Caller of Upkeep may skip step 11 to save gas
### Description
In Upkeep.sol, `performUpkeep()` is expected to be called by anyone who wishes to earn the 5% incentive. The function runs through steps 1 to 11, each wrapped in a try/catch block to prevent reversions from blocking the entire function.
A dishon... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | front-running | false | false | ## Low: Potential MEV Attack When Users Commit
### Description
Pool keepers play a key role in asserting regular price updates are made to a leveraged pool following the execution of any pending commits. A frontrunning interval exists within the regular update interval such that any commitments made during this frontr... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | rounding | true | false | ## Low: Divide before multiply
### Description
Solidity's integer division truncates. Thus, performing division before multiplication can lead to precision loss.
There are 2 instances of this issue: | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | false | false | ## Low: Host shouldn't be able to disable emergencyExecute
### Description
https://github.com/code-423n4/2023-05-party/blob/main/contracts/party/PartyGovernance.sol#L816-L819
Emergency execute is a protective measure so that the PartyDAO can execute any arbitrary function as the Party contract and move assets. This i... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | liquidation | false | false | ## Medium: When the prime rate is updated by the oracle, the values of the sub-rates are not ajdusted accordingly, which can cause loss of assets for borrowers
### Description
When the `LendingPool` is deployed there is an initial prime rate set and the other sub-rates (base, optimal, max) are derived from the prime r... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | liquidation | true | false | ## Low: UNCHECKED MAX LOAN-TO-VALUE RATIO
### Description
The `whitelist_collateral` function in the **krp-cdp-contracts/central\_control** contract does not verify that `max_ltv` parameter is lower than 1. If it is mistakenly set to a value greater than 1, users will be able to redeem more coins than the value of the... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: Use of custom errors instead of revert strings may help reduce gas usage
### Description
In Solidity smart contract development, replacing hard-coded revert message strings with the `Error()` syntax is an optimization strategy that can significantly reduce gas costs. Hard-coded strings, stored on the blockchai... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | access-control | false | false | ## Medium: Centralized entities with excessive permissions
### Description
**Severity**: Medium
**Status**: Acknowledged
**Description**
The setHandler function from Vester.sol and VesteNPL.sol contracts allows a governance to set a new handler address and activate or deactivate it. The entity with this privilege ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | false | false | ## Medium: `fee` can change without the consent of users
### Description
_Submitted by Picodes, also found by 0xNineDec, 0xsanson, antonttc, berndartmueller, BowTiedWardens, catchup, dirk_y, Alex the Entreprenerd, horsefacts, Metatron, sseefried, and unforgiven_
### Impact
Fees are applied during `withdraw`, but ca... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | access-control | false | false | ## Medium: Approval Not Updated when Changing the Marketplace Address in `TalentirTokenV1`
### Description
**Update**
In PR-41, the team added functionality that allows the `owner` to remove approval of an address for a list of user wallets. This functionality adds some centralization risk, as the owner is free to rev... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | oracle | true | false | ## Low: Unused response parameter should be removed
### Description
**Description:** The `_estimatedCollateralValueUSD` parameter decoded from the Chainlink Functions response and passed as an argument to `AutoRedemption::legacyAutoRedemption` is not used and can be removed:
**The Standard DAO:** Fixed by commit [59... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | overflow | true | false | ## Low: Casting from `u64` to `i64` causes genuine deposit requests to fail in `deposit` function
### Description
**Description:** The `deposit` function in `deposit.rs` casts the amount value( the amount of tokens trader is willing to deposit) which is of type `u64` to `i64` when `deposit_all` is set to `true`. When ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | overflow | false | false | ## Low: calculateDepositBonus() doesn't take into account sharesExiting
### Description
The function `calculateDepositBonus()` doesn't take into account `sharesExiting`, while `calculateRedeemPenalty()` does. As confirmed by the project, `calculateDepositBonus()` should also do this.
