prompt
listlengths
2
2
source
stringclasses
3 values
severity
stringclasses
5 values
category
stringclasses
186 values
has_code
bool
2 classes
has_poc
bool
2 classes
reference_response
stringlengths
23
5k
firm
stringclasses
26 values
quality_score
float64
0
5
protocol
stringclasses
398 values
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Potentially Inefficient Search On getReceiverIndex() ### Description The code on lines [336-338] uses a basic loop to find the index in the array that contains an address. The gas cost of the query increases proportionally with the number of requests. The case of significant gas cost may arise deliberately or ma...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
other
false
false
## Gas: [08] Usage of `uints/ints` smaller than 32 bytes (256 bits) incurs overhead ### Description ### Proof of concept *There are 17 instances of this issue.* ### Mitigation When using elements that are smaller than 32 bytes, your contract's gas usage may be higher. This is because the EVM operates on 32 bytes ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Two deposits/redeems from the user will overwrite the userDepositRecord /userRedeemRecord ### Description Two deposits/redeem requests from the same user will overwrite the state variables, which can be quite dangerous for the off-chain infrastructure. ### Recommendation Consider using an array that stores th...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
oracle
true
true
## Medium: Due to slot confusion, reserve amounts in the pump will be corrupted, resulting in wrong oracle values ### Description The MultiFlowPump contract stores reserve counts on every update, using the libraries LibBytes16 and LibLastReserveBytes. Those libs pack `bytes16` values efficiently with the `storeBytes16...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
false
false
## Low: Mint and Burn events cannot be trusted ### Description Events associated with mint and burn calls can be produced even if these functions are not called. The ERC20CRV contract uses special Transfer events to signal the call to mint: ```python @public def mint(_to: address, _value: uint256): """ @dev Mint ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
true
false
## Medium: Rewards delay release could cause yields steal and loss ### Description In the current rewards accounting, vault shares in `deposit()` and `redeem()` can not correctly record the spot yields generated by the staked asset. Yields are released over the next rewards cycle. As a result, malicious users can stea...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
true
false
## Low: `Silo_Module::silo_execute` will revert as approval is to the wrong contract ### Description **Description:** D2 integrates with the lending protocol [Silo](https://www.silo.finance/) via the [`Silo_Module`](https://github.com/d2sd2s/d2-contracts/blob/c2fc257605ebc725525028a5c17f30c74202010b/contracts/modules/...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Inconsistent Use of msg.sender and _msgSender() ### Description A contract may use the `_msgSender()` function in certain cases where it allows meta transactions by overriding the method to extract the original message sender. Consistent use of `_msgSender()/msg.sender` within a contract is important to avoid ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
other
false
false
## Gas: `slurp` SLOAD Gas Optimization ### Description **Severity**: *Gas Optimization* **Likelihood**: *High* **Status**: {Not Submitted} **Scope**: [`slurp()`](https://github.com/code-423n4/2022-02-tribe-turbo/blob/main/src/TurboSafe.sol#L255-L290) There are two *sloads* of `getTotalFeiBoostedForVault[vault]` that ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
token
false
false
## Medium: ReserveStabilizer performs unsafe token transfer ### Description The [`exchangeFei` function of the `ReserveStabilizer`](https://github.com/fei-protocol/fei-protocol-core-internal/blob/f54d7bb07c55adb78e2e142e7044f60090bb7602/contracts/stabilizer/ReserveStabilizer.sol#L43) contract burns a user’s FEI and in...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
token
true
false
## Medium: YearnTokenAdapter's wrap can become stuck as it uses one step approval for an arbitrary underlying ### Description _Submitted by hyh_ Some tokens do not allow for approval of positive amount when allowance is positive already (to handle approval race condition, most known example is USDT). This can cause ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
true
false
## High: Sense PTs can never be redeemed ### Description Sense PTs can never be redeemed ### Impact _Permanent freezing of funds_ Users will be able to lend and mint using Sense, but when it's time for Illuminate to redeem the Sense PTs, the call will always revert, meaning the associated underlying will be locked i...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
false
false
## Low: API - CACHEABLE HTTPS RESPONSE ### Description The API service is currently returning cacheable HTTPS responses on certain endpoints. This behavior is risky because sensitive information sent over HTTPS can be cached on the client side, potentially exposing it to unauthorized users who have access to the clien...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: `aesni` has been merged into the `aes` crate ### Description **Severity**: Informational **Status**: Acknowledged **File**: Cargo.lock **Details**: Please use the aes crate going forward. The new repository location is at: https://github.com/RustCrypto/block-ciphers/tree/master/aes AES-NI is now autodetect...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: [4] Solidity compiler versions mismatch ### Description The project is compiled with different versions of Solidity, which is not recommended because it can lead to undefined behaviors.
