prompt
listlengths
2
2
source
stringclasses
3 values
severity
stringclasses
5 values
category
stringclasses
186 values
has_code
bool
2 classes
has_poc
bool
2 classes
reference_response
stringlengths
23
5k
firm
stringclasses
26 values
quality_score
float64
0
5
protocol
stringclasses
398 values
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: Public functions can be external ### Description It is good practice to mark functions as `external` instead of `public` if they are not called by the contract where they are defined. ### PROOF OF CONCEPT Instances include: #### manifest/Proposal-Store.sol l46 function AddProposal() l52 function QueryP...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
cross-chain
false
false
## Low: InceptionBridge contract assumes uniform decimal places across tokens ### Description The bridge contract operates under the assumption that all bridgeable tokens across supported chains have uniform decimal places. When tokens are deposited, the system records the quantity of tokens. Conversely, during withdr...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
other
false
false
## Gas: `PauseMarket()` can be optimized ### Description The function `pauseMarket()` on line 230 can be optimized. Recommend not using an argument and set .
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Display Of Important Transaction Information ### Description ## Transaction Approval Information The system utilizes Metamask’s snap dialog feature to present users with specific transaction-related details before approving the transaction. However, certain crucial transaction information is currently not bei...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
oracle
true
false
## High: The WETH tokens are not taken into account in the ConvexTradeExecutor.totalFunds function ### Description The `totalFunds` function of every executor should include all the funds that belong to the contract: **code/contracts/ConvexTradeExecutor.sol:L21-L23** ``` function totalFunds() public view override ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: An unvalidated index in some helper functions ### Description The following function expects value [0..3] as input, but does not implement asserting for the unexpected value, potentially provided by the user: - _get_token - _get_underlying - _get_token_mask - _get_underlying_mask - _approveTokens Related code...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
initialization
true
false
## Medium: `twAML` weights can be griefed by burning tokens ### Description Users can lock their liquidity in the `TOLP` contract and mint `OTAP` tokens in the `TOB` contract. The `TOB` contract has a special mechanism called `twAML` to balance out how much rewards they emit over time. Basically, if a user commits `O...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Deprecated `answeredInRound` is used in `SwapImpl` ### Description _Resolved_ In SwapImpl, we will fetch the current token price to calculate the slippage. In function `_readE18`, we will use `answeredInRound` to check the return value's validity. The problem here is that, according to https://docs.chain.lin...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: No 0 address check in ‘withdrawDepositTo’ function ### Description **Severity**: Low **Status**: Resolved **Location**: WalletAccount.sol **Description** `withdrawDepositTo` function in the provided code allows the withdrawal of an amount to a specified address. However, there is no check to ensure that th...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
liquidation
false
false
## High: Someone can create non-liquidatable auction if the collateral asset fails on transferring to address(0) ### Description ## Lines of code https://github.com/code-423n4/2022-07-yield/blob/main/contracts/Witch.sol#L176 https://github.com/code-423n4/2022-07-yield/blob/6ab092b8c10e4dabb470918ae15c6451c861655f/con...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
oracle
false
false
## Gas: [01] Use `!= 0` instead of `> 0` for unsigned integer comparison ### Description ### Proof of concept Found in line 99 at optimismContest/L1/L2OutputOracle.sol: require(_l2BlockTime > 0, "L2OutputOracle: L2 block time must be greater than 0"); Found in line 101 at optimismContest/L1/L2OutputOracle.sol: ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
oracle
