prompt listlengths 2 2 | source stringclasses 3
values | severity stringclasses 5
values | category stringclasses 186
values | has_code bool 2
classes | has_poc bool 2
classes | reference_response stringlengths 23 5k | firm stringclasses 26
values | quality_score float64 0 5 | protocol stringclasses 398
values |
|---|---|---|---|---|---|---|---|---|---|
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: Public functions can be external
### Description
It is good practice to mark functions as `external` instead of `public` if they are not called by the contract where they are defined.
### PROOF OF CONCEPT
Instances include:
#### manifest/Proposal-Store.sol
l46 function AddProposal()
l52 function QueryP... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | cross-chain | false | false | ## Low: InceptionBridge contract assumes uniform decimal places across tokens
### Description
The bridge contract operates under the assumption that all bridgeable tokens across supported chains have uniform decimal places. When tokens are deposited, the system records the quantity of tokens. Conversely, during withdr... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | other | false | false | ## Gas: `PauseMarket()` can be optimized
### Description
The function `pauseMarket()` on line 230 can be optimized.
Recommend not using an argument and set . | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Display Of Important Transaction Information
### Description
## Transaction Approval Information
The system utilizes Metamask’s snap dialog feature to present users with specific transaction-related details before approving the transaction. However, certain crucial transaction information is currently not bei... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | oracle | true | false | ## High: The WETH tokens are not taken into account in the ConvexTradeExecutor.totalFunds function
### Description
The `totalFunds` function of every executor should include all the funds that belong to the contract:
**code/contracts/ConvexTradeExecutor.sol:L21-L23**
```
function totalFunds() public view override ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: An unvalidated index in some helper functions
### Description
The following function expects value [0..3] as input, but does not implement asserting for the unexpected value, potentially provided by the user:
- _get_token
- _get_underlying
- _get_token_mask
- _get_underlying_mask
- _approveTokens
Related code... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | initialization | true | false | ## Medium: `twAML` weights can be griefed by burning tokens
### Description
Users can lock their liquidity in the `TOLP` contract and mint `OTAP` tokens in the `TOB` contract. The `TOB` contract has a special mechanism called `twAML` to balance out how much rewards they emit over time.
Basically, if a user commits `O... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Deprecated `answeredInRound` is used in `SwapImpl`
### Description
_Resolved_
In SwapImpl, we will fetch the current token price to calculate the slippage. In function `_readE18`, we will use `answeredInRound` to check the return value's validity.
The problem here is that, according to https://docs.chain.lin... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: No 0 address check in ‘withdrawDepositTo’ function
### Description
**Severity**: Low
**Status**: Resolved
**Location**: WalletAccount.sol
**Description**
`withdrawDepositTo` function in the provided code allows the withdrawal of an amount to a specified address. However, there is no check to ensure that th... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | liquidation | false | false | ## High: Someone can create non-liquidatable auction if the collateral asset fails on transferring to address(0)
### Description
## Lines of code
https://github.com/code-423n4/2022-07-yield/blob/main/contracts/Witch.sol#L176
https://github.com/code-423n4/2022-07-yield/blob/6ab092b8c10e4dabb470918ae15c6451c861655f/con... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | oracle | false | false | ## Gas: [01] Use `!= 0` instead of `> 0` for unsigned integer comparison
### Description
### Proof of concept
Found in line 99 at optimismContest/L1/L2OutputOracle.sol:
