prompt listlengths 2 2 | source stringclasses 3
values | severity stringclasses 5
values | category stringclasses 186
values | has_code bool 2
classes | has_poc bool 2
classes | reference_response stringlengths 23 5k | firm stringclasses 26
values | quality_score float64 0 5 | protocol stringclasses 398
values |
|---|---|---|---|---|---|---|---|---|---|
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | front-running | true | false | ## Medium: No `safe_withdrawal` option in `withdraw_protocol_liquidity` function in omnipool can be abused by frontrunners to cause losses to the admin when removing liquidity
### Description
The `sacrifice_position` function can be used by any liquidity provider to hand over their liquidity position to the protocol. ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Dutch Orders Without Duration Benefit the Filler
### Description
The Dutch order implements a [linear decay function](https://github.com/Uniswap/UniswapX/blob/7c5e359fc476f3e55497a8cd6f405f67af2c1dcf/src/lib/DutchDecayLib.sol#L26-L48). From `decayStartTime` to `decayEndTime` the amount of input or output token... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Missing Dependencies Exact Version Pinning
### Description
## Dependency Management in the App
The app uses a significant amount of dependencies. Most of these dependencies are not pinned to an exact version; most are set like: `(^X.X.X)`, which will receive the most recent major version. This could enable de... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | true | false | ## Low: Centralization Risk Due to Mutable emissionStart
### Description
In the `GorplesCoin` contract, the `emissionStart` variable, which determines the starting point for emission calculations, can be modified by any account with the `DEFAULT_ADMIN_ROLE`. This is facilitated by the `setEmissionStart` function:
```... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | overflow | false | false | ## Medium: No security checks for the final epoch calculation
### Description
**Description**
TokenDistribution.sol, line 51.
With incorrectly handled parameters there is a possibility to get underflow during the epoch
calculation, since no SafeMath applied in this place nor necessary checks performed.
**Recommendat... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: [10] Use a more recent version of solidity
### Description
Use a solidity version of at least 0.8.4 to get `bytes.concat()` instead of `abi.encodePacked(,)`
Use a solidity version of at least 0.8.12 to get `string.concat()` instead of `abi.encodePacked(,)` | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | liquidation | true | false | ## High: Attacker can steal a loan's collateral and break the protocol
### Description
The platform allows an attacker to steal an auctioned loan's collateral. The result of the attack is that
- At some point, some lender will not be able to withdraw the invested `loanToken` used to create the pool (or add balance to... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Distribution validation is inconsistent due to inclusion of variable DAO fee
### Description
The `Distributor._ensureSufficientTotal()` function is called with the return values of `totals()`, which includes the DAO fee in its calculations. This can lead to a situation where previously valid distributions beco... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | cyfrin_structured | low | rounding | true | false | ## Low: `SherpaVault::_rollInternal` price calculation comment and math inconsistent
### Description
When calculating a new price a script queries all vaults on all chains then passes that to `SherpaVault:: rollToNextRound`. This in turn calls [`SherpaVault::_rollInternal`](https://github.com/hedgemonyxyz/sherpa-vault... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | false | false | ## Low: DRY, Smart contract ERC20 is based on openzeppelin library.
