prompt
listlengths
2
2
source
stringclasses
3 values
severity
stringclasses
5 values
category
stringclasses
186 values
has_code
bool
2 classes
has_poc
bool
2 classes
reference_response
stringlengths
23
5k
firm
stringclasses
26 values
quality_score
float64
0
5
protocol
stringclasses
398 values
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
front-running
true
false
## Medium: No `safe_withdrawal` option in `withdraw_protocol_liquidity` function in omnipool can be abused by frontrunners to cause losses to the admin when removing liquidity ### Description The `sacrifice_position` function can be used by any liquidity provider to hand over their liquidity position to the protocol. ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Dutch Orders Without Duration Benefit the Filler ### Description The Dutch order implements a [linear decay function](https://github.com/Uniswap/UniswapX/blob/7c5e359fc476f3e55497a8cd6f405f67af2c1dcf/src/lib/DutchDecayLib.sol#L26-L48). From `decayStartTime` to `decayEndTime` the amount of input or output token...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Missing Dependencies Exact Version Pinning ### Description ## Dependency Management in the App The app uses a significant amount of dependencies. Most of these dependencies are not pinned to an exact version; most are set like: `(^X.X.X)`, which will receive the most recent major version. This could enable de...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
true
false
## Low: Centralization Risk Due to Mutable emissionStart ### Description In the `GorplesCoin` contract, the `emissionStart` variable, which determines the starting point for emission calculations, can be modified by any account with the `DEFAULT_ADMIN_ROLE`. This is facilitated by the `setEmissionStart` function: ```...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
overflow
false
false
## Medium: No security checks for the final epoch calculation ### Description **Description** TokenDistribution.sol, line 51. With incorrectly handled parameters there is a possibility to get underflow during the epoch calculation, since no SafeMath applied in this place nor necessary checks performed. **Recommendat...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: [10] Use a more recent version of solidity ### Description Use a solidity version of at least 0.8.4 to get `bytes.concat()` instead of `abi.encodePacked(,)` Use a solidity version of at least 0.8.12 to get `string.concat()` instead of `abi.encodePacked(,)`
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
liquidation
true
false
## High: Attacker can steal a loan's collateral and break the protocol ### Description The platform allows an attacker to steal an auctioned loan's collateral. The result of the attack is that - At some point, some lender will not be able to withdraw the invested `loanToken` used to create the pool (or add balance to...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Distribution validation is inconsistent due to inclusion of variable DAO fee ### Description The `Distributor._ensureSufficientTotal()` function is called with the return values of `totals()`, which includes the DAO fee in its calculations. This can lead to a situation where previously valid distributions beco...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
low
rounding
true
false
## Low: `SherpaVault::_rollInternal` price calculation comment and math inconsistent ### Description When calculating a new price a script queries all vaults on all chains then passes that to `SherpaVault:: rollToNextRound`. This in turn calls [`SherpaVault::_rollInternal`](https://github.com/hedgemonyxyz/sherpa-vault...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
false
false
## Low: DRY, Smart contract ERC20 is based on openzeppelin library. ### Description **Recommendation**: Add openzeppelin to dependencies and inherit openzeppelin ERC20 & ERC20Burnable contracts implementation.