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Savings: Reduce `SLOAD` Usage ### Description **Update** Marked as "Acknowledged" by the client. The client provided the following explanation: > Acknowledged. We don't want to change code too much at this stage, in order to make sure we don't invalidate another audits. **File(s) affected:**`TokenVestingLine...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
oracle
false
false
## Low: Lack of prioritization of Peggo orchestrator messages ### Description Peggo orchestrator messages, like oracle messages (TOB-UMEE-20), are not prioritized over other transactions for inclusion in a block. As a result, if the network is highly congested, orchestrator transactions may not be included in the earl...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
oracle
false
false
## Low: Refactoring Price Oracle ### Description ## Price Oracle Update The existing price oracle utilizes `latestAnswer` to fetch the price from Chainlink. However, according to the latest documentation, `latestAnswer` is deprecated, and using `latestRoundData` is recommended instead. Furthermore, the current pric...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
low
access-control
true
false
## Low: More efficient and simpler implementation of `BabelVault::setReceiverIsActive` ### Description `BabelVault::setReceiverIsActive` doesn't need to cache `idToReceiver[id]` into memory since it only reads the `account` field so there is no reason to read every field from storage. Also it only updates the `isActi...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
high
logic-error
true
true
## High: Vault rewards incorrectly scaled by cross-asset-class operator totals instead of asset class specific shares causing rewards leakage ### Description The current vault reward distribution logic causes systematic under-distribution of rewards to vault stakers. The issue stems from using cross-asset-class operat...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Implement Case Insensitive Regex ### Description ## Image URL Detection in fetchNftUri The extension is using a regex in order to detect an image URL inside `fetchNftUri`. This regular expression is checking if the URI string ends with a file extension of `.jpeg`, `.jpg`, `.gif`, or `.png` and is case-sensiti...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
other
true
false
## Gas: Errors ### Description ### Reduce the size of error messages (Long revert Strings) Shortening revert strings to fit in 32 bytes will decrease deployment time gas and will decrease runtime gas when the revert condition is met. Revert strings that are longer than 32 bytes require at least one additional mstore...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Reduce without stake ID might revert in case not the first stake was reduced with ID. ### Description **Description** TokensFarmSDK.sol, Perpetual Tokens FarmSDK.sol: function notice Reduced StakeWithout StakeId(). In case the user has more than one stake and withdraws any stake but the first one, lastStakeCo...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: An unintentionally large vesting period ### Description The `VestingEscrowSimple` contract can be initialized with an unintentionally large vesting period, i.e., by supplying a value denoted in milliseconds instead of seconds https://github.com/banteg/yearn-vesting-escrow/blob/945b5ca09d8bb2d2ad9132df7368cb499...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
false
false
## High: AuctionEschapeHatch.sol#exitEarly updates state of the auction wrongly ### Description _Submitted by 0x0x0x_ `AuctionEschapeHatch.sol#exitEarly` takes as input `amount` to represent how much of the When the user exits an auction with profit, to apply the profit penalty less `maltQuantity` is liquidated comp...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Package Naming Inconsistencies in Regulation Module ### Description The regulation module's keeper package has inconsistencies between the package declaration and the import statements. This suggests that the code may have been copied from a different project (ScallopBank) without proper adaptation to the EMon...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
other
true
false
## Gas: `<array>.length` should not be looked up in every loop of a `for`-loop ### Description Even memory arrays incur the overhead of bit tests and bit shifts to calculate the array length 1. File: src/AxelarGatewayMultisig.sol (line [118](https://github.com/code-423n4/2022-04-axelar/blob/f1c8bfc16f82a27797f61cb3a...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
false
false
## Low: Meaningless override ### Description **Description** CryptoBearWatchClub.sol, safeTransferFrom(address,address,uint256) Function has the same code as the parent ERC721 contract, thus its override is meaningless. It is enough to override the safeTransferFrom(address,address,uint256,bytes). **Recommendation**:...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Unnecessary Quote Addition ### Description ## Counter Quote Vulnerability `counter_quote` allows the addition of the same quote multiple times without proper validation. The `counter_quotes` vector of the ride may end up containing redundant or duplicate counter quotes for the same driver. This redundant data...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
false
false
## Low: Lack of input validation ### Description * The [`approve` function](https://github.com/compound-finance/compound-protocol-alpha/blob/6858417c91921208c0b3ff342b11065c09665b1b/contracts/Governance/Comp.sol#L80) of the `Comp` contract does not ensure that the `spender` address is not zero. See [OpenZeppelin’s imp...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
solodit_api
medium
Royalty
true
false
Source: https://github.com/sherlock-audit/2022-10-nftport-judging/issues/83 ## Found by ElKu, rvierdiiev, obront, pashov, ctf\_sec, joestakey, ak1, JohnnyTime, GimelSec, Dravee, JohnSmith, cccz ## Summary In past audits, we have seen contract admins claim that invalidated configuration setters are fine since “admi...