### Description
**Recommendation**:
Add openzeppelin to dependencies and inherit openzeppelin ERC20 & ERC20Burnable
contracts implementation. | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: Optimization in conditional logic
### Description
In the `ExecuteDepositUtils._executeDeposit` function, the deposit logic is segregated based on the price impact factor. The initial `if` clause manages scenarios with a positive price impact, whereas the subsequent `if` clause handles those with a negative pri... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | false | false | ## Medium: Misuse of isProposalOpen() function
### Description
The `isProposalOpen()` function returns true if it's open for voting. It returns false if it's too late or too early for voting. However, in two places of the codebase, it seems to be used as an `isProposalStillOpen()` function, neglecting the fact that it... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | cross-chain | true | false | ## High: Executor reverts on receiving native tokens from BridgeFacet
### Description
When doing an external call in `execute()`, the `BridgeFacet` provides liquidity into the `Executor` contract before calling `Executor.execute`. The `BridgeFacet` transfers a native token when an `address(wrapper)` is provided. Howev... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | token | true | false | ## Medium: Inbound transactions submitted to the `InTxTracker` that contain multiple `ZetaSent` and `Deposited` events are not processed correctly by the observers resulting in a loss of funds
### Description
Observers miss out on voting on multiple `ZetaSent` and ERC-20 `Deposited` events that have been emitted in a ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | false | false | ## Low: Inconsistent Naming Convention: `changeDecimals`
### Description
This issue has been identified within the [changeDecimals](https://github.com/Se7en-Seas/cMETH-boring-vault/blob/d6e2d18f45a3e05d749d34966139fc85fc47f7e6/src/base/Roles/AccountantWithRateProviders.sol#424) function of the `AccountantWithRateProvi... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | true | ## Medium: decodeBatch() bounds check can be bypassed
### Description
The `decodeBatch()` function in the `LibERC7579` library decodes its `bytes calldata executionData` input into an array of `bytes32` pointers referencing `Call` structs, where each `Call` struct contains an `address target`, a `uint256 value`, and `... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Inconsistent spacing in comments
### Description
Some lines use `// x` and some use `//x`. The instances below point out the usages that don't follow the majority, within each file.
*There are 127 instances of this issue:*
[See original submission](https://github.com/code-423n4/2022-05-rubicon-findings/issue... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Internal Functions Marked Private
### Description
## Functions in NEAR
Functions in NEAR can be public, private, or internal. A private function is exposed on the blockchain, but attempts to call the private function will fail unless the caller is the contract itself; either through a callback or using the co... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | other | false | false | ## High: An offer made after auction end can be stolen by an auction winner
### Description
_Submitted by hyh, also found by leastwood, shenwilly, and WatchPug_
An Offer which is made for an NFT when auction has ended, but its winner hasn't received the NFT yet, can be stolen by this winner as `_transferFromEscrow` b... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | cross-chain | true | false | ## Low: [02] Code is unreachable
### Description
In [Mailbox, function `_verifyDepositLimit`](https://github.com/code-423n4/2023-10-zksync/blob/72f5f16ed4ba94c7689fe38fcb0b7d27d2a3f135/code/contracts/ethereum/contracts/zksync/facets/Mailbox.sol#L275C1-L281C6), the code after the `if` statement is never executed as `ad... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | cyfrin_structured | low | token | false | false | ## Low: Consider renaming `MTokenMessagerBase::ccipClient` as it is used by LayerZero integration and actually refers to `MToken`
### Description
`MTokenMessager::ccipClient` and `MTokenMessagerBase::ccipClient` are used by both LayerZero (`MTokenMessagerLZ`) and CCIP (MTokenMessagerV2`).
But they actually simply ref... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: er Gas Check
### Description
## Code Review: settlePnl Function
In the function `settlePnl`, to validate the condition `canSettleX18.abs() > 0`, it is better to use `!=`, since the `abs()` function uses higher gas than a single opcode for `!=`.
## Solidity Code Snippet
## Remediation
Replace the check wit... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Use scientific notation (e.g. `10e18`) rather than exponentiation (e.g. `10**18`)
### Description
File: loan-3.0.0-beta.1/contracts/MapleLoanInternals.sol (line [14](https://github.com/maple-labs/loan/blob/4c6fe2cd91d6d16b8434c426fe7eb6d2bc77bc30/contracts/MapleLoanInternals.sol#L14)) | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | other | false | false | ## High: Missing total amount calculation
### Description
**Description**
Line 83, No calculations and checks for the total amount added through the addAllocations()
method.