false
false
## Low: Implicit casting ### Description Implicit casting is used to convert the [`price`](https://github.com/OriginProtocol/origin-dollar/blob/bf4ff28d5944ecc277e66294fd2c702fee5cd58b/contracts/contracts/oracle/OracleRouter.sol#L31) from `int256` to `uint256`. This could overflow if the price were negative, but the [...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
initialization
true
false
## Medium: Lack of finalized check on Airdrop claim ### Description ## Airdrop Vulnerability Analysis Airdrops can be claimed before they are finalized due to a lack of checks in `airdrop_claim_handler`. An attacker could exploit this vulnerability to claim the airdrop multiple times, as well as prevent airdrop final...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: Use safeTransfer & safeTransferFrom ### Description **Description** Some ERC-20 tokens will return on failure instead of reverting a transaction, Some tokens will even not return any value. not all tokens adhere to the standart of ERC-20
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
flash-loan
true
false
## Medium: Malicious lender can manipulate the fee to force borrower pay high premium ### Description When user creates a position, the fee is snapshot is queryed from uniswap v3 position manager when [preparing leverage](https://github.com/code-423n4/2023-12-particle/blob/a3af40839b24aa13f5764d4f84933dbfa8bc8134/cont...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
false
false
## Low: Owner can renounce Ownership ### Description [PirexRewards.sol#L4](https://github.com/code-423n4/2022-11-redactedcartel/blob/main/src/PirexRewards.sol#L4) Typically, the contract’s owner is the account that deploys the contract. As a result, the owner is able to perform certain privileged activities. The Ope...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
liquidation
true
false
## Gas: A modifier used only once and not being inherited should be inlined to save gas ### Description https://github.com/code-423n4/2023-01-astaria/blob/1bfc58b42109b839528ab1c21dc9803d663df898/src/CollateralToken.sol#L253-L263 The above modifier is only being called on [Line 333](https://github.com/code-423n4/202...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Long lines are not suitable for the ‘Solidity Style Guide’ ### Description [ProfilePicture.sol#L56](https://github.com/code-423n4/2023-03-canto-identity/blob/077372297fc419ea7688ab62cc3fd4e8f4e24e66/canto-pfp-protocol/src/ProfilePicture.sol#L56) [Bio.sol#L41](https://github.com/code-423n4/2023-03-canto-identi...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
cross-chain
false
false
## Low: Wrong parameter on lp\_unlock near call at unlock\_tokens in Relayer ### Description **Description:** From Relayer, it passes { nonce, proof } as param to lp\_unlock call. However, actual near implementation has just one param proof.![ref5] **Recommendations:** As proof includes nonce and everything looks ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
false
false
## Low: Bypassing the Total Supply Constraint in `manageVaultWithMerkleVerification` ### Description This issue has been identified within the [manageVaultWithMerkleVerification](https://github.com/Se7en-Seas/cMETH-boring-vault/blob/d6e2d18f45a3e05d749d34966139fc85fc47f7e6/src/base/Roles/ManagerWithMerkleVerification....
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: `abi.encodePacked()` should not be used with dynamic types when passing the result to a hash function such as `keccak256()` ### Description *Similar issue in the past: [here](https://github.com/code-423n4/2021-09-wildcredit-findings/issues/4)* Use `abi.encode()` instead which will pad items to 32 bytes, which...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: GoUnusedExportedFunction ### Description **Severity**: Low **Status**: Acknowledged **Description:** Some exported functions are not used within the codebase. **Files**: Multiple files throughout the codebase. **Recommendation**: Consider removing these functions if they are not part of the public API....