require(_l2BlockTime > 0, "L2OutputOracle: L2 block time must be greater than 0");
Found in line 101 at optimismContest/L1/L2OutputOracle.sol:
... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | oracle | false | false | ## Low: Implicit casting
### Description
Implicit casting is used to convert the [`price`](https://github.com/OriginProtocol/origin-dollar/blob/bf4ff28d5944ecc277e66294fd2c702fee5cd58b/contracts/contracts/oracle/OracleRouter.sol#L31) from `int256` to `uint256`. This could overflow if the price were negative, but the [... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | initialization | true | false | ## Medium: Lack of finalized check on Airdrop claim
### Description
## Airdrop Vulnerability Analysis
Airdrops can be claimed before they are finalized due to a lack of checks in `airdrop_claim_handler`. An attacker could exploit this vulnerability to claim the airdrop multiple times, as well as prevent airdrop final... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | false | false | ## Medium: Use safeTransfer & safeTransferFrom
### Description
**Description**
Some ERC-20 tokens will return on failure instead of reverting a transaction, Some tokens will even not return any value. not all tokens adhere to the standart of ERC-20 | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | flash-loan | true | false | ## Medium: Malicious lender can manipulate the fee to force borrower pay high premium
### Description
When user creates a position, the fee is snapshot is queryed from uniswap v3 position manager when [preparing leverage](https://github.com/code-423n4/2023-12-particle/blob/a3af40839b24aa13f5764d4f84933dbfa8bc8134/cont... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | false | false | ## Low: Owner can renounce Ownership
### Description
[PirexRewards.sol#L4](https://github.com/code-423n4/2022-11-redactedcartel/blob/main/src/PirexRewards.sol#L4)
Typically, the contract’s owner is the account that deploys the contract. As a result, the owner is able to perform certain privileged activities.
The Ope... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | liquidation | true | false | ## Gas: A modifier used only once and not being inherited should be inlined to save gas
### Description
https://github.com/code-423n4/2023-01-astaria/blob/1bfc58b42109b839528ab1c21dc9803d663df898/src/CollateralToken.sol#L253-L263
The above modifier is only being called on [Line 333](https://github.com/code-423n4/202... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Long lines are not suitable for the ‘Solidity Style Guide’
### Description
[ProfilePicture.sol#L56](https://github.com/code-423n4/2023-03-canto-identity/blob/077372297fc419ea7688ab62cc3fd4e8f4e24e66/canto-pfp-protocol/src/ProfilePicture.sol#L56)
[Bio.sol#L41](https://github.com/code-423n4/2023-03-canto-identi... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | cross-chain | false | false | ## Low: Wrong parameter on lp\_unlock near call at unlock\_tokens in Relayer
### Description
**Description:**
From Relayer, it passes { nonce, proof } as param to lp\_unlock call.
However, actual near implementation has just one param proof.![ref5]
**Recommendations:**
As proof includes nonce and everything looks ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | false | false | ## Low: Bypassing the Total Supply Constraint in `manageVaultWithMerkleVerification`
### Description
This issue has been identified within the [manageVaultWithMerkleVerification](https://github.com/Se7en-Seas/cMETH-boring-vault/blob/d6e2d18f45a3e05d749d34966139fc85fc47f7e6/src/base/Roles/ManagerWithMerkleVerification.... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: `abi.encodePacked()` should not be used with dynamic types when passing the result to a hash function such as `keccak256()`
### Description
*Similar issue in the past: [here](https://github.com/code-423n4/2021-09-wildcredit-findings/issues/4)*
Use `abi.encode()` instead which will pad items to 32 bytes, which... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: GoUnusedExportedFunction
### Description
**Severity**: Low
**Status**: Acknowledged
**Description:**
Some exported functions are not used within the codebase.