### Recommendation
Change functio... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | access-control | false | false | ## Medium: `TimelockSafeGuard.updateMinDelay` Lacks Minimum and Maximum Limits
### Description
The `TimelockSafeGuard.updateMinDelay` function allows the `DEFAULT_ADMIN_ROLE` to set any value for the **\_minDelay**, including an unreasonably large value that could effectively freeze all future proposals. Proposals wit... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | dos | false | false | ## Low: `Beacon`'s gas helper functions can underestimate the gas limit required for `lzReceive()`
### Description
The `getSendOptions()` and `getReadOptions()` functions of the `Beacon` contract are helper functions that can be used to estimate the gas limit for the `lzReceive()` call. However, these calculations do ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: On-chain logic cannot reliably prevent a malicious beneficiary from purchasing tokens at a discount ✓ Fixed
### Description
The `buy()` function contains unique logic for identifying and processing an investment by the beneficiary:
**code/contracts/DecentralizedAutonomousTrust.vy:L650-L658**
```
elif(self.... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | true | false | ## Low: Missing Call to `\_\_ReentrancyGuard\_init()` in the initialize() Function
### Description
Most contracts use the delegateCall proxy pattern, and hence their implementations require the use of `initialize()` functions instead of constructors. This requires derived contracts to call the corresponding init funct... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | token | true | true | ## Medium: User can silently burn tokens in the GNTDeposit withdraw function
### Description
Only the Concent user should be able to burn tokens, but normal users can work around this restriction using the `withdraw` function to transfer tokens to the special address `0xdeadbeef`. This effectively allows tokens to be ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Users can avoid paying borrowing fees
### Description
Users might submit an account they control as the `fee_account`. If the intention is to use just one account to gather fees, consider hardcoding the address instead of passing it as an argument:
`src/processor/swap.rs#L78` | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: EXPERIMENTAL KEYWORD USAGE
### Description
**ABIEncoderV2** is enabled and using experimental features could be dangerous in live deployments. The experimental ABI encoder does not handle non-integer values shorter than 32 bytes properly. This applies to bytesNN types, bool, enum and other types when they are ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | signature | true | false | ## Low: Simplify `depositWithSignature` function
### Description
The parameter `approveMax` of `depositWithSignature` function could be removedready, the permit `assets` should be always equal to deposit `assets`
File: /src/sfrxETH.sol | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | token | true | false | ## Medium: Token Transfer Reverts Leading to Blocked Foreclosure
### Description
The `_executeForeclosure` function is invoked during the foreclosure flow to execute the logic required to repay unsecured debt. Using the assets withdrawn from the lender, it repays the borrowed amount, subtracts the fee, and sends the r... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: Hardcoded Stable Token Price in VaultPriceFeed.sol
### Description
Severity : Low
Status : Acknowledged
Description
In the VaultPriceFeed.sol contract, the price of stable tokens is hardcoded as 1e30, it assumes that all stable tokens will indefinitely maintain their peg to their underlying assets. This ass... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | front-running | false | false | ## High: Frontrunning Matched Funds for Unfair Gains
### Description
## Potential for Frontrunning in Matching Funds
There is potential for frontrunning when matching funds are allocated. This issue arises due to the way matched amounts are distributed. The emojicoin arena module features a mechanism where users may ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | front-running | false | false | ## Medium: DoS: Attacker May Front-Run `createSplit()` With A `merkleRoot` Causing Future Transactions With The Same `merkleRoot` to Revert
### Description
_Submitted by kirk-baird_
A `merkleRoot` may only be used once in `createSplit()` since it is used as `salt` to the deployment of a `SplitProxy`.
The result is a... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | initialization | true | false | ## Gas: Refactor `PublicStockOnRamp::initializedNavProvider`, `BaseOffRamp::nonZeroLiquidityProvider` into internal functions to prevent identical storage reads
### Description
**Description:** `PublicStockOnRamp` has a modifier `initializedNavProvider` that reads the `navProvider` storage slot, but then later on in t... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | overflow | false | false | ## Low: Integer Overflow on Empty List in onlyCompatibleInputArrays
### Description
Description
The modifier onlyCompatibleInputArrays verifies whether two lists of uint256 satisfy certain conditions,
namely:
•both lists should be of the same length,
•the numbers inside the list are ascending.