There are no checks if the total amount exceeds the current supply, or if the new portion of
allocations added to the same vesting type exceeds ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | oracle | false | false | ## Gas: `peek` and `get' are identical (non-transactional)
### Description
In the contract `ChainlinkMultiOracle`, both functions `peek` and `get` are identical. They are declared as views while based on IOracle interface, `get` should be transactional.
**[albertocuestacanada (Yield) confirmed](https://github.com/cod... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: MultiSigDeleGator and HybridDeleGator: reinitialize Function Should Be Removed
### Description
#### Resolution
Client’s comment:
> Needed for account upgrading.
#### Description and Recommendation
`MultiSigDeleGator` and `HybridDeleGator` both have a `reinitialize` function; `reinitialize` is to be cal... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Missing `maxExposureFactor` in `Errors.ExceededMaxExposure`
### Description
A `maxExposureFactor` was added to adjust the max exposure during the slippage check. However, the `maxExposureFactor` value is not present in the custom error `Errors.ExceededMaxExposure`, which will not emit the correct parameters wh... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Using batch() to Unsubscribe from Many Incentives Could Lead to Unexpected Results
### Description
Unsubscribing from many incentives using the `batch()` function could lead to unexpected behaviour. In fact, the shift of the incentive index that happens after unsubscribing from an incentive could result in rev... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | storage | false | false | ## Low: optimisations in struct
### Description
**Description**
At
contracts/Cohort.sol:15
The fields packing inside the struct is not really gas efficient.
It’s better to place all uint256 vars at the top and the packing others by 256 slots.
**Recommendation**:
Change the order inside the structure to save the gas... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | true | false | ## Low: MISSING LEGITIMACY OF VOTE CASTER
### Description
In the `Governance.sol` contract, it is noted that the `vote` function lacks the legitimacy of `msg.sender` if it is a valid voter. As a result, an unknown EOA or contract may cast a vote; therefore, the result of the vote can be manipulated, although it is unl... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | reentrancy | true | false | ## Low: Misplaced `nonReentrant` modifier
### Description
Some contracts in-scope are utilizing the `ReentrancyGuard` from OpenZeppelin for reentrancy locks (mutex), which is best practice. However, the `nonReentrant` modifier should be placed **before all other modifiers**, to effectively prevent reentrancy on the fu... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | cyfrin_structured | low | token | true | false | ## Low: Use named mappings in `TokenBridge` and remove obsolete comments
### Description
`TokenBridge` should use named mappings and remove obsolete comments:
```diff
- /// @notice mapping (chainId => nativeTokenAddress => brigedTokenAddress)
- mapping(uint256 => mapping(address => address)) public nativeToBridged... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | false | false | ## Medium: Unsafe Assumptions About Average Time Between Blocks
### Description
The current implementation of the protocol uses *blocks* rather than *seconds* to measure time between interest accruals. This makes the implementation highly sensitive to changes in the average time between Ethereum blocks.
On [line 30 ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | signature | false | false | ## Medium: Unhandled Stake Recovery Failure Leads to Potential Accounting Inconsistencies
### Description
**Update**
While the client's statements are accurate for the current state of the elector contract, there is potential for the elector contract to be upgraded. This issue is not problematic now, but could be in t... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | false | false | ## Medium: (e *encodedBlobStore) DeleteEncodingRequest() needs a write lock
### Description
`(e *encodedBlobStore) DeleteEncodingRequest()` holds a read lock `one.mu` which is guarding `e.requested`. This is not sufficient because `e.requested` is modified with a `delete()` in this function. This is called regularly b... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Expired Options can be Created
### Description
Description
It is possible to grant options that have already expired, and so are effectively a sort of disguised cash transfer.
As the testing team understands it, this has no legitimate use within the protocol. It is, however, a tool that might be
useful for perp... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | other | true | false | ## Gas: Prefer `private` over `public` for constants to save gas
### Description
Using `private` instead of `public` for constants can save gas.