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: `processWithdrawals()` incorrectly updates of `totalLiquidity` ### Description - In `processWithdrawals()` function: when the `_withdrawShares = 0`, the `s.totalLiquidity` is increased by the liquidity of the collected-and-deposited fees of the position, where it assumes that the totalLiquidity of the posit...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
oracle
false
false
## Low: Unsafe cast ### Description The `OracleRouterBase` contract [uses an unsafe cast](https://github.com/OriginProtocol/origin-dollar/blob/508921bd39f988fa61b60cea372b910725ff7bd0/contracts/contracts/oracle/OracleRouter.sol#L43) to convert the signed price to a `uint256` type. Consider ensuring the price is positi...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
dos
true
false
## Medium: Changes of the `UnbondingTime` are not accounted for ### Description The `andromeda-validator-staking` contract allows the owner to stake and unstake tokens, adding unstaking entries to an `UNSTAKING_QUEUE`. The unstaking process is dependent on the `UnbondingTime` parameter of the chain, which can be chang...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
flash-loan
false
false
## High: Unsynchronized positions in `NonFungiblePositionManager` and `AlgebraEternalFarming` can be exploited for receiving unfair rewards ### Description If `FarmingCenter._updatePosition` reverts internally, `NonFungiblePositionManager` ignores that revert here: https://github.com/cryptoalgebra/Algebra/blob/7290fad...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
liquidation
true
false
## Low: liquidatableCollateralRatio update can force liquidation without warning ### Description The `DEFAULT_ADMIN_ROLE` can update the `liquidatableCollateralRatio` without notifying users who hold positions in the rebalance pool. This action could potentially trigger or hinder liquidations without giving users a ch...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Path Traversal In HTTP Requests ### Description ## Security Consideration in Axios Usage Some URLs built inside `axios.get` in the server API may be path traversed when the user controls the URL parameters completely. ## Code Example In this case, inserting a `../../` inside the `stride_addr` attacker-cont...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
initialization
true
false
## Medium: First depositor inflation attack in `PendlePowerFarmToken` ### Description In certain scenarios, shares of a subsequent depositor can be heavily reduced, losing a large amount of his deposited funds, the attacker can increase the right side of the `previewMintShares` by adding rewards for compounding. That...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
dos
true
false
## High: Tokens can get stuck in Executor contract if the destination doesn’t claim them all ### Description The function `execute()` increases allowance and then calls the recipient (`_args.to`). When the recipient does not use all tokens, these could remain stuck inside the Executor contract. **Notes:** - The exec...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
true
false
## Low: UNBOND WAIT LISTS CAN BE MIGRATED EVEN IF THE CONTRACT IS NOT PAUSED ### Description The `migrate_unbond_wait_lists` function in the **krp-staking-contracts/basset\_sei\_hub** contract allows migrating the unbond wait lists without previously verifying whether the contract is paused or not, which could break t...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
dos
true
false
## Low: Unbounded Chunk Size Can DoS Blocked Withdrawal Queue Processing ### Description ## Severity: Low Risk **Context:** `BlockedWithdrawalQueue.sol#L367-L371` **Description:** The `processBlockedWithdrawals()` function in `BlockedWithdrawalQueue` uses a `chunkSize` parameter to limit the size of blocked withdr...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
front-running
false
false
## Low: [01] Using `block.timestamp` as deadline ### Description * This approach exposes the contract to potential front-running and sandwich attacks, where malicious actors can exploit the transaction’s timing to manipulate the swap outcome. * It allows for indefinite pending transactions in the mempool, which can le...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: Cannot unpause exchange ### Description The `OneInchExchange.sol` contract exposes [a mechanism](https://github.com/1inch-exchange/1inch-v2-contracts/blob/72f2812837fdd73ec2d32c8988811df361e80985/contracts/OneInchExchange.sol#L179) for the owner to pause the contract. This [disables the `swap` functionality...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
reentrancy
false
false
## Low: Remove unnecessary comment ### Description At https://github.com/sushiswap/bentobox/blob/c2e150b16b8764ebfe2e1e6e267ae14e10738065/contracts/LendingPair.sol#L429 the comment > // TODO: Reentrancy issue? Should we take a before and after balance? it is not really needed because it seems there is no re-entrancy ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Remove unused code ### Description This code is not used in the project, remove it or add event-emit;
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
overflow
false
false
## High: Truncation in `OrderValidator` can lead to resetting the fill and selling more tokens ### Description [OrderValidator.sol#L228](https://github.com/code-423n4/2022-05-opensea-seaport/blob/4140473b1f85d0df602548ad260b1739ddd734a5/contracts/lib/OrderValidator.sol#L228) [OrderValidator.sol#L231](https://github.co...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
false
false