When both lists are empt... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | dos | true | false | ## Medium: Incorrect Absolute Value Calculation in `_abs` Function Leads To DoS on Tokens with More Than 18 Decimals
### Description
**Severity**
**Impact:** High
**Likelihood:** Low
**Description**
The function `_abs(int256 x)` is designed to return the absolute value of the input `x`. However, due to an error in... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | token | true | true | ## Medium: Initial griefing attack possible
### Description
The famous initial deposit attack is largely mitigated by the `+1` done in the asset/shares conversion. However, doing this attack can cause some strange behavior that could grief users (at high cost of the attacker) and leave the vault in a weird state:
Her... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | cyfrin_structured | medium | access-control | true | true | ## Medium: Missing access control in `SDLVesting::stakeReleasableTokens`
### Description
The [`SDLVesting::stakeReleasableTokens`](https://github.com/stakedotlink/contracts/blob/3462c0d04ff92a23843adf0be8ea969b91b9bf0c/contracts/vesting/SDLVesting.sol#L108) function is meant to be driven by a trusted staking bot, run ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | token | true | false | ## Medium: Incorrect HARD\_CAP Configuration
### Description
The contract defines the HARD\_CAP as follows:
```
uint256 public constant HARD_CAP = 110_000_000 ether; // <= 110_000_000e18
```
This configuration assumes 18 decimal places, which is standard for many ERC20 tokens.
However, the contract explicitly defi... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | other | false | false | ## High: Delayed price increase after target amount raised
### Description
The [token price](https://github.com/fiinu/smart-contract/blob/7589b9d137bbf902e142e4f0476b06976e390bdb/FiinuCoin.sol#L194%5D) is meant to start increasing after the target amount of 100,000 ETH has been raised. However, due to the ordering of ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | oracle | false | false | ## High: Precision error in \_fetchTWAP causes vesting to be free after initial lockdrop period
### Description
**Details**
[BlueberryStaking.sol#L830-L843](https://github.com/Blueberryfi/blueberry-staking/blob/efaf7fc690e38914ba475d5ac61a4d0bd3f45c0d/src/BlueberryStaking.sol#L830-L843)
// Adjust for decimals
if... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | false | false | ## Medium: Unused field in Package
### Description
**Description**
Field “status” of package structure is unused. In order to decrease storage usage is better to
remove it and replace mapping for Packages to mapping for maxPayout numbers.
**Recommendation**:
Remove Package structure and use mapping(uint=>uint) to trac... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | initialization | false | false | ## Gas: Use of post-Increment ( i++) in loop leads to extra gas used
### Description
In Solidity, using the post-increment operator (`i++`) instead of the pre-increment operator (`++i`) may slightly increase gas usage. The post-increment operator temporarily stores the initial value before incrementing, resulting in u... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | cyfrin_structured | low | other | true | false | ## Low: Remove `< 0` checks for unsigned variables since they can't be negative
### Description
Remove `< 0` checks for unsigned variables since they can't be negative:
File: `src/DropBox.sol`
```solidity
538: if (_randomWords[i] <= 0) revert InvalidRandomWord();
``` | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | oracle | true | false | ## Low: Calling process function will not revert even if two oracle nodes of the same type are used
### Description
Report type: Smart Contract
Target: https://testnet.snowtrace.io/address/0xA758c321DF6Cd949A8E074B22362a4366DB1b725
Impacts:
* Contract fails to deliver promised returns, but doesn't lose value
## D... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: `CardAllocationPool` should use `ERC1155HolderUpgradeable`
### Description
_Resolved_
`CardAllocationPool` is an upgradable contract, but currently uses `ERC1155Holder` instead of `ERC1155HolderUpgradeable`. While this does not impact functionality, it is considered best practice to use the upgradeable contra... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | initialization | true | false | ## High: Beneficiary cant get `fairSideConviction` NFT unless they only claim once, and only after it's fully vested
### Description
_Submitted by WatchPug, also found by cmichel_
Based on the context, once the beneficiary claimed all their vesting tokens, they should get the `fairSideConviction` NFT.