**Files**: Multiple files throughout the codebase.
**Recommendation**:
Consider removing these functions if they are not part of the public API.... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | false | false | ## Medium: `processWithdrawals()` incorrectly updates of `totalLiquidity`
### Description
- In `processWithdrawals()` function: when the `_withdrawShares = 0`, the `s.totalLiquidity` is increased by the liquidity of the collected-and-deposited fees of the position, where it assumes that the totalLiquidity of the posit... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | oracle | false | false | ## Low: Unsafe cast
### Description
The `OracleRouterBase` contract [uses an unsafe cast](https://github.com/OriginProtocol/origin-dollar/blob/508921bd39f988fa61b60cea372b910725ff7bd0/contracts/contracts/oracle/OracleRouter.sol#L43) to convert the signed price to a `uint256` type. Consider ensuring the price is positi... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | dos | true | false | ## Medium: Changes of the `UnbondingTime` are not accounted for
### Description
The `andromeda-validator-staking` contract allows the owner to stake and unstake tokens, adding unstaking entries to an `UNSTAKING_QUEUE`. The unstaking process is dependent on the `UnbondingTime` parameter of the chain, which can be chang... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | flash-loan | false | false | ## High: Unsynchronized positions in `NonFungiblePositionManager` and `AlgebraEternalFarming` can be exploited for receiving unfair rewards
### Description
If `FarmingCenter._updatePosition` reverts internally, `NonFungiblePositionManager` ignores that revert here: https://github.com/cryptoalgebra/Algebra/blob/7290fad... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | liquidation | true | false | ## Low: liquidatableCollateralRatio update can force liquidation without warning
### Description
The `DEFAULT_ADMIN_ROLE` can update the `liquidatableCollateralRatio` without notifying users who hold positions in the rebalance pool. This action could potentially trigger or hinder liquidations without giving users a ch... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Path Traversal In HTTP Requests
### Description
## Security Consideration in Axios Usage
Some URLs built inside `axios.get` in the server API may be path traversed when the user controls the URL parameters completely.
## Code Example
In this case, inserting a `../../` inside the `stride_addr` attacker-cont... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | initialization | true | false | ## Medium: First depositor inflation attack in `PendlePowerFarmToken`
### Description
In certain scenarios, shares of a subsequent depositor can be heavily reduced, losing a large amount of his deposited funds, the attacker can increase the right side of the `previewMintShares` by adding rewards for compounding.
That... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | dos | true | false | ## High: Tokens can get stuck in Executor contract if the destination doesn’t claim them all
### Description
The function `execute()` increases allowance and then calls the recipient (`_args.to`). When the recipient does not use all tokens, these could remain stuck inside the Executor contract.
**Notes:**
- The exec... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | true | false | ## Low: UNBOND WAIT LISTS CAN BE MIGRATED EVEN IF THE CONTRACT IS NOT PAUSED
### Description
The `migrate_unbond_wait_lists` function in the **krp-staking-contracts/basset\_sei\_hub** contract allows migrating the unbond wait lists without previously verifying whether the contract is paused or not, which could break t... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | dos | true | false | ## Low: Unbounded Chunk Size Can DoS Blocked Withdrawal Queue Processing
### Description
## Severity: Low Risk
**Context:** `BlockedWithdrawalQueue.sol#L367-L371`
**Description:**
The `processBlockedWithdrawals()` function in `BlockedWithdrawalQueue` uses a `chunkSize` parameter to limit the size of blocked withdr... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | front-running | false | false | ## Low: [01] Using `block.timestamp` as deadline
### Description
* This approach exposes the contract to potential front-running and sandwich attacks, where malicious actors can exploit the transaction’s timing to manipulate the swap outcome.
* It allows for indefinite pending transactions in the mempool, which can le... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | false | false | ## Medium: Cannot unpause exchange
### Description
The `OneInchExchange.sol` contract exposes [a mechanism](https://github.com/1inch-exchange/1inch-v2-contracts/blob/72f2812837fdd73ec2d32c8988811df361e80985/contracts/OneInchExchange.sol#L179) for the owner to pause the contract. This [disables the `swap` functionality... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | reentrancy | false | false | ## Low: Remove unnecessary comment
### Description
At https://github.com/sushiswap/bentobox/blob/c2e150b16b8764ebfe2e1e6e267ae14e10738065/contracts/LendingPair.sol#L429 the comment
> // TODO: Reentrancy issue? Should we take a before and after balance?