## High: Division by zero in share conversion leads to panic and denial-of-service ### Description **Severity:** High **Path:** x/liquidstake/types/liquidstake.go:NativeTokenToStkXPRT, StkXPRTToNativeToken#L167-L175 **Description:** Both functions `NativeTokenToStkXPRT` and `StkXPRTToNativeToken` are used to conver...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
reentrancy
true
false
## High: Users who deposited MIM and USDB tokens into BlastOnboarding may incur losses when the pool is created via bootstrap ### Description Users can deposit `MIM` and `USDB` tokens into `BlastOnboarding`. Once `locked`, these tokens cannot be `unlocked`. The `locked` tokens will be utilized to establish a `MagicLP ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
rounding
true
false
## High: Misuse of curve pool calls results for precision loss and unintended revertion ### Description Hello team,
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
solodit_api
high
access-control
true
true
A malicious actor can hijack a minipool of any node operator that finished the validation period or had an error. The impacts: 1. Node operators staked funds will be lost (Loss of funds) 2. Hacker can hijack the minipool and retrieve rewards without hosting a node. (Theft of yield) 2.1 See scenario \#2 comment fo...
Code4rena
5
GoGoPool
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
other
true
false
## Gas: [12] `require()`/`revert()` strings longer than 32 bytes cost extra gas ### Description *There is 1 instance of this issue:* https://github.com/code-423n4/2022-05-backd/blob/2a5664d35cde5b036074edef3c1369b984d10010/protocol/contracts/tokenomics/Minter.sol#L150-L153
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
reentrancy
true
true
## High: Reentrancy and untrusted contract call in mintMultiple Difficulty: Low ### Description Missing checks and no reentrancy prevention allow untrusted contracts to be called from `mintMultiple`. This could be used by an attacker to drain the contracts. ```solidity function mintMultiple ( address[] calldata _asse...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
other
true
false
## Gas: Simply unchecked operations can be done directly in the code, instead of being imported from the library ### Description File `ethereum/contracts/common/libraries/UncheckedMath.sol` is a library which implements two simple unchecked functions: `uncheckedInc()` and `uncheckedAdd()`. Those functions are used acr...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Unexpected vesting schedule when claiming ### Description Though the vesting schedule can be really important for users during auction it can be changed during the whole the contract lifetime or being not set at all. Consider setting a vesting schedule only before the sale begins.
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: Missing Zero Address Checks ### Description Multiple contracts are missing zero address checks for setting storage variables. Accidentally setting an address variable to address zero might result in an incorrect configuration of the protocol. For instance, the following parameters are not checked: * [`_multi...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
oracle
false
false
## High: Agent Data Oracle signed credential front-running attack ✓ Fixed ### Description For almost every action as an `Agent`, the owner of the `Agent` is supposed to request `SignedCredential` data that contains all the relevant current info about the “off-chain” state of the `Agent`. New credentials can only be re...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
medium
other
false
false
## Medium: Excess eth not refunded to user in `MysteryBox::revealMysteryBoxes()` ### Description `MysteryBox::revealMysteryBoxes()` [allows execution](https://github.com/Earnft/smart-contracts/blob/43d3a8305dd6c7325339ed35d188fe82070ee5c9/contracts/MysteryBox.sol#L196-L198) if `msg.value >= mintFee` but in the case wh...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
access-control
true
false
## Medium: Excessive authority for `setVault` function in `VaultOwned` contract. ### Description **Description** contract VaultOwned - in body of setVault( address vault_) external returns (bool) onlyOwner Too much authority for one executor that might lead to funds embezzled if not trusted **Recommendation** Use ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
true
false
## Low: Dust due to rounding tax calculations will accumulate in `AngstromL2` and cannot be recovered ### Description **Description:** The sum of rewards owed to positions can be less than the total tax amount due to rounding. While it is correct to round down these proportional share calculations, any dust that is no...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
overflow
false
false
## Low: Potentially unsafe unchecked math ### Description Throughout the [`FixedRateSwap`](https://github.com/1inch/fixed-rate-swap/blob/b1600f61b77b6051388e6fb2cb0be776c5bcf2d1/contracts/FixedRateSwap.sol) contract, there are many uses of `unchecked` math. The main reason for using `unchecked` math is to remove overf...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
initialization
true
false
## Medium: 3S-LENFT-M01 protocol/Gauges/GaugeController.sol: incorrect getRewardsCeiling() logic ### Description The current implementation of the GaugeController has the following [function](https://github.com/leNFT/contracts/blob/master/contracts/protocol/Gauges/GaugeController.sol#L478-L491) to calculate the reward...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Missing `override` keyword ### Description `DropEngineV2` inherits `configureSequence` method from `IEngine` but is missing the `override` keyword.