The compiler doesn't need to create non-payable getter functions for deployment calldata, store the bytes of the value outside of where it's used, or add another entry to th... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | reentrancy | true | true | ## High: Reentrancy into AntePool.checkTest scales challenger eligibility amount
### Description
A malicious AnteTest or underlying contract being tested can trigger multiple failed `checkTest` calls by reentering the `AntePool.checkTest` function. With each call, the `_calculateChallengerEligibility` method increases... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: Inflated `totalAssets` in `StrategyMainnet`, `StrategyArb`, and `StrategyOp` Contracts
### Description
The `StrategyMainnet`, `StrategyArb`, and `StrategyOp` contracts all contain a vulnerability where the `totalAssets` value is inflated due to unconverted `underlying` tokens. This occurs because the contra... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | true | false | ## Low: Protocol fees are not collected when rewards are not routed through AfEth
### Description
https://github.com/code-423n4/2023-09-asymmetry/blob/main/contracts/strategies/votium/VotiumStrategyCore.sol#L302-L304
Protocol fees are collected in `AfEth::depositRewards()`, just before rewards are being compounded in... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Missing Events Emitting
### Description
There are functions in the contracts that do not emit events on the important state changes.
### Impact
This violates the best practices and disallows to track the state changes off-chain. | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: If user has not mown since germination, they'll lose their portion of `plenty`
### Description
If user has not mown since germination, they'll lose their portion of plenty
### Impact
Loss of funds | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | true | false | ## Low: Require condition `_minLineaOut > 0` offers no protection against malicious BURNER_ROLE behaviour
### Description
**Description:** Function burnAndBridge in RollupRevenueVault is only callable by the BURNER_ROLE. During this call, the BURNER_ROLE can pass in arbitrary `_swapData` to call on the V3DexSwap contr... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | cross-chain | false | false | ## High: TRST-H-1 An attacker can drain Mozaic Vaults by manipulating the LP price
### Description
**Description:**
The controller is tasked with synchronizing LP token price across all chains. It implements a
lifecycle. An admin initiates the snapshot phase, where Controller requests all Vaults to report
the total ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | cross-chain | true | false | ## Medium: `OPFaultVerifier` ingests games that resolve incorrectly
### Description
Take a look at the `OPFaultVerifier` implementation:
From the [documentation](https://github.com/code-423n4/2024-12-unruggable/blob/8c8cdc170741d4c93287302acd8bca8ff3d625a2/contracts/op/OPFaultVerifier.sol# L12-L13), the Optimism Fau... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | true | false | ## Low: Inconsistent unpause role in `onUSD`
### Description
**Description:** [`onUSD::unpause`](https://github.com/ondoprotocol/rwa-internal/blob/a74d03f4a71bd9cac09e8223377b47f7d64ca8d4/contracts/globalMarkets/onUSD.sol#L200-L202) is restricted to `DEFAULT_ADMIN_ROLE`, unlike other contracts in the system that use a... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | signature | true | false | ## High: `ChakraSettlement.receive_cross_chain_msg` and `ChakraSettlement.receive_cross_chain_callback` functions do not ensure that receiving `ChakraSettlement` contract's `contract_chain_name` must match `to_chain` corresponding to respective `txid` input though they should
### Description
### Impact
Because the `C... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | true | false | ## Low: Array Out-Of-Bounds
### Description
## getInterestRateFromPoolUtilization Issue
`getInterestRateFromPoolUtilization` in `PiecewiseInterestRate` may revert if `_borrowed` exceeds `_deposited`.
Specifically, the issue is in the loop that iterates through the `model.kinks` array to obtain the appropriate range... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | true | false | ## Low: Contracts are incompatible with ERC20 tokens with fee
### Description
The Prophet contracts are meant to interface with ERC20 tokens. However, several ERC20 tokens do not fully comply with the ERC20 standard, meaning the contract will not work with such tokens.