However, in th... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: [04] Bps parameters are not validated to not exceed 1e4
### Description
https://github.com/code-423n4/2023-10-party/blob/b23c65d62a20921c709582b0b76b387f2bb9ebb5/contracts/crowdfund/ETHCrowdfundBase.sol#L165
https://github.com/code-423n4/2023-10-party/blob/b23c65d62a20921c709582b0b76b387f2bb9ebb5/contracts/cro... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | signature | true | false | ## Low: Replay attack In `StakingPool.sol`
### Description
The `StakingPool.sol` contract is designed to handle multiple `Staking.sol` contracts, e.g., SXT and USDC, because the owner can use `StakingPool.sol#addStakingContract()` for that.
When the user calls `Staking.sol#claimUnstake()`, the SXT Chain will perform ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | false | false | ## Low: Unnecessary `Ownable2StepUpgradeable` inheritance in `Router`
### Description
The `Router` contract inherits both from `Ownable2StepUpgradeable` and from `AccessManagedUpgradeable` via `Dispatcher`. It looks as if originally, `Ownable2StepUpgradeable` might have been used to manage ownership and access control... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | true | false | ## Low: Lack of event emission after critical `initialize()` functions
### Description
To record the init parameters for off-chain monitoring and transparency reasons, please consider emitting an event after the `initialize()` functions: | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | token | false | false | ## High: Owner is able to withdraw reward tokens.
### Description
**Description**
Bribes.sol: function recoverERC20().
Owner is able to withdraw any tokens from the contract, including reward tokens, which
might lead to errors in reward distribution. In case, owner is set to a DAO contract, this can
potentially be us... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | false | false | ## Low: Clickjacking Vulnerability in failsafe.eleoslabs.io
### Description
**Severity** : Low
**Status**: Resolved
**Description** :
Clickjacking, also known as UI Redress Attack, is a malicious technique where an attacker tricks a user into clicking on something different from what the user perceives. In this ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | other | false | false | ## High: Extrinsic with multiple storage mutations isn’t annotated with #[transactional]
### Description
**Occurs**:
Basilisk-node/pallets/duster/src/lib.rs:197
Basilisk-node/pallets/nft/src/lib.rs:84,107
Not using #[transactional] can lead to storage corruption.
**Recommendation**:
Use #[transactional] for every ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | other | true | false | ## High: Seller Pays Buyer's Trade Fee in Token Swaps, Leading to Systematic Theft of Funds
### Description
The inconsistent fee deduction logic in token swap settlement will cause a direct loss of funds for sellers as buyers execute token swap trades where the buyer's trade fee is deducted from the seller's proceeds ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: refundDestination cannot be configured
### Description
The `refundDestination` address determines where excess funds from a swap execution are sent to. Currently, this value is not used by the `swapTokens()` function.
### Recommendation
Consider checking for a configured `refundDestination` when encoding the U... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: `ConfigurablePause.sol` some indexed parameters are not particularly useful
### Description
**Not sure it makes sense to index this**
https://github.com/solidity-labs-io/kleidi/blob/1a06ac16bc99d0b4081281329d03064c3737f5e4/src/ConfigurablePause.sol#L46-L47
That would be helpful to find all events at a time,... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: NatSpec is incomplete
### Description
*There are 19 instances of this issue:*
https://github.com/code-423n4/2022-07-golom/blob/e5efa8f9d6dda92a90b8b2c4902320acf0c26816/contracts/core/GolomTrader.sol#L162-L170
https://github.com/code-423n4/2022-07-golom/blob/e5efa8f9d6dda92a90b8b2c4902320acf0c26816/contracts... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | storage | false | false | ## Low: UPGRADE TO AT LEAST PRAGMA 0.8.10
### Description
Gas optimizations and additional safety checks are available for free when using newer compiler versions and the optimizer.