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
false
false
## High: YT holder are unable to claim their interest ### Description A malicious user could prevent YT holders from claiming their interest, leading to a loss of assets. ### Impact YT holders cannot claim their interest, leading to a loss of assets. ### Recommendation Ensure that the YT holders can continue to clai...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
initialization
true
false
## Gas: Mark state variables as immutable and constant where relevant ### Description The `stakingRewardsGenesis` is a state variable that is assigned in the constructor and cannot possibly be changed. Thus, it can be marked as `immutable`. Immutable variables are not stored in contract storage, which means they do no...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
initialization
true
false
## Medium: Stuck rewards in `FeeSplitter` contract ### Description Curves protocol incentivize users to buy subjects and hold it for a prolonged time to receive high rewards, and the claimable rewards amount entitled for each user is calculated based on the user subject balance times the difference between the subject...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: return in function payManagementFees() is not necessary ### Description The return in the function `payManagementFees()` is somewhat confusing, because it is done in the `if`, but not at the end of the function. The return is also not necessary because it’s also the return parameter. ### Recommendation Consid...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
liquidation
true
false
## Low: Useless Withdraw Operation In Lending ### Description ## Optimization in Lending.move In `lending.move`, within `repay` and `liquidation_call`, the invocation of `withdraw` may be avoided. Subtracting the `excess_amount` before the deposit operation when calculating the amount deposited avoids the invocation....
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
true
false
## Low: Inconsistencies In Deposit Instruction ### Description ## Deposit Instruction and Stake Pool Interactions In the deposit instruction, the `if deposit_sol` block interacts with the stake pool program to handle SOL deposits. In the stake pool program, `sol_deposit_authority` is an optional authority required fo...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
token
false
false
## Medium: Missing Handling for Tokens with Transfer Fees in `fillOrders()` ### Description **Severity**: Medium **Status**: Acknowledged **Location**: AdvancedOrderEngine.sol **Description** The `fillOrders()` function in `AdvancedOrderEngine.sol` does not account for tokens that force a fee on transfers, such as...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
token
true
false
## Medium: Possible loss of tokens ### Description https://github.com/pie-dao/ExperiPie/blob/facf3c246d9c43f5b1e0bad7dc2b0a9a2a2393c5/contracts/facets/ERC20/LibERC20.sol#L17 If the value of the `_to` parameter is equal to zero, then the tokens will be lost, because they cannot be disposed of. However, the value of the...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
true
false
## High: Improper Settlement Calculation ### Description ## PerpEngine Settlement State Calculation In PerpEngine, `getSettlementState` is used to calculate the amount that users can settle at that time by calculating the total profit/loss that they made in the perp market. ## Code Snippet ## Profit and Loss Calcu...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
liquidation
false
false
## Medium: `PositionManager#liquidatePosition` fails to update vaultDebt and vaultCollateral ### Description **Details** **First discovered by Dev team during audit period** [PositionManager.sol#L169-L185](https://github.com/hyperstable/contracts/blob/35db5f2d3c8c1adac30758357fbbcfe55f0144a3/src/core/PositionManager...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
front-running
false
false