For example, some ERC20 tokens take a fee on tra... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: Faulty Assumptions in CurveSwapper’s Curve Pool Setup
### Description
The `CurveSwapper` constructor assumes that the Curve pool contains exactly two coins and that the provided `underlyingAsset` is one of them. This logic is implemented as follows:
```
if (underlyingAsset == curvePool.coins(0)) {
coinPosit... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Unreachable code
### Description
**Description**
In Steakable.sol file, in deposit(), the if(user.amount==0) will never get satisfied because the
minimum value that will get updated in the user.amount variable before is Non-zero value.
**Recommendation**:
Do user.amount calculations unconditionally amount >... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | solodit_api | medium | Business Logic | false | true | _Submitted by 0x52_
<https://github.com/code-423n4/2022-08-olympus/blob/b5e139d732eb4c07102f149fb9426d356af617aa/src/policies/Operator.sol#L195-L268><br>
Loss of treasury funds.
### Proof of Concept
<https://github.com/code-423n4/2022-08-olympus/blob/b5e139d732eb4c07102f149fb9426d356af617aa/src/modules/RANGE.sol#L1... | Code4rena | 4 | Olympus DAO |
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | initialization | true | false | ## High: Remove Offer Does Not Respect Offer Non-Mutability
### Description
## Interop Market Overview
The interop market enforces listings with offers that should not be tampered with, similar to the concept of locking in `OS-MTB-ADV-03`.
## Code Snippet: Offer Creation
However, `remove_offer` is allowed to bypas... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | oracle | true | false | ## Low: Aave V3 price source can be inaccurate
### Description
_Resolved_
The `UsrRedemptionExtension` contract relies on Aave V3's oracle system to determine withdrawal token amounts during redemption. However, the implementation has potential price accuracy issues due to how it interacts with `Chainlink` oracles.
... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Mismatch in Validator Count
### Description
## Analysis of `steward_state::compute_score`
In `steward_state::compute_score`, `num_pool_validators` is updated positively only once at the beginning of a cycle. During this update, it reflects the current number of validators in the pool. This adjustment ensures ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Should an airdrop token arrive on the `pair.sol` contract, it will be stuck
### Description
With the `wrap()` function, NFTs are transferred to the contract and in case of airdrop due to these NFTs, it will be stuck in the contract as there is no function to take these airdrop tokens from the contract.
Import... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | true | false | ## Low: Skipping rewards allocation in fund distribution
### Description
In the `receiveRewards` function of the **SystemReward** contract, the logic skips processing a whitelist member if the remaining balance (`remain`) is less than the calculated allocation (`toWhiteListValue`). Instead of partially allocating the ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: Implementations Can Be Initialized
### Description
The contracts are upgradable, inheriting from the `Initializable` contract. However, the current implementations are missing the `_disableInitializers()` function call in the constructors. Thus, an attacker can initialize the implementation. Usually, the initi... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Some `require` descriptions are not clear
### Description
Some `require` error descriptions below return results like A, B , C.