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: Optimization in conditional logic ### Description In the `ExecuteDepositUtils._executeDeposit` function, the deposit logic is segregated based on the price impact factor. The initial `if` clause manages scenarios with a positive price impact, whereas the subsequent `if` clause handles those with a negative pri...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: Misuse of isProposalOpen() function ### Description The `isProposalOpen()` function returns true if it's open for voting. It returns false if it's too late or too early for voting. However, in two places of the codebase, it seems to be used as an `isProposalStillOpen()` function, neglecting the fact that it...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
cross-chain
true
false
## High: Executor reverts on receiving native tokens from BridgeFacet ### Description When doing an external call in `execute()`, the `BridgeFacet` provides liquidity into the `Executor` contract before calling `Executor.execute`. The `BridgeFacet` transfers a native token when an `address(wrapper)` is provided. Howev...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
token
true
false
## Medium: Inbound transactions submitted to the `InTxTracker` that contain multiple `ZetaSent` and `Deposited` events are not processed correctly by the observers resulting in a loss of funds ### Description Observers miss out on voting on multiple `ZetaSent` and ERC-20 `Deposited` events that have been emitted in a ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
false
false
## Low: Inconsistent Naming Convention: `changeDecimals` ### Description This issue has been identified within the [changeDecimals](https://github.com/Se7en-Seas/cMETH-boring-vault/blob/d6e2d18f45a3e05d749d34966139fc85fc47f7e6/src/base/Roles/AccountantWithRateProviders.sol#424) function of the `AccountantWithRateProvi...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
true
true
## Medium: decodeBatch() bounds check can be bypassed ### Description The `decodeBatch()` function in the `LibERC7579` library decodes its `bytes calldata executionData` input into an array of `bytes32` pointers referencing `Call` structs, where each `Call` struct contains an `address target`, a `uint256 value`, and `...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Inconsistent spacing in comments ### Description Some lines use `// x` and some use `//x`. The instances below point out the usages that don't follow the majority, within each file. *There are 127 instances of this issue:* [See original submission](https://github.com/code-423n4/2022-05-rubicon-findings/issue...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Internal Functions Marked Private ### Description ## Functions in NEAR Functions in NEAR can be public, private, or internal. A private function is exposed on the blockchain, but attempts to call the private function will fail unless the caller is the contract itself; either through a callback or using the co...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
false
false
## High: An offer made after auction end can be stolen by an auction winner ### Description _Submitted by hyh, also found by leastwood, shenwilly, and WatchPug_ An Offer which is made for an NFT when auction has ended, but its winner hasn't received the NFT yet, can be stolen by this winner as `_transferFromEscrow` b...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
cross-chain
true
false
## Low: [02] Code is unreachable ### Description In [Mailbox, function `_verifyDepositLimit`](https://github.com/code-423n4/2023-10-zksync/blob/72f5f16ed4ba94c7689fe38fcb0b7d27d2a3f135/code/contracts/ethereum/contracts/zksync/facets/Mailbox.sol#L275C1-L281C6), the code after the `if` statement is never executed as `ad...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
low
token
false
false
## Low: Consider renaming `MTokenMessagerBase::ccipClient` as it is used by LayerZero integration and actually refers to `MToken` ### Description `MTokenMessager::ccipClient` and `MTokenMessagerBase::ccipClient` are used by both LayerZero (`MTokenMessagerLZ`) and CCIP (MTokenMessagerV2`). But they actually simply ref...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: er Gas Check ### Description ## Code Review: settlePnl Function In the function `settlePnl`, to validate the condition `canSettleX18.abs() > 0`, it is better to use `!=`, since the `abs()` function uses higher gas than a single opcode for `!=`. ## Solidity Code Snippet ## Remediation Replace the check wit...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Use scientific notation (e.g. `10e18`) rather than exponentiation (e.g. `10**18`) ### Description File: loan-3.0.0-beta.1/contracts/MapleLoanInternals.sol (line [14](https://github.com/maple-labs/loan/blob/4c6fe2cd91d6d16b8434c426fe7eb6d2bc77bc30/contracts/MapleLoanInternals.sol#L14))
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
false
false
## High: Missing total amount calculation ### Description **Description** Line 83, No calculations and checks for the total amount added through the addAllocations() method. There are no checks if the total amount exceeds the current supply, or if the new portion of allocations added to the same vesting type exceeds ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
oracle
false
false