it is not really needed because it seems there is no re-entrancy ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Remove unused code
### Description
This code is not used in the project, remove it or add event-emit; | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | overflow | false | false | ## High: Truncation in `OrderValidator` can lead to resetting the fill and selling more tokens
### Description
[OrderValidator.sol#L228](https://github.com/code-423n4/2022-05-opensea-seaport/blob/4140473b1f85d0df602548ad260b1739ddd734a5/contracts/lib/OrderValidator.sol#L228)
[OrderValidator.sol#L231](https://github.co... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | other | false | false | ## High: Division by zero in share conversion leads to panic and denial-of-service
### Description
**Severity:** High
**Path:** x/liquidstake/types/liquidstake.go:NativeTokenToStkXPRT, StkXPRTToNativeToken#L167-L175
**Description:**
Both functions `NativeTokenToStkXPRT` and `StkXPRTToNativeToken` are used to conver... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | reentrancy | true | false | ## High: Users who deposited MIM and USDB tokens into BlastOnboarding may incur losses when the pool is created via bootstrap
### Description
Users can deposit `MIM` and `USDB` tokens into `BlastOnboarding`.
Once `locked`, these tokens cannot be `unlocked`.
The `locked` tokens will be utilized to establish a `MagicLP ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | rounding | true | false | ## High: Misuse of curve pool calls results for precision loss and unintended revertion
### Description
Hello team, | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | solodit_api | high | access-control | true | true |
A malicious actor can hijack a minipool of any node operator that finished the validation period or had an error.
The impacts:
1. Node operators staked funds will be lost (Loss of funds)
2. Hacker can hijack the minipool and retrieve rewards without hosting a node. (Theft of yield)
2.1 See scenario \#2 comment fo... | Code4rena | 5 | GoGoPool |
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | other | true | false | ## Gas: [12] `require()`/`revert()` strings longer than 32 bytes cost extra gas
### Description
*There is 1 instance of this issue:*
https://github.com/code-423n4/2022-05-backd/blob/2a5664d35cde5b036074edef3c1369b984d10010/protocol/contracts/tokenomics/Minter.sol#L150-L153 | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | reentrancy | true | true | ## High: Reentrancy and untrusted contract call in mintMultiple Difficulty: Low
### Description
Missing checks and no reentrancy prevention allow untrusted contracts to be called from `mintMultiple`. This could be used by an attacker to drain the contracts.
```solidity
function mintMultiple (
address[] calldata _asse... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | other | true | false | ## Gas: Simply unchecked operations can be done directly in the code, instead of being imported from the library
### Description
File `ethereum/contracts/common/libraries/UncheckedMath.sol` is a library which implements two simple unchecked functions: `uncheckedInc()` and `uncheckedAdd()`.
Those functions are used acr... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Unexpected vesting schedule when claiming
### Description
Though the vesting schedule can be really important for users during auction it can be changed during the whole the contract lifetime or being not set at all.
Consider setting a vesting schedule only before the sale begins. | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: Missing Zero Address Checks
### Description
Multiple contracts are missing zero address checks for setting storage variables. Accidentally setting an address variable to address zero might result in an incorrect configuration of the protocol. For instance, the following parameters are not checked:
* [`_multi... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | oracle | false | false | ## High: Agent Data Oracle signed credential front-running attack ✓ Fixed
### Description
For almost every action as an `Agent`, the owner of the `Agent` is supposed to request `SignedCredential` data that contains all the relevant current info about the “off-chain” state of the `Agent`. New credentials can only be re... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | cyfrin_structured | medium | other | false | false | ## Medium: Excess eth not refunded to user in `MysteryBox::revealMysteryBoxes()`
### Description
`MysteryBox::revealMysteryBoxes()` [allows execution](https://github.com/Earnft/smart-contracts/blob/43d3a8305dd6c7325339ed35d188fe82070ee5c9/contracts/MysteryBox.sol#L196-L198) if `msg.value >= mintFee` but in the case wh... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | access-control | true | false | ## Medium: Excessive authority for `setVault` function in `VaultOwned` contract.