1. It does not comply with the general `require` error description model of the project (Either all of them should be debugged in this way, or all of them should be explained with a ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | token | true | false | ## Medium: The value of LP token can be manipulated by the first minister, which allows the attacker to dilute future liquidity providers’ shares
### Description
## Handle
WatchPug
## Vulnerability details
For the first minter of an Exchange pool, the ratio of `X/Y` and the `totalSupply` of the LP token can be man... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: `SessionKeyValidator` is not working on ZkSync mainnet
### Description
The SessionKeyValidator contract fails to function on ZkSync mainnet due to the `TimestampAsserterLocator.locate` function explicitly reverting on chainId `324` (ZkSync mainnet). This breaks all session key functionality for mainnet depl... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | front-running | false | false | ## Medium: Malicious owner can arbitrarily change fee to any % value
### Description
_Submitted by 0xRajeev_
The Tracer protocol like any other allows market creators to charge fees for trades. However, a malicious/greedy owner can arbitrarily change fee to any % value and without an event to observe this change or a... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: REPEATED EXECUTION MESSAGES
### Description
The `ExecuteMsg::MigrateUnbondWaitList` and `ExecuteMsg::UpdateParams` messages are repeated in the `execute` function from **krp-staking-contracts/basset\_sei\_hub** contract. Although this situation doesn't pose a security risk, it's included in the report as part ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | cyfrin_structured | low | signature | true | false | ## Low: Using `block.number` instead of `block.timestamp` as an expiration check to execute signature | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | initialization | true | false | ## Medium: Trading#initiateMarketOrder allows to open a position with more margin than expected due to _handleOpenFees wrong calculation when a trade is referred
### Description
When `initiateMarketOrder` is called, `_marginAfterFees` are calculated and then used to calculate `_positionSize`:
The problem is that `_h... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | false | false | ## Low: Unauthorized rebalanceTrigger calls may allow one to exploit arbitrage opportunity and put system at risk
### Description
## Handle
0xRajeev
## Vulnerability details
## Impact
The need for an externally visible rebalanceTrigger() (when rebalance() does that check itself) is apparently that the whitelisted... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Unnecessary deadline check
### Description
There is a `deadline` check at line
https://github.com/MetaLex-Tech/LeXscrow/blob/94ca277528bb25b8421dc127941c18915144eb29/src/TokenLexscrow.sol#L338. A `deadline` check is performed inside the `permit` function, so there is no need to do it outside of that function.
... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: [26] Constant redefined elsewhere
### Description
Consider defining in only one contract so that values cannot become out of sync when only one location is updated.
A cheap way to store constants in a single location is to create an internal constant in a library. If the variable is a local cache of another ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: Vesting Rate Can Be Slowed by the Rewarder
### Description
**Update**
Marked as "Fixed" by the client. Addressed in: `4db61cc26152af219e97811c89224c6407bdc96e`. The client provided the following explanation:
> Previous vesting must complete before new rewards can be transferred in
**File(s) affected:**`Staki... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: getAllHyperchains Function Reverts Due to Invalid Key Access
### Description
Recent changes to the [`getAllHyperchains`](https://github.com/matter-labs/era-contracts/blob/19575710034b16994932a1f055371fccaaaebf6f/l1-contracts/contracts/state-transition/StateTransitionManager.sol#L105) function have introduced a... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | cyfrin_structured | high | integer-overflow | true | false | ## High: `VoteKickPolicy._endVote()` might revert forever due to underflow
### Description
In `onFlag()`, `targetStakeAtRiskWei[target]` might be less than the total rewards for the flagger/reviewers due to rounding.
```solidity
File: contracts\OperatorTokenomics\StreamrConfig.sol
22: /**
23: * Minimum amoun... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | overflow | false | false | ## Medium: NFTs that don't have a checkpoint can't be transferred
### Description
Submitting as high risk because it breaks a fundamental operation (transferring) for a large number of tokens.
### Proof of Concept
uint256 nCheckpoints = numCheckpoints[tokenId];
Checkpoint storage checkpoint = checkpoints[tokenI... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Missing sanity zero-address checks may lead to undesired behavior or lock of funds
### Description
Certain logic requires zero-address checks to avoid undesired behavior or lock of funds. For example, in `Splitter.sol#L34` users can permanently lock ETH by mistakenly using `safeTransferETH` with a default/zero... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | front-running | false | false | ## Medium: `unauthorize()` can be front-run so that the malicious authorized user would get their authority back
### Description
The `Caller` contract enables users to authorize other users to execute tx on their behalf.
This option enables the authorized/delegated user to add more users to the authorized users list.
... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | overflow | false | false | ## Medium: Change Interval Can be Arbitrarily Set by The Fee Controller to Brick The Leveraged Pool
### Description
The `changeInterval` dictates how much the `mintingFee` should move in the positive or negative direction. This is dependent on `longTokenPrice * shortTokenPrice`. The fee controller can call `setChangeI... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | true | false | ## Low: Use Ownable2Step in PohRegistrationManager ✓ Fixed
### Description
In the `PohRegistrationManager` contract, the `Ownable` contract is used for access verification. However, the `Ownable` contract lacks protection for cases when there is a transfer of ownership to an incorrect account or to contracts that are ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | false | false | ## Low: Bridge-Token Configuration Verification
### Description
## OrbitERC20OFTAdapter Overview
Each `OrbitERC20OFTAdapter` is associated with a specific ERC-20 token (referred to as `innerToken` in the `OFTAdapter`). This token must be correctly managed by the bridge to ensure it is locked, transferred, and release... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | initialization | true | false | ## Gas: State variables that never change should be declared `immutable` or `constant`
### Description
Avoids a Gsset (**20000 gas**) in the constructor, and replaces the first access in each transaction (Gcoldsload - **2100 gas**) and each access thereafter (Gwarmacces - **100 gas**) with a `PUSH32` (**3 gas**).
Wh... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | true | false | ## Low: TokenBridge Does Not Follow a 2-Step Approach for Ownership Transfers ✓ Fixed
### Description
`TokenBridge` defines a privileged role **Owner**, however, it uses a single-step approach, which immediately transfers the ownership to the new address. If accidentally passed an incorrect address, the current owner ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | false | false | ## Low: Undisclosed Functionality Mismatch in L1 and L2 Token Functions Post-Bridging
### Description
When bridging tokens from L1 to L2, by default, the [`L2StandardERC20` contract](https://github.com/matter-labs/era-contracts/blob/2e0734b1ff9cbf3a88aadba6a19c4c4bc8645d33/zksync/contracts/bridge/L2StandardERC20.sol) ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | false | false | ## Low: Lack of Granular Permission Control in WhitelistComplianceOracle
### Description
The [`WhitelistComplianceOracle`](https://bitbucket.org/wisdomtreeam/whitelist-contexts/src/44760785af1696704cdfcc56c2ba4a17ff603fb5/src/oracles/whitelist-compliance/WhitelistComplianceOracle.sol#lines-20:24) contract inherits the... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | false | false | ## Medium: Market-specific pause is not checked for sponsor
### Description
_Submitted by [cmichel](https://twitter.com/cmichelio)_
The treasury only checks its `globalPause` field but does not check its market-specific `marketPaused` field for `Treasury.sponsor`.
A paused market contract can therefore still deposit ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | overflow | false | false | ## Low: Unvalidated Input From External Contract
### Description
The `getAllocations()` function retrieves external values (`discount`, `refer`) from the Referrals contract on line [63] in `Processor.sol`. These values are subsequently used without safe math and are assumed to be percentages. Since this contract is ex... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | front-running | false | false | ## Medium: Missing slippage protection on `sellVotes()`
### Description
The `ReputationMarket` contract provides preview functions ([simulateBuy()](https://github.com/sherlock-audit/2024-11-ethos-network-ii/blob/main/ethos/packages/contracts/contracts/ReputationMarket.sol#L761) and [simulateSell()](https://github.com/... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Potential race condition for undelegateFromPool()
### Description
After a slashing event, `undelegateFromPool()` will result in more funds than `undelegate()` from a validator. This might result in a race condition to do `undelegateFromPool()`, because that prevents others from doing the same, depending on the... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | dos | false | false | ## Medium: Only part of `keccak256()` is used as hash, making it susceptible to collision attacks
### Description
_Submitted by 0xA5DF, also found by Lambda and V\_B_
### Vulnerability Details
At 2 places in the code only part of the output of `keccak256()` is used as the hash:
* At `TokenDistributor` - `Distribu... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Incorrect gas calculations in several contracts
### Description
TON contracts, being a part of an asynchronous blockchain, can process messages in a non-deterministic order. In some cases, the incoming messages require the contract to perform changes in the storage, send new messages, and other gas-consuming t... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | cross-chain | false | false | ## Medium: Using stale cToken exchange rate
### Description
Throughout the [`CompoundProvider` contract](https://github.com/BarnBridge/BarnBridge-SmartYieldBonds/blob/943df3a8fcd8dd128af3beb0c85a0480c0e95ead/contracts/providers/CompoundProvider.sol#L305), when considering the exchange rate between cTokens and uTokens ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | other | true | false | ## High: Dynamic Field Hash Collision
### Description
## Hash Type and Key Computation
In `dynamic_fields.move`, `hash_type_and_key` computes hashes based on an input address and an Object. The hash is created by concatenating three parts:
1. **parent**, `AccountAddress`, which serves as the parent of the object.