## Gas: `peek` and `get' are identical (non-transactional) ### Description In the contract `ChainlinkMultiOracle`, both functions `peek` and `get` are identical. They are declared as views while based on IOracle interface, `get` should be transactional. **[albertocuestacanada (Yield) confirmed](https://github.com/cod...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: MultiSigDeleGator and HybridDeleGator: reinitialize Function Should Be Removed ### Description #### Resolution Client’s comment: > Needed for account upgrading. #### Description and Recommendation `MultiSigDeleGator` and `HybridDeleGator` both have a `reinitialize` function; `reinitialize` is to be cal...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Missing `maxExposureFactor` in `Errors.ExceededMaxExposure` ### Description A `maxExposureFactor` was added to adjust the max exposure during the slippage check. However, the `maxExposureFactor` value is not present in the custom error `Errors.ExceededMaxExposure`, which will not emit the correct parameters wh...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Using batch() to Unsubscribe from Many Incentives Could Lead to Unexpected Results ### Description Unsubscribing from many incentives using the `batch()` function could lead to unexpected behaviour. In fact, the shift of the incentive index that happens after unsubscribing from an incentive could result in rev...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
storage
false
false
## Low: optimisations in struct ### Description **Description** At contracts/Cohort.sol:15 The fields packing inside the struct is not really gas efficient. It’s better to place all uint256 vars at the top and the packing others by 256 slots. **Recommendation**: Change the order inside the structure to save the gas...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
true
false
## Low: MISSING LEGITIMACY OF VOTE CASTER ### Description In the `Governance.sol` contract, it is noted that the `vote` function lacks the legitimacy of `msg.sender` if it is a valid voter. As a result, an unknown EOA or contract may cast a vote; therefore, the result of the vote can be manipulated, although it is unl...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
reentrancy
true
false
## Low: Misplaced `nonReentrant` modifier ### Description Some contracts in-scope are utilizing the `ReentrancyGuard` from OpenZeppelin for reentrancy locks (mutex), which is best practice. However, the `nonReentrant` modifier should be placed **before all other modifiers**, to effectively prevent reentrancy on the fu...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
low
token
true
false
## Low: Use named mappings in `TokenBridge` and remove obsolete comments ### Description `TokenBridge` should use named mappings and remove obsolete comments: ```diff - /// @notice mapping (chainId => nativeTokenAddress => brigedTokenAddress) - mapping(uint256 => mapping(address => address)) public nativeToBridged...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: Unsafe Assumptions About Average Time Between Blocks ### Description The current implementation of the protocol uses *blocks* rather than *seconds* to measure time between interest accruals. This makes the implementation highly sensitive to changes in the average time between Ethereum blocks. On [line 30 ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
signature
false
false
## Medium: Unhandled Stake Recovery Failure Leads to Potential Accounting Inconsistencies ### Description **Update** While the client's statements are accurate for the current state of the elector contract, there is potential for the elector contract to be upgraded. This issue is not problematic now, but could be in t...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: (e *encodedBlobStore) DeleteEncodingRequest() needs a write lock ### Description `(e *encodedBlobStore) DeleteEncodingRequest()` holds a read lock `one.mu` which is guarding `e.requested`. This is not sufficient because `e.requested` is modified with a `delete()` in this function. This is called regularly b...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Expired Options can be Created ### Description Description It is possible to grant options that have already expired, and so are effectively a sort of disguised cash transfer. As the testing team understands it, this has no legitimate use within the protocol. It is, however, a tool that might be useful for perp...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
other
true
false
## Gas: Prefer `private` over `public` for constants to save gas ### Description Using `private` instead of `public` for constants can save gas. The compiler doesn't need to create non-payable getter functions for deployment calldata, store the bytes of the value outside of where it's used, or add another entry to th...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
reentrancy
true
true
## High: Reentrancy into AntePool.checkTest scales challenger eligibility amount ### Description A malicious AnteTest or underlying contract being tested can trigger multiple failed `checkTest` calls by reentering the `AntePool.checkTest` function. With each call, the `_calculateChallengerEligibility` method increases...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
true
false
## Medium: Inflated `totalAssets` in `StrategyMainnet`, `StrategyArb`, and `StrategyOp` Contracts ### Description The `StrategyMainnet`, `StrategyArb`, and `StrategyOp` contracts all contain a vulnerability where the `totalAssets` value is inflated due to unconverted `underlying` tokens. This occurs because the contra...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
true
false
## Low: Protocol fees are not collected when rewards are not routed through AfEth ### Description https://github.com/code-423n4/2023-09-asymmetry/blob/main/contracts/strategies/votium/VotiumStrategyCore.sol#L302-L304 Protocol fees are collected in `AfEth::depositRewards()`, just before rewards are being compounded in...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Missing Events Emitting ### Description There are functions in the contracts that do not emit events on the important state changes. ### Impact This violates the best practices and disallows to track the state changes off-chain.