### Description
**Description**
contract VaultOwned - in body of setVault( address vault_) external returns (bool) onlyOwner
Too much authority for one executor that might lead to funds embezzled if not trusted
**Recommendation**
Use ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | true | false | ## Low: Dust due to rounding tax calculations will accumulate in `AngstromL2` and cannot be recovered
### Description
**Description:** The sum of rewards owed to positions can be less than the total tax amount due to rounding. While it is correct to round down these proportional share calculations, any dust that is no... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | overflow | false | false | ## Low: Potentially unsafe unchecked math
### Description
Throughout the [`FixedRateSwap`](https://github.com/1inch/fixed-rate-swap/blob/b1600f61b77b6051388e6fb2cb0be776c5bcf2d1/contracts/FixedRateSwap.sol) contract, there are many uses of `unchecked` math. The main reason for using `unchecked` math is to remove overf... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | initialization | true | false | ## Medium: 3S-LENFT-M01 protocol/Gauges/GaugeController.sol: incorrect getRewardsCeiling() logic
### Description
The current implementation of the GaugeController has the following [function](https://github.com/leNFT/contracts/blob/master/contracts/protocol/Gauges/GaugeController.sol#L478-L491) to calculate the reward... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Missing `override` keyword
### Description
`DropEngineV2` inherits `configureSequence` method from `IEngine` but is missing the `override` keyword. | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | other | false | false | ## High: YT holder are unable to claim their interest
### Description
A malicious user could prevent YT holders from claiming their interest, leading to a loss of assets.
### Impact
YT holders cannot claim their interest, leading to a loss of assets.
### Recommendation
Ensure that the YT holders can continue to clai... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | initialization | true | false | ## Gas: Mark state variables as immutable and constant where relevant
### Description
The `stakingRewardsGenesis` is a state variable that is assigned in the constructor and cannot possibly be changed. Thus, it can be marked as `immutable`. Immutable variables are not stored in contract storage, which means they do no... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | initialization | true | false | ## Medium: Stuck rewards in `FeeSplitter` contract
### Description
Curves protocol incentivize users to buy subjects and hold it for a prolonged time to receive high rewards, and the claimable rewards amount entitled for each user is calculated based on the user subject balance times the difference between the subject... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: return in function payManagementFees() is not necessary
### Description
The return in the function `payManagementFees()` is somewhat confusing, because it is done in the `if`, but not at the end of the function. The return is also not necessary because it’s also the return parameter.
### Recommendation
Consid... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | liquidation | true | false | ## Low: Useless Withdraw Operation In Lending
### Description
## Optimization in Lending.move
In `lending.move`, within `repay` and `liquidation_call`, the invocation of `withdraw` may be avoided. Subtracting the `excess_amount` before the deposit operation when calculating the amount deposited avoids the invocation.... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | true | false | ## Low: Inconsistencies In Deposit Instruction
### Description
## Deposit Instruction and Stake Pool Interactions
In the deposit instruction, the `if deposit_sol` block interacts with the stake pool program to handle SOL deposits. In the stake pool program, `sol_deposit_authority` is an optional authority required fo... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | token | false | false | ## Medium: Missing Handling for Tokens with Transfer Fees in `fillOrders()`
### Description
**Severity**: Medium
**Status**: Acknowledged
**Location**: AdvancedOrderEngine.sol
**Description**
The `fillOrders()` function in `AdvancedOrderEngine.sol` does not account for tokens that force a fee on transfers, such as... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | token | true | false | ## Medium: Possible loss of tokens
### Description
https://github.com/pie-dao/ExperiPie/blob/facf3c246d9c43f5b1e0bad7dc2b0a9a2a2393c5/contracts/facets/ERC20/LibERC20.sol#L17
If the value of the `_to` parameter is equal to zero, then the tokens will be lost, because they cannot be disposed of.
However, the value of the... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | other | true | false | ## High: Improper Settlement Calculation
### Description
## PerpEngine Settlement State Calculation
In PerpEngine, `getSettlementState` is used to calculate the amount that users can settle at that time by calculating the total profit/loss that they made in the perp market.