2.... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | storage | false | false | ## Medium: Shutdown Is Not Irreversible
### Description
The Riz protocol is meant for riskier assets and supports a feature whereby a shutdown can be triggered to then slash the positions and redistribute the remaining funds after the bad debt has been socialized. However, even though the shutdown state cannot current... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | cross-chain | true | false | ## High: Missing call to computeCollateralOrlvlUSDAmount() in LevelMinting.mintDefault()
### Description
The function `Bridge.mintDefault()` directly passes the order struct specified by the user to `_mint()`:
```solidity
function mintDefault(
Order memory order
) external virtual onlyMinterWhenEnabled {
if (msg.... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | oracle | false | false | ## Low: Hardcoded Values May Not Hold in a Fluctuating Market
### Description
**Update**
Marked as "Acknowledged" by the client. The client provided the following explanation: Since Boba_GasPriceOracle (implementation) is a predeploy and is also stored as a constant in the contract ‘Lib_PredeployAddresses’, any update... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Redundant Hardhat Console
### Description
**Description:**
During the code review, It has been noticed that the contract uses redundant console log. It should be deleted before deployment.
**Recommendations:**
Consider deleting redundant console output. | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Add Mechanism to Remove Validators
### Description
## Validator Protocol
Once a validator joins the pool, its `OwnerCapability` is stored by the Ditto protocol and it is not possible for the validator to leave the protocol or recover its `OwnerCapability`.
## Remediation
Consider adding a mechanism for vali... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | other | false | false | ## Gas: Constants can be private
### Description
Marking constants as `private` save gas upon deployment, as the compiler does not have to create getter functions for these variables. It is worth noting that a `private` variable can still be read using either the verified contract source code or the bytecode. This may... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | cross-chain | false | false | ## Low: Lack of maximum fee cap allows excessively high fees
### Description
The system integrates with protocols such as 0x, Jupiter, and deBridge for transaction execution. As part of these integrations, a fee amount is set and sent to the protocol addresses via API calls. However, there is no maximum cap enforced o... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | dos | false | false | ## Low: Secrets in Configuration File
### Description
**Update**
The client fixed the issue in commit `4914653776698f470a95ca392f112af603060fba` and provided the following explanation:
> The keys used in the configuration file were revoked and we are instead including them in .env and loading them in when hardhat run... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | true | false | ## Low: Missing boundary checks on feeBps
### Description
There's a missing check when setting `feeBps` from `ERC721SeaDrop.sol` while one exists when the value is used at a later stage in `SeaDrop.sol`, which could cause an `InvalidFeeBps` error.
### Recommendation
Consider adding the following checks before setting... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | true | false | ## Low: Missing validation for src\_chain\_id and dest\_chain\_id in create\_order
### Description
The `create_order` function is responsible for creating a new order for a user to transfer tokens across different blockchains. It checks the deposit amount, verifies that the user has sufficient fees, and sets the detai... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: `MysteryBox::claimMysteryBoxes()` should return custom error when reverting due to `amountToClaim == 0`
### Description
**Description:** `MysteryBox::claimMysteryBoxes()` should [return custom error](https://github.com/Earnft/smart-contracts/blob/43d3a8305dd6c7325339ed35d188fe82070ee5c9/contracts/MysteryBox.so... | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.