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
true
false
## Medium: If user has not mown since germination, they'll lose their portion of `plenty` ### Description If user has not mown since germination, they'll lose their portion of plenty ### Impact Loss of funds
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
true
false
## Low: Require condition `_minLineaOut > 0` offers no protection against malicious BURNER_ROLE behaviour ### Description **Description:** Function burnAndBridge in RollupRevenueVault is only callable by the BURNER_ROLE. During this call, the BURNER_ROLE can pass in arbitrary `_swapData` to call on the V3DexSwap contr...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
cross-chain
false
false
## High: TRST-H-1 An attacker can drain Mozaic Vaults by manipulating the LP price ### Description **Description:** The controller is tasked with synchronizing LP token price across all chains. It implements a lifecycle. An admin initiates the snapshot phase, where Controller requests all Vaults to report the total ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
cross-chain
true
false
## Medium: `OPFaultVerifier` ingests games that resolve incorrectly ### Description Take a look at the `OPFaultVerifier` implementation: From the [documentation](https://github.com/code-423n4/2024-12-unruggable/blob/8c8cdc170741d4c93287302acd8bca8ff3d625a2/contracts/op/OPFaultVerifier.sol# L12-L13), the Optimism Fau...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
true
false
## Low: Inconsistent unpause role in `onUSD` ### Description **Description:** [`onUSD::unpause`](https://github.com/ondoprotocol/rwa-internal/blob/a74d03f4a71bd9cac09e8223377b47f7d64ca8d4/contracts/globalMarkets/onUSD.sol#L200-L202) is restricted to `DEFAULT_ADMIN_ROLE`, unlike other contracts in the system that use a...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
signature
true
false
## High: `ChakraSettlement.receive_cross_chain_msg` and `ChakraSettlement.receive_cross_chain_callback` functions do not ensure that receiving `ChakraSettlement` contract's `contract_chain_name` must match `to_chain` corresponding to respective `txid` input though they should ### Description ### Impact Because the `C...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
true
false
## Low: Array Out-Of-Bounds ### Description ## getInterestRateFromPoolUtilization Issue `getInterestRateFromPoolUtilization` in `PiecewiseInterestRate` may revert if `_borrowed` exceeds `_deposited`. Specifically, the issue is in the loop that iterates through the `model.kinks` array to obtain the appropriate range...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
true
false
## Low: Contracts are incompatible with ERC20 tokens with fee ### Description The Prophet contracts are meant to interface with ERC20 tokens. However, several ERC20 tokens do not fully comply with the ERC20 standard, meaning the contract will not work with such tokens. For example, some ERC20 tokens take a fee on tra...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: Faulty Assumptions in CurveSwapper’s Curve Pool Setup ### Description The `CurveSwapper` constructor assumes that the Curve pool contains exactly two coins and that the provided `underlyingAsset` is one of them. This logic is implemented as follows: ``` if (underlyingAsset == curvePool.coins(0)) { coinPosit...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Unreachable code ### Description **Description** In Steakable.sol file, in deposit(), the if(user.amount==0) will never get satisfied because the minimum value that will get updated in the user.amount variable before is Non-zero value. **Recommendation**: Do user.amount calculations unconditionally amount >...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
solodit_api
medium
Business Logic
false
true
_Submitted by 0x52_ <https://github.com/code-423n4/2022-08-olympus/blob/b5e139d732eb4c07102f149fb9426d356af617aa/src/policies/Operator.sol#L195-L268><br> Loss of treasury funds. ### Proof of Concept <https://github.com/code-423n4/2022-08-olympus/blob/b5e139d732eb4c07102f149fb9426d356af617aa/src/modules/RANGE.sol#L1...