## Code Snippet
## Profit and Loss Calcu... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | liquidation | false | false | ## Medium: `PositionManager#liquidatePosition` fails to update vaultDebt and vaultCollateral
### Description
**Details**
**First discovered by Dev team during audit period**
[PositionManager.sol#L169-L185](https://github.com/hyperstable/contracts/blob/35db5f2d3c8c1adac30758357fbbcfe55f0144a3/src/core/PositionManager... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | front-running | false | false | ## Low: `TalentirMarketplaceV1.cancelOrders()` Front-Runnable
### Description
**Update**
The Talentir team updated the documentation surrounding the cancel order function to inform users. We recommend also informing users on the front-end of the application. The change was made in PR-40.
**File(s) affected:**`Talenti... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: Basis points usage deviates from general definition
### Description
## Handle
0xRajeev
## Vulnerability details
## Impact
The general definition of basis points is 100 bps = 1%. The usage here, 1000 bps = 100%, deviates from generally accepted definition and could cause confusion among users/creators/affi... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | false | false | ## Low: FulfillInterpreter - Wrong order of actions in fallback handling
### Description
When a transaction with a `callTo` that is not `address(0)` is fulfilled, the funds to be withdrawn on the user’s behalf are first transferred to the `FulfillInterpreter` instance that is associated with this `TransactionManager` ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | liquidation | true | false | ## Medium: Users can borrow all loan tokens
### Description
Utilization rate check can be bypassed depositing additional loan tokens and withdrawing them in the same transaction.
### Impact
The vulnerability allows to drain all the liquidity from the pool, which entails two problems:
- The collateral ratio starts dec... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: CvxLocker.findEpochId stops after 128 iterations
### Description
## Handle
cmichel
## Vulnerability details
## Vulnerability Details
It's unclear why the binary search algorithm stops after `128` iterations.
## Impact
It might not return the actual epoch id (although very unlikely as 128 iterations should... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | front-running | true | false | ## High: Vault executes swaps without slippage protection
### Description
The vault executes swaps without slippage protection. That will cause a loss of funds because of sandwich attacks.
### Impact
Swaps will be sandwiched causing a loss of funds for users you withdraw their rewards.
### Recommendation
Slippage pa... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | oracle | false | false | ## Medium: Oracle Will Return the Wrong Price for Asset if Underlying Aggregator Hits `minAnswer`
### Description
`convertFeeToEth()` in `PlatformLogic.sol` and `calculateArbAmount()` in `RewardsClaimer.sol` will return the wrong price for the asset if the underlying aggregator hits `minAnswer`.
Chainlink's aggregato... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: Rebalancing breaks and can corrupt the accounting if amountToProtocol or amountToChain turn negative
### Description
Derby operates with deltas, but doesn't check that resulting amounts to be allocated are positive.
This allows for possible griefing attack permanently corrupting protocol accounting.
### ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: [09] Configuration changes could drastically affect users and should be behind a timelock
### Description
Several configuration update actions within the protocol can negatively impact users' transactions if changes occur just prior to transaction execution.
https://github.com/code-423n4/2024-07-loopfi/blob/5... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | other | false | false | ## Gas: Use assembly to write storage values
### Description
### Gas Report
### Lines
* Owned.sol:15
* Owned.sol:19
* ETHRegistrarController.sol:61
* ETHRegistrarController.sol:62 | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Consider tracking the msg.sender in the event emitted by the PublicAllocator contract
### Description
Like it has been already done in other projects of the Morpho's ecosystem, the events emitted by the execution of the PublicAllocator should track the `msg.sender`. This information can be useful for external ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | liquidation | false | false | ## Gas: Emit events first to refactor away local variables storing previous values
### Description
**Description:** When values are being changed, emit events first to refactor away local variables storing previous values. For example in `SecuritizeAmmNavProvider::setPriceScaleFactor`:
Similar optimizations can be m... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Lack of Hyperchain-ID-Specific (Un)freeze Reinforcement
### Description
The [`reinforceFreeze`](https://github.com/zksync-association/zk-governance/blob/b2e01439937325ceb3d059d0f07c9d73339977a7/l1-contracts/src/ProtocolUpgradeHandler.sol#L363) and [`reinforceUnfreeze`](https://github.com/zksync-association/zk-... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | oracle | true | false | ## Low: Data integrity issue with `revertBurnRequest` in `RipFunPacks`
### Description
_Acknowledged_
In the `RipFunPacks` function, if a packet of type `INSTANT_OPEN` undergoes a `revertBurnRequest`, it can lead to a failure when the `fulfillRandomWords` function is later called by the `Chainlink`.