Sherlock
4
NFTPort
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: [07] Nouns fork may not efficiently remedy a bad situation ### Description The `20%` threshold, as [documented in the FAQs](https://mirror.xyz/0x10072dfc23771101dC042fD0014f263316a6E400/iN0FKOn_oYVBzlJkwPwK2mhzaeL8K2-W80u82F7fHj8) for instance, `800 * 0.2 = 160` of Nouns tokens, is not a small number comparati...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
storage
true
false
## Low: Lack of contract existence check on call ### Description The factories and the registry client all have a `multiexcall` function, which is designed to create batched calls to various target addresses. To do this, it uses the `call` opcode to execute arbitrary calldata. If the target address is set to an incorr...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Strategy `PDA` Cannot Be Closed, Resulting in Locked Rent ### Description **Update** Marked as "Acknowledged" by the client. **File(s) affected:**`programs/ntbundle/src/instructions/remove_strategy.rs` **Description:** The `remove_strategy` instruction fails to close the `strategy_account` PDA after disablin...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
overflow
true
false
## High: PoolTemplate.sol#resume() Wrong implementation of resume() will compensate overmuch redeem amount from index pools ### Description ## Handle WatchPug ## Vulnerability details ## Root Cause Wrong arithmetic. --- https://github.com/code-423n4/2022-01-insure/blob/19d1a7819fe7ce795e6d4814e7ddf8b8e1323df3/c...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
initialization
true
false
## Medium: A claim cannot be paid out or escalated if the protocol agent changes after the claim has been initialized ### Description The `escalate` and `payoutClaim` functions can be called only by the protocol agent that started the claim. Therefore, if the protocol agent role is reassigned after a claim is started,...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Incorrect Event Emission ### Description Within the `LockerList` contract, if an attempt is made to [add](https://github.com/radiant-capital/v2-core/blob/e8f21f103e17736907b62809d1ad902febc53714/contracts/radiant/libraries/LockerList.sol#L44-L48) a `locker` address that already exists to the [`userlist`](https...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
front-running
false
false
## Low: tx.gasprice should not be used to check for frontrunning ### Description ## Understanding tx.gasprice and Frontrunning The `tx.gasprice` is used to determine whether a transaction is being frontrunned. If the transaction gas price is above 1 ETH or an arbitrary value set by the admin, then the transaction wil...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
reentrancy
true
false
## Low: [06] Ineffective check in the `releaseNFT` function ### Description ### Lines of code https://github.com/code-423n4/2024-02-althea-liquid-infrastructure/blob/bd6ee47162368e1999a0a5b8b17b701347cf9a7d/liquid-infrastructure/contracts/LiquidInfrastructureERC20.sol#L431 ### Impact This check is redundant and doe...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: SRP. Method `mint` of Smart contract CryptoBearWatchClub has misleading name as it used for running auction sale and not just mint. ### Description **Recommendation**: Split mint by Smart contract owner functionality and auction sale to two diffrent methods.