Code4rena
4
Olympus DAO
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
initialization
true
false
## High: Remove Offer Does Not Respect Offer Non-Mutability ### Description ## Interop Market Overview The interop market enforces listings with offers that should not be tampered with, similar to the concept of locking in `OS-MTB-ADV-03`. ## Code Snippet: Offer Creation However, `remove_offer` is allowed to bypas...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
oracle
true
false
## Low: Aave V3 price source can be inaccurate ### Description _Resolved_ The `UsrRedemptionExtension` contract relies on Aave V3's oracle system to determine withdrawal token amounts during redemption. However, the implementation has potential price accuracy issues due to how it interacts with `Chainlink` oracles. ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Mismatch in Validator Count ### Description ## Analysis of `steward_state::compute_score` In `steward_state::compute_score`, `num_pool_validators` is updated positively only once at the beginning of a cycle. During this update, it reflects the current number of validators in the pool. This adjustment ensures ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Should an airdrop token arrive on the `pair.sol` contract, it will be stuck ### Description With the `wrap()` function, NFTs are transferred to the contract and in case of airdrop due to these NFTs, it will be stuck in the contract as there is no function to take these airdrop tokens from the contract. Import...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
true
false
## Low: Skipping rewards allocation in fund distribution ### Description In the `receiveRewards` function of the **SystemReward** contract, the logic skips processing a whitelist member if the remaining balance (`remain`) is less than the calculated allocation (`toWhiteListValue`). Instead of partially allocating the ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: Implementations Can Be Initialized ### Description The contracts are upgradable, inheriting from the `Initializable` contract. However, the current implementations are missing the `_disableInitializers()` function call in the constructors. Thus, an attacker can initialize the implementation. Usually, the initi...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Some `require` descriptions are not clear ### Description Some `require` error descriptions below return results like A, B , C. 1. It does not comply with the general `require` error description model of the project (Either all of them should be debugged in this way, or all of them should be explained with a ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
token
true
false
## Medium: The value of LP token can be manipulated by the first minister, which allows the attacker to dilute future liquidity providers’ shares ### Description ## Handle WatchPug ## Vulnerability details For the first minter of an Exchange pool, the ratio of `X/Y` and the `totalSupply` of the LP token can be man...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
true
false
## Medium: `SessionKeyValidator` is not working on ZkSync mainnet ### Description The SessionKeyValidator contract fails to function on ZkSync mainnet due to the `TimestampAsserterLocator.locate` function explicitly reverting on chainId `324` (ZkSync mainnet). This breaks all session key functionality for mainnet depl...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
front-running
false
false
## Medium: Malicious owner can arbitrarily change fee to any % value ### Description _Submitted by 0xRajeev_ The Tracer protocol like any other allows market creators to charge fees for trades. However, a malicious/greedy owner can arbitrarily change fee to any % value and without an event to observe this change or a...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: REPEATED EXECUTION MESSAGES ### Description The `ExecuteMsg::MigrateUnbondWaitList` and `ExecuteMsg::UpdateParams` messages are repeated in the `execute` function from **krp-staking-contracts/basset\_sei\_hub** contract. Although this situation doesn't pose a security risk, it's included in the report as part ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
low
signature
true
false
## Low: Using `block.number` instead of `block.timestamp` as an expiration check to execute signature
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
initialization
true
false
## Medium: Trading#initiateMarketOrder allows to open a position with more margin than expected due to _handleOpenFees wrong calculation when a trade is referred ### Description When `initiateMarketOrder` is called, `_marginAfterFees` are calculated and then used to calculate `_positionSize`: The problem is that `_h...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
false
false
## Low: Unauthorized rebalanceTrigger calls may allow one to exploit arbitrage opportunity and put system at risk ### Description ## Handle 0xRajeev ## Vulnerability details ## Impact The need for an externally visible rebalanceTrigger() (when rebalance() does that check itself) is apparently that the whitelisted...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Unnecessary deadline check ### Description There is a `deadline` check at line https://github.com/MetaLex-Tech/LeXscrow/blob/94ca277528bb25b8421dc127941c18915144eb29/src/TokenLexscrow.sol#L338. A `deadline` check is performed inside the `permit` function, so there is no need to do it outside of that function. ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: [26] Constant redefined elsewhere ### Description Consider defining in only one contract so that values cannot become out of sync when only one location is updated. A cheap way to store constants in a single location is to create an internal constant in a library. If the variable is a local cache of another ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: Vesting Rate Can Be Slowed by the Rewarder ### Description **Update** Marked as "Fixed" by the client. Addressed in: `4db61cc26152af219e97811c89224c6407bdc96e`. The client provided the following explanation: > Previous vesting must complete before new rewards can be transferred in **File(s) affected:**`Staki...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: getAllHyperchains Function Reverts Due to Invalid Key Access ### Description Recent changes to the [`getAllHyperchains`](https://github.com/matter-labs/era-contracts/blob/19575710034b16994932a1f055371fccaaaebf6f/l1-contracts/contracts/state-transition/StateTransitionManager.sol#L105) function have introduced a...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
high
integer-overflow
true
false
## High: `VoteKickPolicy._endVote()` might revert forever due to underflow ### Description In `onFlag()`, `targetStakeAtRiskWei[target]` might be less than the total rewards for the flagger/reviewers due to rounding. ```solidity File: contracts\OperatorTokenomics\StreamrConfig.sol 22: /** 23: * Minimum amoun...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
overflow