However, in `Ca... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | cross-chain | true | false | ## Medium: The rebalancing system is broken when everclear bridge contract is used
### Description
The [sendMsg](https://github.com/sherlock-audit/2025-07-malda/blob/798d00b879b8412ca4049ba09dba5ae42464cfe7/malda-lending/src/rebalancer/bridges/EverclearBridge.sol#L110) in EverclearBridge contract only approves the **t... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | false | false | ## Low: Privileged Roles
### Description
**Update**
**Acknowledged** with the following explanation: The roles are required for the Petaverse system as a whole to function as intended.
**File(s) affected:**`Pet.sol`
**Description:** The Admin role that belongs to the multisig wallet, as stated in the docs, can mark ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | false | false | ## Low: [13] Special native-asset ERC‑20 addresses can bypass ETH-specific logic
### Description
### Vulnerability details
Several chains expose the native token via a well-known ERC20 contract (e.g., CELO, Polygon’s `0x…1010`, zkSync’s `0x…800A`). The router assumes `address(0)` is the only native asset indicator.
... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | other | false | false | ## High: Lack of Zero Check in Inverse Computation for Tower Extensions
### Description
The inverse functions in [fq2.rs](https://github.com/matter-labs/zksync-crypto/blob/ccf5fa30ee2c94b594126d7b4b75770cafbbab21/crates/boojum/src/gadgets/tower_extension/fq2.rs#L203), [fq6.rs](https://github.com/matter-labs/zksync-cry... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Inaccurate Comment
### Description
## Handle
leastwood
## Vulnerability details
## Impact
This issue has no direct security implications, however, there may be some confusion when understanding what the `RCFactory.createMarket()` function actually does.
## Proof of Concept
https://github.com/code-423n4/20... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | cross-chain | true | false | ## Medium: Keep3r Relay Implementations are Not Compatible with Keep3r in Optimism and Executions Will Always Revert
### Description
`Keep3rRelay` and `Keep3rBondedRelay` uses deprecated function for sidechains and `exec` calls will always revert.
### Impact
Current Keep3r Relay contracts are not compatible with Keep... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: `InflationManager.lastUpdate` is not used
### Description
It only is set once on deployment, works as a timestamp of deployment, and is never used by other contracts.
- https://github.com/ConicFinance/protocol/blob/7a66d26ef84f93059a811a189655e17c11d95f5c/contracts/tokenomics/InflationManager.sol#L43
### Reco... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: ToDo in code
### Description
**Description**
Dispatcher.sol: cancelMigration().
Pre-production contracts should not contain unfinished logic.
**Recommendation**:
Verify to implement all the logic. | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | signature | true | false | ## Medium: Presale buyers can block other whitelisted buyers from purchases
### Description
Per the information provided by the sponsors during the audit
> In Cardex, each card will have a one-day presale stage, and after that will be changed to public
> The presale stage is a reward for eligible users. Cardex backen... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | solodit_api | high | access-control | false | false | ##### Description
The current system configuration grants the `MANAGER` role extensive rights giving its owner the possibility to withdraw all the tokens from the contract. Specifically, the `MANAGER` is authorized to:
- Swap the supported tokens within the [`LRTDepositPool`](https://github.com/Kelp-DAO/KelpDAO-contrac... | MixBytes | 4.5 | KelpDAO |
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Use mixedCase for state variables
### Description
In Goldsand.sol, we have the state variable `WITHDRAWAL_VAULT_ADDRESS`. In line with the Solidity style guide, it's recommended that we instead use mixedCase, i.e.: `withdrawalVaultAddress`. This improves readability and maintainability by having the casing ide... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | dos | true | false | ## Low: [03] Valid liquidations would fail in turbulent situations because the max slippage idea is applied that's 3%
### Description
https://github.com/code-423n4/2024-05-predy/blob/a9246db5f874a91fb71c296aac6a66902289306a/src/libraries/logic/LiquidationLogic.sol#L39-L119
This function is used to liquidate a vault ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | overflow | false | false | ## Low: Unused custom error should removed if not required
### Description
**Description:** `AngstromL2` defines the `NegationOverflow()` custom error; however, it is not currently used and so should be removed unless actually required.