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
initialization
false
false
## High: Battle fishing attack ### Description The `Arena` smart contract contains a public [`createBattle`](https://github.com/DivergenceProtocol/diver-contracts/blob/e5286f94a7ccb9d6279fae51ea66a8833672628a/src/core/Arena.sol#L67) function that creates a new battle without initializing. This function is used in the ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Eclipse Mitigations ### Description One of the main attacks against any discovery protocol is an eclipse. An attacker generates a large and occasionally specific set of node-ids in order to populate the first 10 or so buckets of a node's routing table with malicious entries. Once achieved, the attacker can for...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
false
false
## Low: Contracts Set in the Protocol Can Implement Different Logic ### Description Throughout the codebase, there are several access\-controlled actions that allow the respective roles to set/link the different modules between each other relying only (in [some cases](https://github.com/radiant-capital/riz/blob/65ca7b...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: REWARDS PERIOD SHOULD BE GREATER THAN ZERO ### Description In the function `update_rewards_batch_speed`, there is a possibility that the calculated rewards batch period `dt` could be zero. This may lead to unexpected behavior, such as the rewards batch being stuck in the current state and preventing further re...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
true
false
## Medium: Parameter updates not propagated ### Description _Submitted by gpersoon, also found by cmichel_ There are several functions to update parameters. However these parameters are only updated on the top level and not propagated to the other contracts. This could lead to various unpredictable results. Examples ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: Unchecked stake ownership in ticket casting ### Description ## getLotTicketByStaking Instruction Vulnerability The `getLotTicketByStaking` instruction allows the owner of a legacy Frakt stake account to obtain raffle tickets. However, it does not verify that the stake account is actually owned by the invok...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
low
timing
true
false
## Low: Inconsistent deadline check in `V3DexSwap.swap ` ### Description The swap() function in V3DexSwap implements the require check in the snippet below which ensures block.timestamp is strictly less than the `_deadline`. ```solidity require(_deadline > block.timestamp, DeadlineInThePast()); ``` However, the [Ram...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
initialization
true
true
## Medium: Incorrect rounding in `mint()` ### Description In the `HyperEvmVault` contract, the `mint()` function calculates the number of assets by rounding down: ```solidity function mint(uint256 shares, address receiver) public override(ERC4626Upgradeable, IERC4626) nonReentrant returns (uint256 assets) { V1Sto...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Comparing LP Minting Strategy Between StablePool and StablePool2 ### Description **Contract StablePool** and **StablePool2** are two pool implementations that use different minting strategies. Both are inspired by Solidly Exchange’s pool implementation. During LP minting, the contract StablePool computes a ne...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
true
false
## Low: FundraisingMultisigTemplate - DAI/ANT token address cannot be zero ✓ Fixed ### Description The fundraising template is configured with the `DAI` and `ANT` token address upon deployment and checks if the provided addresses are valid. The check performed is `_ensureTokenIsContractOrETH()` which allows the `addre...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
reentrancy
true
false
## Low: Potential reentrancy behavior when harvesting ### Description The `_harvest()` function of the `StrategyAerodromeGaugeGreen` contract makes several external calls for compounding earnings and charging performance fees before updating state. Although all external calls are made to trusted contracts, the sequenc...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
oracle
true
false
## Medium: Chainlink’s latestRoundData might return stale or incorrect results ### Description ## Handle nikitastupin ## Vulnerability details ## Proof of Concept https://github.com/code-423n4/2021-10-mochi/blob/8458209a52565875d8b2cefcb611c477cefb9253/projects/mochi-cssr/contracts/adapter/ChainlinkAdapter.sol#L4...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
access-control
false
false
## Medium: The Modifier `onlyAcceptedContracts()` Can Be Bypassed After an Update of the Mapping of `AddressResolver` ### Description **Update** Marked as "Acknowledged" by the client. The client provided the following explanation: > _We use a multi-sig wallet as all contract's owners. In addition, this access contro...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
liquidation
true
false
## Gas: Redundant _depositor function argument in _updateDepositAndSnapshots ### Description The current implementation of `_updateDepositAndSnapshots` includes the `address _depositor` argument, which is set as `msg.sender` in all call sites. This approach introduces unnecessary complexity as `msg.sender` can be acce...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
true
false
## Low: Spendpermission can be create by account that have 0 tokens to spend ### Description The owner of a spend permission can create spend permissions even if they have a 0 token balance, effectively preventing the spender from using the permission. The owner can either maintain a 0 token balance or transfer tokens...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
false