## Low: `TalentirMarketplaceV1.cancelOrders()` Front-Runnable ### Description **Update** The Talentir team updated the documentation surrounding the cancel order function to inform users. We recommend also informing users on the front-end of the application. The change was made in PR-40. **File(s) affected:**`Talenti...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: Basis points usage deviates from general definition ### Description ## Handle 0xRajeev ## Vulnerability details ## Impact The general definition of basis points is 100 bps = 1%. The usage here, 1000 bps = 100%, deviates from generally accepted definition and could cause confusion among users/creators/affi...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
false
false
## Low: FulfillInterpreter - Wrong order of actions in fallback handling ### Description When a transaction with a `callTo` that is not `address(0)` is fulfilled, the funds to be withdrawn on the user’s behalf are first transferred to the `FulfillInterpreter` instance that is associated with this `TransactionManager` ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
liquidation
true
false
## Medium: Users can borrow all loan tokens ### Description Utilization rate check can be bypassed depositing additional loan tokens and withdrawing them in the same transaction. ### Impact The vulnerability allows to drain all the liquidity from the pool, which entails two problems: - The collateral ratio starts dec...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: CvxLocker.findEpochId stops after 128 iterations ### Description ## Handle cmichel ## Vulnerability details ## Vulnerability Details It's unclear why the binary search algorithm stops after `128` iterations. ## Impact It might not return the actual epoch id (although very unlikely as 128 iterations should...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
front-running
true
false
## High: Vault executes swaps without slippage protection ### Description The vault executes swaps without slippage protection. That will cause a loss of funds because of sandwich attacks. ### Impact Swaps will be sandwiched causing a loss of funds for users you withdraw their rewards. ### Recommendation Slippage pa...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
oracle
false
false
## Medium: Oracle Will Return the Wrong Price for Asset if Underlying Aggregator Hits `minAnswer` ### Description `convertFeeToEth()` in `PlatformLogic.sol` and `calculateArbAmount()` in `RewardsClaimer.sol` will return the wrong price for the asset if the underlying aggregator hits `minAnswer`. Chainlink's aggregato...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
true
false
## Medium: Rebalancing breaks and can corrupt the accounting if amountToProtocol or amountToChain turn negative ### Description Derby operates with deltas, but doesn't check that resulting amounts to be allocated are positive. This allows for possible griefing attack permanently corrupting protocol accounting. ### ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: [09] Configuration changes could drastically affect users and should be behind a timelock ### Description Several configuration update actions within the protocol can negatively impact users' transactions if changes occur just prior to transaction execution. https://github.com/code-423n4/2024-07-loopfi/blob/5...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
other
false
false
## Gas: Use assembly to write storage values ### Description ### Gas Report ### Lines * Owned.sol:15 * Owned.sol:19 * ETHRegistrarController.sol:61 * ETHRegistrarController.sol:62
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Consider tracking the msg.sender in the event emitted by the PublicAllocator contract ### Description Like it has been already done in other projects of the Morpho's ecosystem, the events emitted by the execution of the PublicAllocator should track the `msg.sender`. This information can be useful for external ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
liquidation
false
false
## Gas: Emit events first to refactor away local variables storing previous values ### Description **Description:** When values are being changed, emit events first to refactor away local variables storing previous values. For example in `SecuritizeAmmNavProvider::setPriceScaleFactor`: Similar optimizations can be m...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Lack of Hyperchain-ID-Specific (Un)freeze Reinforcement ### Description The [`reinforceFreeze`](https://github.com/zksync-association/zk-governance/blob/b2e01439937325ceb3d059d0f07c9d73339977a7/l1-contracts/src/ProtocolUpgradeHandler.sol#L363) and [`reinforceUnfreeze`](https://github.com/zksync-association/zk-...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
oracle