* Safemath by default since 0.8.0 (can be more gas efficient than the SafeMath library)
* Low level inline: as of 0.8.2, leads to cheape... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | rounding | true | false | ## Medium: Collateral Decimals Mismatch
### Description
## Notional Size Calculation in Exchange Contract
Within Exchange, specifically in the computation of `notionalSize` during the `executeOrder` process, a calculation occurs for determining the exponent needed to adjust the `notionalSize` precision.
## Exchange.... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | front-running | true | false | ## Medium: Withdrawing all funds at once to vault can be DoS attacked by frontrunning and locking dust
### Description
_Submitted by berndartmueller, also found by minhquanym_
All funds can be migrated (withdrawn) at once to the caller vault by using the `BaseStrategy.withdrawToVault` function which internally calls ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | flash-loan | false | false | ## Low: Interaction with External Contracts
### Description
**Update**
The client acknowledged this issue.
**File(s) affected:**`Sleeves.sol`, `ERC20Rewarder.sol`, `PDTStakingBatch.sol`
**Description:** The protocol relies on the functionalities of external contracts. Therefore, the security of the project depends o... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | false | false | ## Medium: Lack of input validation in replacePool() allows curated pool limit bypass in Router.sol
### Description
## Handle
0xRajeev
## Vulnerability details
## Impact
There is no input validation in replacePool() function to check if oldToken exists and is curated. Using a non-existing oldToken (even 0 address... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | liquidation | true | false | ## Medium: Restricted Token Redeem Period When lagDuration == 0
### Description
If `lagDuration` == 0, users may have only a limited period, potentially just 1 hour in a day, to claim their token. When `lagDuration` == 0, the pool is not time-locked. Therefore, users are supposed to redeem their tokens instantly. Howe... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | rounding | false | false | ## High: Significant Rounding Error in Loan-to-Value Calculation
### Description
**Description:**
In the getLTVOfLoan function, the calculation of the loan-to-value (LTV) ratio involves a division by 1e18 for both tokenLendingTotalValue and tokenCollateralTotalValue. This division can lead to a significant loss of pr... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | reentrancy | true | false | ## Low: Risk of out-of-gas revert due to use of transfer() in claimFees
### Description
The `VaultFactory.claimFees` function uses the low-level `transfer()` operation to move the collected ETH fees to another arbitrary address. The `transfer()` operation sends only 2,300 units of gas with this operation. As a result,... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Wrong player ID in `EthPrizeAwarded` event
### Description
_Acknowledged_
The `awardEthPrize` and `awardEthPrizeBatch` functions emit playerId: 0 to indicate no player association. However, `nextPlayerId` starts from 0, meaning the first player added has `playerId` 0. This creates ambiguity in off-chain index... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | storage | false | false | ## Medium: Incorrect storage slot assignments
### Description
We have the extracted storage layout of the GNSMultiCollatDiamond contract.
```
| Name | Type | Slot | Offset | Bytes |
| _initialized | uint8 | 0 | 0 | 1 |
| _initializing | bool | 0 | 1 | 1 |
| addressStore | AddressStore | 1 | 0 | 1632 ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | false | false | ## Medium: `collectedFee` can be easily inflated.
### Description
**Severity**: Medium
**Status**: Resolved
**Description**
The `calculateSetupRate()` and `calculateUpDownRate()` functions within the `Treasury.sol` smart contract calculates the amount of fees and updates the global variable `collectedFee` among ot... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | signature | false | false | ## Low: Remove commented-out function
### Description
A legacy version of `isValidSignature()` still remains commented-out in `ERC4337Account`. This function is now implemented in the inherited `ERC1271` contract, so the commented-out version can be removed.
### Recommendation
Remove the commented-out `isValidSignatu... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | solodit_api | medium | other | false | true |
When `MIN_VOTING_POWER_REQUIRED` is changed, tokenIDs with votes lower than `MIN_VOTING_POWER_REQUIRED` will not be able to vote through the delegate function, but previous votes will not be affected.<br>
Since `MIN_VOTING_POWER_REQUIRED` is mainly used to reduce the influence of spam users, changing this value should... | Code4rena | 5 | Golom |
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | overflow | true | false | ## Medium: Overflow In Calculation Of Delta A
### Description
The `numberator` value is not validated before running `u256::shlw` on it. As a result, the non-zero bytes might be removed, which leads to an incorrect calculation of the value.