**Sorella Labs:** Fixed in commit [4702d84](https://github.com/SorellaLabs/l2-ang... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Presence of commented-out functions in UniswapV2Router01Collection
### Description
The `UniswapV2Router01Collection` contract contains two commented-out functions:
- `removeLiquidityETHWithPermitCollection`
- `removeLiquidityWithPermitCollection`
While the presence of commented-out code does not introduce se... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | dos | true | false | ## High: Incorrect Withdrawal State Update Causes Partial Withdrawals to Fail
### Description
The `FundContract` allows users to initiate withdrawals, which locks their shares and sets withdrawal data in storage. When the `acquireWithdrawalFunds()` function is called by the `balanceContract`, it marks the withdrawal a... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | false | false | ## Medium: Potentially losing eth
### Description
**Severity**: Medium
**Status**: Acknowledged
**Description**
Trading.sol - Function openTrade accepts native coin (i.e. ETH in Ethereum main net) as it is payable function. Users interacting with this function might send native coin by mistake while the _type is no... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | liquidation | false | false | ## Low: Lack of Event Emission
### Description
Throughout the codebase, there are instances of missing event emissions:
* In the `RizRegistry` contract, the [`configureReserveAsCollateral` function](https://github.com/radiant-capital/riz/blob/65ca7bb55550d30388e2b2277fefe5686ab7e4e8/src/RizRegistry.sol#L456) trigger... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Semver gate ignores prerelease metadata, blocking RC -> release SuperchainConfig upgrades
### Description
The upgrade gate in the SuperchainConfig upgrader treats prerelease versions (e.g., "3.0.0-1") as equal to their corresponding release ("3.0.0") because the SemverComp parser drops prerelease/build metadata... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | false | false | ## Low: `safeMint()` in `createVesting()` could be called with a zero address
### Description
The `createVesting` function calls the `_mint` function while the best practice is to use the `_safeMint` function. This could lead to stuck tokens if the recipient is a contract that can't handle ERC721 tokens.
Consider usi... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: Unused cauldron_ parameter
### Description
## Handle
0xRajeev
## Vulnerability details
## Impact
That cauldron_ parameter is not used here and ladle_.cauldron() is used instead. The Ladle constructor initializes its cauldron value and so the only way this could differ from the parameter is if the argument... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | solodit_api | medium | Array Reorder | false | false | Source: https://github.com/sherlock-audit/2022-11-telcoin-judging/issues/86
## Found by
WATCHPUG
## Summary
When `removePlugin()` happens between the user sends the `claimFromIndividualPlugin()` transaction and before it gets minted, it may lead to lesser rewards as the `auxData` prepared for another plugin will n... | Sherlock | 5 | Telcoin |
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | storage | true | false | ## Gas: Weiroll VM branching can be optimized due to disabling of delegatecall commands
### Description
The Weiroll VM contract has been modified to disable `delegatecall` commands:
```solidity
if (flags & FLAG_CT_MASK == FLAG_CT_DELEGATECALL) {
revert("Delegatecall is disabled");
} else if (flags & FLAG_CT_MASK ==... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | signature | true | false | ## High: `FloodPlain` selector extension does not prevent `IFulfiller::sourceConsideration` callback from being called within pre/post hooks
### Description
**Description:** The `FloodPlain` contracts implement a check in `Hooks::execute` which intends to prevent spoofing by invoking the fulfiller callback during exec... | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.