false
false
## Medium: NFTs that don't have a checkpoint can't be transferred ### Description Submitting as high risk because it breaks a fundamental operation (transferring) for a large number of tokens. ### Proof of Concept uint256 nCheckpoints = numCheckpoints[tokenId]; Checkpoint storage checkpoint = checkpoints[tokenI...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Missing sanity zero-address checks may lead to undesired behavior or lock of funds ### Description Certain logic requires zero-address checks to avoid undesired behavior or lock of funds. For example, in `Splitter.sol#L34` users can permanently lock ETH by mistakenly using `safeTransferETH` with a default/zero...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
front-running
false
false
## Medium: `unauthorize()` can be front-run so that the malicious authorized user would get their authority back ### Description The `Caller` contract enables users to authorize other users to execute tx on their behalf. This option enables the authorized/delegated user to add more users to the authorized users list. ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
overflow
false
false
## Medium: Change Interval Can be Arbitrarily Set by The Fee Controller to Brick The Leveraged Pool ### Description The `changeInterval` dictates how much the `mintingFee` should move in the positive or negative direction. This is dependent on `longTokenPrice * shortTokenPrice`. The fee controller can call `setChangeI...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
true
false
## Low: Use Ownable2Step in PohRegistrationManager ✓ Fixed ### Description In the `PohRegistrationManager` contract, the `Ownable` contract is used for access verification. However, the `Ownable` contract lacks protection for cases when there is a transfer of ownership to an incorrect account or to contracts that are ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
false
false
## Low: Bridge-Token Configuration Verification ### Description ## OrbitERC20OFTAdapter Overview Each `OrbitERC20OFTAdapter` is associated with a specific ERC-20 token (referred to as `innerToken` in the `OFTAdapter`). This token must be correctly managed by the bridge to ensure it is locked, transferred, and release...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
initialization
true
false
## Gas: State variables that never change should be declared `immutable` or `constant` ### Description Avoids a Gsset (**20000 gas**) in the constructor, and replaces the first access in each transaction (Gcoldsload - **2100 gas**) and each access thereafter (Gwarmacces - **100 gas**) with a `PUSH32` (**3 gas**). Wh...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
true
false
## Low: TokenBridge Does Not Follow a 2-Step Approach for Ownership Transfers ✓ Fixed ### Description `TokenBridge` defines a privileged role **Owner**, however, it uses a single-step approach, which immediately transfers the ownership to the new address. If accidentally passed an incorrect address, the current owner ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
false
false
## Low: Undisclosed Functionality Mismatch in L1 and L2 Token Functions Post-Bridging ### Description When bridging tokens from L1 to L2, by default, the [`L2StandardERC20` contract](https://github.com/matter-labs/era-contracts/blob/2e0734b1ff9cbf3a88aadba6a19c4c4bc8645d33/zksync/contracts/bridge/L2StandardERC20.sol) ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
false
false
## Low: Lack of Granular Permission Control in WhitelistComplianceOracle ### Description The [`WhitelistComplianceOracle`](https://bitbucket.org/wisdomtreeam/whitelist-contexts/src/44760785af1696704cdfcc56c2ba4a17ff603fb5/src/oracles/whitelist-compliance/WhitelistComplianceOracle.sol#lines-20:24) contract inherits the...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: Market-specific pause is not checked for sponsor ### Description _Submitted by [cmichel](https://twitter.com/cmichelio)_ The treasury only checks its `globalPause` field but does not check its market-specific `marketPaused` field for `Treasury.sponsor`. A paused market contract can therefore still deposit ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
overflow
false
false
## Low: Unvalidated Input From External Contract ### Description The `getAllocations()` function retrieves external values (`discount`, `refer`) from the Referrals contract on line [63] in `Processor.sol`. These values are subsequently used without safe math and are assumed to be percentages. Since this contract is ex...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
front-running
false
false
## Medium: Missing slippage protection on `sellVotes()` ### Description The `ReputationMarket` contract provides preview functions ([simulateBuy()](https://github.com/sherlock-audit/2024-11-ethos-network-ii/blob/main/ethos/packages/contracts/contracts/ReputationMarket.sol#L761) and [simulateSell()](https://github.com/...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Potential race condition for undelegateFromPool() ### Description After a slashing event, `undelegateFromPool()` will result in more funds than `undelegate()` from a validator. This might result in a race condition to do `undelegateFromPool()`, because that prevents others from doing the same, depending on the...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
dos
false
false
## Medium: Only part of `keccak256()` is used as hash, making it susceptible to collision attacks ### Description _Submitted by 0xA5DF, also found by Lambda and V\_B_ ### Vulnerability Details At 2 places in the code only part of the output of `keccak256()` is used as the hash: * At `TokenDistributor` - `Distribu...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Incorrect gas calculations in several contracts ### Description TON contracts, being a part of an asynchronous blockchain, can process messages in a non-deterministic order. In some cases, the incoming messages require the contract to perform changes in the storage, send new messages, and other gas-consuming t...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
cross-chain
false
false
## Medium: Using stale cToken exchange rate ### Description Throughout the [`CompoundProvider` contract](https://github.com/BarnBridge/BarnBridge-SmartYieldBonds/blob/943df3a8fcd8dd128af3beb0c85a0480c0e95ead/contracts/providers/CompoundProvider.sol#L305), when considering the exchange rate between cTokens and uTokens ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
true
false
## High: Dynamic Field Hash Collision ### Description ## Hash Type and Key Computation In `dynamic_fields.move`, `hash_type_and_key` computes hashes based on an input address and an Object. The hash is created by concatenating three parts: 1. **parent**, `AccountAddress`, which serves as the parent of the object. 2....