```rust
let numberator = u256::shlw(full_math_u128::full_mul(liquidity, sqrt_... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | cyfrin_structured | low | token | true | false | ## Low: Unsafe transfer of non-standard ERC-20 tokens
### Description
The `DistributionManager` uses the standard ERC-20 `transfer()` function instead of a safe transfer equivalent when distributing reward tokens to controllers. While the reward token (QI) is a known, trusted contract that conforms to the ERC-20 speci... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | signature | false | false | ## Low: Outdated Cosmos SDK
### Description
The EMoney Appchain project is currently using an outdated version of the Cosmos SDK (v0.46.13). This version is affected by multiple security vulnerabilities of varying severity.
**Identified Vulnerabilities:**
1. ASA-2024-002 (GHSA-2557-x9mg-76w8)
- Severity: Moderate
... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Penalty calculation in `previewRedeem` rounds in the wrong direction
### Description
The `previewRedeem` method in `AutoPxEth` calculates the penalty with the following code:
The issue is that the math rounds down the penalty, but following the ERC4626 standard you should follow best security for the vault a... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | oracle | true | false | ## Medium: Max Allowed Deviation of 500 (5%) Is Too High for `Engine` Logic
### Description
Excessive price-deviation ceiling (±5%) enables loss and manipulation.
`MAX_PRICE_DEVIATION_UPPER_BOUND = 500` lets operators configure assets to mint when the oracle reads **$0.95–$1.05** for a $1 stable (USDC/USDT). That’s u... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | cyfrin_structured | high | access-control | true | false | ## High: Missing access control on critical `FeeController` setters
### Description
`FeeController.setFunctionFeeConfig()`, `setTokenGetter()`, and `setGlobalTokenGetter()` are declared `external` but have **no modifier** restricting the caller. Any account can freely (re)configure fee percentages, token-getter addres... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Use the Address library.
### Description
**Description**
Lines 51-52, function withdraw(). Sending ether should be performed with the function
Address.sendValue, which already performs all necessary validations.
**Recommendation**:
Use Address.sendValue instead. | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | solodit_api | high | Lending Pool | true | true | Source: https://github.com/sherlock-audit/2024-03-woofi-swap-judging/issues/68
The protocol has acknowledged this issue.
## Found by
mstpr-brainbot
## Summary
The pool can be drained just as it was during the incident that occurred previously.
## Vulnerability Detail
`maxNotionalSwap` and `maxGamma` and the new mat... | Sherlock | 4.666667 | WOOFi Swap |
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | cyfrin_structured | low | oracle-manipulation | true | false | ## Low: Missing array length check
### Description
The `ChainlinkOracle::quoteFungibles` function assumes that the `fungibles` and `amounts` arrays passed as arguments are of equal length. It iterates over `fungibles.length` and accesses `amounts[i]` for each index. If `amounts.length` is less than `fungibles.length`,... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Accidentally sent native currency is not refunded for intents
### Description
While `Eco7683OriginSettler._openEcoIntent()` refunds any `msg.value` sent in excess of `intent.reward.nativeValue`, it does so only if `intent.reward.nativeValue > 0`. An intent creator who accidentally sends native currency but wit... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | dos | true | false | ## Low: Lido stake rate limit could lead to unexpected reverts
### Description
To mitigate the effects of a surge in demand for stETH on the deposit queue, Lido has implemented a rate limit for stake submissions. This rate limit is ignored by the `lidoSwapWethToWstEth` method of the Swapper library, potentially leadin... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Use of tx.origin to Validate EOA Sender
### Description
In the [`OnlyEOAPolicy`](https://github.com/ironblocks/onchain-firewall/blob/8f4fcf861d53c835ed005db67b8af4037464e0ca/contracts/policies/OnlyEOAPolicy.sol#L20), the sender is considered an EOA if `sender == tx.origin`. If the transaction is coming via a t... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | overflow | true | false | ## High: `FluidLocker::_getUnlockingPercentage()` uses 540 instead of `540 days` leading to stuck funds as the unlocking percentage will be bigger than `100%` and underflow
### Description
[FluidLocker::_getUnlockingPercentage()](https://github.com/sherlock-audit/2024-11-superfluid-locking-contract/blob/main/fluid/pac... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Contracts specify outdated compiler version
### Description
Some Parity contracts specify an outdated version of the Solidity compiler. The Solidity compiler is under active development. Each new version contains new checks and warnings for suspect code.