false
## Low: SafeERC20 imported but unused ### Description SafeERC20 is imported but the conventional `.transfer()` and `.transferFrom()` methods are used instead of the `safeTransfer()` and `safeTransferFrom()` counterparts. ### Recommendation ```diff - IERC20(tokenContract).transfer(counterparty, amount); + IERC20(token...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
true
false
## Medium: PROPOSAL LACKS MULTIPLE IMPORTANT LOGIC CHECKS ### Description In `Governance.sol` contracts, the `propose` function lacks the multiple logical checks listed below. * Missing to check if the length of the provided `targets` is equal to `values,` `data` length or not. Thus allowing the incorrect submission ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: Initialization front-running ### Description It is possible to front-run initialization of the Claiming contract. https://github.com/FantiumAG/smart-contracts/blob/a2d126453c1105028f12277b8f342d2cdbf01a77/contracts/claiming/FantiumClaimingV1.sol#L135-L150 ### Recommendation We recommend checking that the Clai...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Potential Path Traversal ### Description ## Vulnerability in generateImage Function The `generateImage` function's `baseImageFilePath` is attacker-controlled and may contain path traversal payloads or paths with `../`. This vulnerability allows the attacker to determine if a file exists on the server file sys...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
dos
false
false
## Low: Failure of a single broadcast Ethereum transaction causes a batch-wide failure ### Description The Peggo orchestrator broadcasts Ethereum events as Cosmos messages and sends them in batches of 10 (at least by default). According to a code comment (figure 32.1), if the execution of a single message fails on the...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
false
false
## High: Covering impermanent loss allows profiting off asymmetric liquidity provision at expense of reserve holdings ### Description _Submitted by hyh_ #### Impact Pool funds will be siphoned out over time as swaps and asymmetric LP provision are balancing each other economically, while with introduction of IL reim...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
storage
true
false
## Low: Storage collision risk in UUPS upgradeable `StakingProxy` due to missing storage gap ### Description **Description:** `StakingProxy` contract inherits from `UUPSUpgradeable` and `OwnableUpgradeable` but does not implement storage gaps to protect against storage collisions during upgrades. `StakingProxy` is in...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
false
false
## Low: Follow the one style for error messages in the contracts. ### Description **Recommendation**: Consider changing the error message in ERC20 contract related to exceeding the cap as follow: require(totalSupply().add(amount) <= cap(), "ERC20: only 100 million MIMIR Exist"); **Re-audit**: Not valid since require ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: Unsafe ABI Encoding ### Description It is not uncommon to use `abi.encodeWithSignature` or `abi.encodeWithSelector` to generate calldata for a low\-level call. However, the first option is not typo\-safe and the second option is not type\-safe. As such, both of these methods are error\-prone and ought to be co...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
signature
false
false
## Low: Paymaster has no internal replay protection mechanisms ### Description The Paymaster contract validates that a signature indeed resolves to the `verifyingSigner` state variable. However, it does not internally track for any replay protection. It is thus dependent on its associated `entryPoint` contract to appr...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
initialization
true
false
## High: Destruction of the `SmartAccount` implementation ### Description [contracts/smart-contract-wallet/SmartAccount.sol#L166](https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L166) [contracts/smart-contract-w...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: Arbitrary User Activation and Referral Reward Capture. ### Description **Severity**: Low **Status**: Acknowldeged **description** bpnmMain.sol: activate(). The `activate()` function in the contract allows for a new user registration without strict validation of its origin. This raises the potential issue th...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Variable Shadowing Issue in `getPools` Function ### Description **Severity**: Informational **Status**: Acknowledged **Location**: XYKPoolFactory.sol/StableSwapPoolFactory.sol **Description** The return variable pools in the getPools function shadows the state variable pools, which can lead to confusion an...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
true
false
## Medium: Escrow record not cleared on cancellation and order fill ### Description In `DirectBuyIssuer.sol`, a market buy requires the operator to take the payment token as escrow prior to filling the order. Checks are in place so that the math works out in terms of how much escrow has been taken vs the order's remai...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
low
access-control
true
false
## Low: Hooklet validation is recommended upon deploying new Bunni tokens ### Description Uniswap V4 performs some validation on the hook address to ensure that a valid contract has been provided: ```solidity function initialize(PoolKey memory key, uint160 sqrtPriceX96) external noDelegateCall returns (int24 tick) { ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
token
false