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
storage
false
false
## Medium: Shutdown Is Not Irreversible ### Description The Riz protocol is meant for riskier assets and supports a feature whereby a shutdown can be triggered to then slash the positions and redistribute the remaining funds after the bad debt has been socialized. However, even though the shutdown state cannot current...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
cross-chain
true
false
## High: Missing call to computeCollateralOrlvlUSDAmount() in LevelMinting.mintDefault() ### Description The function `Bridge.mintDefault()` directly passes the order struct specified by the user to `_mint()`: ```solidity function mintDefault( Order memory order ) external virtual onlyMinterWhenEnabled { if (msg....
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
oracle
false
false
## Low: Hardcoded Values May Not Hold in a Fluctuating Market ### Description **Update** Marked as "Acknowledged" by the client. The client provided the following explanation: Since Boba_GasPriceOracle (implementation) is a predeploy and is also stored as a constant in the contract ‘Lib_PredeployAddresses’, any update...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Redundant Hardhat Console ### Description **Description:** During the code review, It has been noticed that the contract uses redundant console log. It should be deleted before deployment. **Recommendations:** Consider deleting redundant console output.
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Add Mechanism to Remove Validators ### Description ## Validator Protocol Once a validator joins the pool, its `OwnerCapability` is stored by the Ditto protocol and it is not possible for the validator to leave the protocol or recover its `OwnerCapability`. ## Remediation Consider adding a mechanism for vali...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
other
false
false
## Gas: Constants can be private ### Description Marking constants as `private` save gas upon deployment, as the compiler does not have to create getter functions for these variables. It is worth noting that a `private` variable can still be read using either the verified contract source code or the bytecode. This may...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
cross-chain
false
false
## Low: Lack of maximum fee cap allows excessively high fees ### Description The system integrates with protocols such as 0x, Jupiter, and deBridge for transaction execution. As part of these integrations, a fee amount is set and sent to the protocol addresses via API calls. However, there is no maximum cap enforced o...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
dos
false
false
## Low: Secrets in Configuration File ### Description **Update** The client fixed the issue in commit `4914653776698f470a95ca392f112af603060fba` and provided the following explanation: > The keys used in the configuration file were revoked and we are instead including them in .env and loading them in when hardhat run...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
true
false
## Low: Missing boundary checks on feeBps ### Description There's a missing check when setting `feeBps` from `ERC721SeaDrop.sol` while one exists when the value is used at a later stage in `SeaDrop.sol`, which could cause an `InvalidFeeBps` error. ### Recommendation Consider adding the following checks before setting...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
true
false
## Low: Missing validation for src\_chain\_id and dest\_chain\_id in create\_order ### Description The `create_order` function is responsible for creating a new order for a user to transfer tokens across different blockchains. It checks the deposit amount, verifies that the user has sufficient fees, and sets the detai...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: `MysteryBox::claimMysteryBoxes()` should return custom error when reverting due to `amountToClaim == 0` ### Description **Description:** `MysteryBox::claimMysteryBoxes()` should [return custom error](https://github.com/Earnft/smart-contracts/blob/43d3a8305dd6c7325339ed35d188fe82070ee5c9/contracts/MysteryBox.so...
0