**Figure 1:** Solidity releases new checks and warnings... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | liquidation | true | false | ## Medium: Zero duration will fail all repayment attempt
### Description
If a user sets a duration of **0** while borrowing a loan, repaying the loan will fail due to a "divide by zero" error, as `loanReceipt.duration` becomes **0**. This situation causes the user's loan to enter liquidation even if the user intended ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | other | true | false | ## High: VaderRouter._swap performs wrong swap
### Description
## Handle
cmichel
## Vulnerability details
The 3-path hop in `VaderRouter._swap` is supposed to first swap **foreign** assets to native assets, and then the received native assets to different foreign assets again.
The `pool.swap(nativeAmountIn, forei... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | false | false | ## Low: Protocol Token Cannot Be Unpaused
### Description
The `BaseERC20` contract implements the basic role management for the other contracts inheriting it.
In particular, it handles the [`PAUSER_ROLE` role](https://github.com/DigitalMOB2/refi-protocol/blob/dc842fd071f225c9d1ff9ad4677b986970125cf9/contracts/tokens... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | other | true | false | ## High: Incorrect math operation leads to underprediction of stored product
### Description
**Severity**
**Impact:** High
**Likelihood:** High
**Description**
The function `swap` is used to exchange tokens. The contract keeps track of two values: a product and a sum of the virtual balances to calculate the exchan... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: [05] Functions need a more descriptive name
### Description
Some functions say they set one thing but set something different and some function names are too ambiguous.
- [`setTreasuryRewardCutRate()`](https://github.com/code-423n4/2023-08-livepeer/blob/main/contracts/bonding/BondingManager.sol#L167) and [_se... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | oracle | false | false | ## Low: Missing events for only functions that change critical parameters
### Description
The afunctions that change critical parameters should emit events. Events allow capturing the changed parameters so that off-chain tools/interfaces can register such changes with timelocks that allow users to evaluate them and co... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | access-control | true | false | ## Medium: Missing a function to set royalties for specific tokenId
### Description
The `resetDefaultRoyalty` function is used to clear the royalty information set for specific tokenId.
```solidity
function resetDefaultRoyalty(uint256 _tokenId) external onlyRole(ADMIN_ROLE) {
_resetTokenRoyalty(_tokenId);
emit ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | initialization | false | false | ## High: totalUsers of tree is missing one
### Description
**Severity**: High
**Status**: Resolved
**Description**
phenomanelTree.sol - totalUsers of tree reflects the number of participants in the tree. Despite that, right on deployment on constructor call, we have the owner of the contract added as one of the par... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: Inconsistent effective swap fee calculations between `BunniQuoter::quoteSwap` and `BunniHookLogic::beforeSwap` due to incorrect application of hook and curator fees
### Description
**Description:** While both `BunniQuoter::quoteSwap` and `BunniHookLogic::beforeSwap` are intended to contain the same fee logi... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | reentrancy | true | false | ## Low: Transactor.DELEGATECALL Data Overwrite and selfdestruct Risks
### Description
## Security Analysis of Transactor Contract
## Severity: Low Risk
**Context:** `Transactor.sol#L46-L53`
**Description:** The Transactor contract contains a "general purpose" `DELEGATECALL` function that allows the owner to execute... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Withdrawal From Suspended Pool
### Description
## Withdrawal Issue in Solana Program
The withdraw function in the provided Solana program does not include a check to verify whether the single-sided liquidity pool is suspended before allowing a withdrawal transaction to proceed. Pools are generally suspended u... | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.