false
## High: Wrong Parameters Used to Check the Evidences of L1 -> L2 Transfers ### Description **Update** The team updated both parameters and created a dedicated set of tests to make sure that the function returns the correct result in the current supported chains (commit `4dece677b2c843390d5b8cc76a4a0ce10e909cef`). **...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
dos
true
false
## Low: RocketDepositPool - Potential gasDoS in assignDeposits  Acknowledged ### Description `assignDeposits` seems to be a gas heavy function, with many external calls in general, and few of them are inside the for loop itself. By default, `rocketDAOProtocolSettingsDeposit.getMaximumDepositAssignments()` returns `2`,...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
signature
true
false
## Medium: `Nonce` reset vulnerability on Owner change ### Description The nonce, which is tied to the `accountOwner`, is reset to zero when the owner is changed using the `AccountModule::notifyAccountTransfer` function. This resetting allows for the potential replay of previously processed signed messages, posing a s...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
access-control
false
false
## High: Excessive minting `aETH` permissions for strategies ### Description The issue is identified in the `CorePrimary.strategyMinting` function. Currently, the function, which can only be invoked by a `strategy`, permits the minting of an unrestricted amounts of `AETH` to the arbitrary address. It presents a signif...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
true
false
## Low: math.NewU256FromBigInt succeeds with negative integers ### Description Like oversized integers (> 256 bits), negative integers ought to be rejected by `math.NewU256FromBigInt(b)` as neither can be expressed in the U256 type: ```go package main import ( "github.com/berachain/beacon-kit/mod/primitives/pkg/mat...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
oracle
true
false
## Medium: Trades in blocks where the bid or ask drops to zero will be priced using the previous block's price ### Description The oracle prices used for traces allow multiple oracles and their last prices to be provided. The oldest block's price becomes the primary price, and the newer price becomes the secondary pri...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
storage
false
false
## Medium: Incorrect __gap Variable Decrement in VaultStorage ### Description In the audited version of the contract, 4 slots were added to the storage of the `VaultStorage` contract: * `dripper`, which [occupies](https://github.com/OriginProtocol/origin-dollar/blob/eca6ffa74d9d0c5fb467551a30912cb722fab9c2/contracts...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Consider expanding invariant testing to handle expected errors. ### Description The current bounding in the invariant handlers force call parameters into expected successful paths. While this can make shallower invariant runs find numerical regressions more successfully, consider an invariant process that allo...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Solidity compiler optimizations can be dangerous ### Description The compilation of the TokenCard smart contracts has optional Solidity compiler optimizations enabled. There have been several bugs with security implications related to optimizations. Moreover, optimizations are actively being developed. Solidit...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
solodit_api
medium
Two-Step Pattern
false
true
## Handle defsec ## Vulnerability details ## Impact The current ownership transfer process involves the current owner calling Swap.transferOwnership(). This function checks the new owner is not the zero address and proceeds to write the new owner's address into the owner's state variable. If the nominated EOA acco...
Code4rena
3
Boot Finance
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Transient Stake Account Only Moves In One Direction ### Description ## Transient Stake Account Overview A transient stake account represents stake that is either activating or deactivating. The `IncreaseValidatorStake` and `DecreaseValidatorStake` instructions ensure that only one transient stake account is a...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
true
false
## Medium: If WithdrawAddrEnabled = false, execute_claim() will fail ### Description Currently, contracts that execute `execute_claim()` set `DistributionMsg::SetWithdrawAddress` first. If `WithdrawAddrEnabled = false`, the execution will not succeed and the `claim` will not be executed. ### Impact can't claim rewar...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Missing `redeem` convenience function in the `StakingVault.sol` ### Description **Description:** `StakingVault.sol` implements a number of convenience functions: `stake(uint256 assets)` ,`unstake(uint256 assets)` and `mint(uint256 shares)`: But it does not have a convenience function for `redeem`, consider...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: Iteration through all locks, including expired locks. ### Description **Description** Expo.sol: functions transfer(), send(), burn(), transferWithLock(). Functions iterate through all user's locks to verify that he doesn't transfer more than locked until some period of time. Iteration is performed through ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
dos
false
false
## Medium: `UniswapV2/SushiwapLPAdapter` update the wrong token ### Description _Submitted by cmichel_ The `UniswapV2LPAdapter/SushiswapV2LPAdapter.update` function retrieves the `underlying` from the LP token pair (`_asset`) but then calls `router.update(_asset, _proof)` which is the LP token itself again. This will...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
access-control