true
false
## Low: Data integrity issue with `revertBurnRequest` in `RipFunPacks` ### Description _Acknowledged_ In the `RipFunPacks` function, if a packet of type `INSTANT_OPEN` undergoes a `revertBurnRequest`, it can lead to a failure when the `fulfillRandomWords` function is later called by the `Chainlink`. However, in `Ca...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
cross-chain
true
false
## Medium: The rebalancing system is broken when everclear bridge contract is used ### Description The [sendMsg](https://github.com/sherlock-audit/2025-07-malda/blob/798d00b879b8412ca4049ba09dba5ae42464cfe7/malda-lending/src/rebalancer/bridges/EverclearBridge.sol#L110) in EverclearBridge contract only approves the **t...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
false
false
## Low: Privileged Roles ### Description **Update** **Acknowledged** with the following explanation: The roles are required for the Petaverse system as a whole to function as intended. **File(s) affected:**`Pet.sol` **Description:** The Admin role that belongs to the multisig wallet, as stated in the docs, can mark ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
false
false
## Low: [13] Special native-asset ERC‑20 addresses can bypass ETH-specific logic ### Description ### Vulnerability details Several chains expose the native token via a well-known ERC20 contract (e.g., CELO, Polygon’s `0x…1010`, zkSync’s `0x…800A`). The router assumes `address(0)` is the only native asset indicator. ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
false
false
## High: Lack of Zero Check in Inverse Computation for Tower Extensions ### Description The inverse functions in [fq2.rs](https://github.com/matter-labs/zksync-crypto/blob/ccf5fa30ee2c94b594126d7b4b75770cafbbab21/crates/boojum/src/gadgets/tower_extension/fq2.rs#L203), [fq6.rs](https://github.com/matter-labs/zksync-cry...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Inaccurate Comment ### Description ## Handle leastwood ## Vulnerability details ## Impact This issue has no direct security implications, however, there may be some confusion when understanding what the `RCFactory.createMarket()` function actually does. ## Proof of Concept https://github.com/code-423n4/20...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
cross-chain
true
false
## Medium: Keep3r Relay Implementations are Not Compatible with Keep3r in Optimism and Executions Will Always Revert ### Description `Keep3rRelay` and `Keep3rBondedRelay` uses deprecated function for sidechains and `exec` calls will always revert. ### Impact Current Keep3r Relay contracts are not compatible with Keep...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: `InflationManager.lastUpdate` is not used ### Description It only is set once on deployment, works as a timestamp of deployment, and is never used by other contracts. - https://github.com/ConicFinance/protocol/blob/7a66d26ef84f93059a811a189655e17c11d95f5c/contracts/tokenomics/InflationManager.sol#L43 ### Reco...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: ToDo in code ### Description **Description** Dispatcher.sol: cancelMigration(). Pre-production contracts should not contain unfinished logic. **Recommendation**: Verify to implement all the logic.
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
signature
true
false
## Medium: Presale buyers can block other whitelisted buyers from purchases ### Description Per the information provided by the sponsors during the audit > In Cardex, each card will have a one-day presale stage, and after that will be changed to public > The presale stage is a reward for eligible users. Cardex backen...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
solodit_api
high
access-control
false
false
##### Description The current system configuration grants the `MANAGER` role extensive rights giving its owner the possibility to withdraw all the tokens from the contract. Specifically, the `MANAGER` is authorized to: - Swap the supported tokens within the [`LRTDepositPool`](https://github.com/Kelp-DAO/KelpDAO-contrac...