true
false
## High: `Vault#setController()` owner of the Vault contracts can drain funds from the Vault ### Description _Submitted by WatchPug_ The owner of the Vault contract can set an arbitrary address as the `controller`. A malicious `controller` contract can transfer funds from the Vault to the attacker. #### Proof of ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
reentrancy
true
false
## Medium: Token depreciation due to ETH donating ### Description The `TokenFactory.pauseAndWithdrawToPurple` function pauses a token and donates its ETH to Purple DAO when not reach the price target within a certain period of time. So all token holders lose the possibility to sell tokens back. It means decreasing the...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
rounding
true
false
## Medium: Users can manipulate the observation creation ### Description Users can alter the record of their balances. ### Proof of Concept If the users `delegateBalance` has changed, observations will be recorded. If there is a need for a new observation, the new observation will be created; otherwise, it will be o...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
oracle
true
false
## Gas: State variables only set in the constructor should be declared `immutable` ### Description Avoids a Gsset (20000 gas) 1. File: contracts/ManagedIndex.sol (line [17](https://github.com/code-423n4/2022-04-phuture/blob/594459d0865fb6603ba388b53f3f01648f5bb6fb/contracts/ManagedIndex.sol#L17)) 2. File: contrac...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
initialization
false
false
## Medium: Not all calls forward msg.value ### Description Most functions of the codebase are payable. When these functions perform an inner call, the `msg.value` is not always forwarded: - `Nexus.executeUserOp` does not forward it in `target.call(data)`. - `Nexus.fallback` handler. - `BiconomyMetaFactory.deployWithFa...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: Division by Zero in `_getNextClaimableAmount` Function ### Description **Severity**: Medium **Status**: Resolved **Description**: The `VestingSchedule` contract, particularly in its `_getNextClaimableAmount` function, is vulnerable to a division by zero error. This issue occurs when `groupVestingDuration...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
true
false
## Low: Unecessary Parent Contracts ✓ Fixed ### Description Contract `BlacklistableV1` and `RescuableV1` extends `ContextUpgradeable` and `ERC20Upgradeable,` which are not used in any of contract functions and are already inherited by the child contract `FiatTokenV1`. ### Recommendation Remove the unnecessary parent ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Inaccurate Storage Size Calculation ### Description ## Potential Inaccuracy in Storage Size Calculation in `PreparedFill::compute_size` In `PreparedFill::compute_size`, there is a potential inaccuracy in storage size calculation. The code assumes eight bytes of storage for one of the `u8` fields. This is inco...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Incorrect value emitted in Bonded event may affect offchain tracking ### Description `ExManager.bond()` emits a Bonded event to capture the amount of exLST shares escrowed for operator bonded capital. This event uses the shares value instead of `opBond`. However, shares minted may be in excess of `opBond`, in ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
low
integer-overflow
true
true
## Low: Unchecked queue withdrawal timestamp logic is implemented incorrectly ### Description Unchecked math is used within `BunniHubLogic::queueWithdraw` to wrap around if the sum of the block timestamp with `WITHDRAW_DELAY` exceeds the maximum `uint56`: ```solidity // update queued withdrawal // use uncheck...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
liquidation
true
true
## High: Valid redemption proposals can be disputed by decreasing collateral ### Description ### Impact When a user creates a redemption proposal with the `proposeRedemption` function the user has to provide a list of the short records (SRs) with the lowest collateral ratios (CR) in the system ascending. To prevent ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
initialization
true
false
## Medium: Permissionless OffRampState initialization under official program ID enables spoofed “official” instances ### Description **Description:** The `initialize` instruction lets any signer create a new `OffRampState` and become its `admin`. The global `OffRampCounter` is `init_if_needed` and unguarded, and the n...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
overflow
false
false
## High: Steal Rewards and Take over Network by Faking A... ### Description Report type: Blockchain/DLT Target: https://github.com/shardeum/shardus-core/tree/dev Impacts: * Direct loss of funds ## Description ## Impact 1. Steal other nodes' rewards 2. Create many nodes without staking any actual stake, thus tak...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Execution mode restriction in `LogicalOrWrapperEnforcer` can be removed ### Description **Description:** The `LogicalOrWrapperEnforcer` contract currently includes the `onlyDefaultExecutionMode` modifier on all of its hook functions. This creates an unnecessary restriction since the individual enforcers being ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Adding custom revert errors in AdaptiveFeeCalculator would maintain convention ### Description Throughout most of the HMX codebase, custom revert errors are used instead of `require()` statements. On the other hand, the new AdaptiveFeeCalculator is using two `require()` statements in the `pow()` function. ###...
0