MixBytes
4.5
KelpDAO
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Use mixedCase for state variables ### Description In Goldsand.sol, we have the state variable `WITHDRAWAL_VAULT_ADDRESS`. In line with the Solidity style guide, it's recommended that we instead use mixedCase, i.e.: `withdrawalVaultAddress`. This improves readability and maintainability by having the casing ide...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
dos
true
false
## Low: [03] Valid liquidations would fail in turbulent situations because the max slippage idea is applied that's 3% ### Description https://github.com/code-423n4/2024-05-predy/blob/a9246db5f874a91fb71c296aac6a66902289306a/src/libraries/logic/LiquidationLogic.sol#L39-L119 This function is used to liquidate a vault ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
overflow
false
false
## Low: Unused custom error should removed if not required ### Description **Description:** `AngstromL2` defines the `NegationOverflow()` custom error; however, it is not currently used and so should be removed unless actually required. **Sorella Labs:** Fixed in commit [4702d84](https://github.com/SorellaLabs/l2-ang...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Presence of commented-out functions in UniswapV2Router01Collection ### Description The `UniswapV2Router01Collection` contract contains two commented-out functions: - `removeLiquidityETHWithPermitCollection` - `removeLiquidityWithPermitCollection` While the presence of commented-out code does not introduce se...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
dos
true
false
## High: Incorrect Withdrawal State Update Causes Partial Withdrawals to Fail ### Description The `FundContract` allows users to initiate withdrawals, which locks their shares and sets withdrawal data in storage. When the `acquireWithdrawalFunds()` function is called by the `balanceContract`, it marks the withdrawal a...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: Potentially losing eth ### Description **Severity**: Medium **Status**: Acknowledged **Description** Trading.sol - Function openTrade accepts native coin (i.e. ETH in Ethereum main net) as it is payable function. Users interacting with this function might send native coin by mistake while the _type is no...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
liquidation
false
false
## Low: Lack of Event Emission ### Description Throughout the codebase, there are instances of missing event emissions: * In the `RizRegistry` contract, the [`configureReserveAsCollateral` function](https://github.com/radiant-capital/riz/blob/65ca7bb55550d30388e2b2277fefe5686ab7e4e8/src/RizRegistry.sol#L456) trigger...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Semver gate ignores prerelease metadata, blocking RC -> release SuperchainConfig upgrades ### Description The upgrade gate in the SuperchainConfig upgrader treats prerelease versions (e.g., "3.0.0-1") as equal to their corresponding release ("3.0.0") because the SemverComp parser drops prerelease/build metadata...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
false
false
## Low: `safeMint()` in `createVesting()` could be called with a zero address ### Description The `createVesting` function calls the `_mint` function while the best practice is to use the `_safeMint` function. This could lead to stuck tokens if the recipient is a contract that can't handle ERC721 tokens. Consider usi...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: Unused cauldron_ parameter ### Description ## Handle 0xRajeev ## Vulnerability details ## Impact That cauldron_ parameter is not used here and ladle_.cauldron() is used instead. The Ladle constructor initializes its cauldron value and so the only way this could differ from the parameter is if the argument...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
solodit_api
medium
Array Reorder
false
false
Source: https://github.com/sherlock-audit/2022-11-telcoin-judging/issues/86 ## Found by WATCHPUG ## Summary When `removePlugin()` happens between the user sends the `claimFromIndividualPlugin()` transaction and before it gets minted, it may lead to lesser rewards as the `auxData` prepared for another plugin will n...
Sherlock
5
Telcoin
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
storage
true
false
## Gas: Weiroll VM branching can be optimized due to disabling of delegatecall commands ### Description The Weiroll VM contract has been modified to disable `delegatecall` commands: ```solidity if (flags & FLAG_CT_MASK == FLAG_CT_DELEGATECALL) { revert("Delegatecall is disabled"); } else if (flags & FLAG_CT_MASK ==...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
signature
true
false
## High: `FloodPlain` selector extension does not prevent `IFulfiller::sourceConsideration` callback from being called within pre/post hooks ### Description **Description:** The `FloodPlain` contracts implement a check in `Hooks::execute` which intends to prevent spoofing by invoking the fulfiller callback during exec...
0