prompt listlengths 2 2 | source stringclasses 3
values | severity stringclasses 5
values | category stringclasses 186
values | has_code bool 2
classes | has_poc bool 2
classes | reference_response stringlengths 23 5k | firm stringclasses 26
values | quality_score float64 0 5 | protocol stringclasses 398
values |
|---|---|---|---|---|---|---|---|---|---|
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Potentially Inefficient Search On getReceiverIndex()
### Description
The code on lines [336-338] uses a basic loop to find the index in the array that contains an address. The gas cost of the query increases proportionally with the number of requests. The case of significant gas cost may arise deliberately or ma... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | other | false | false | ## Gas: [08] Usage of `uints/ints` smaller than 32 bytes (256 bits) incurs overhead
### Description
### Proof of concept
*There are 17 instances of this issue.*
### Mitigation
When using elements that are smaller than 32 bytes, your contract's gas usage may be higher. This is because the EVM operates on 32 bytes ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Two deposits/redeems from the user will overwrite the userDepositRecord /userRedeemRecord
### Description
Two deposits/redeem requests from the same user will overwrite the state variables, which can be quite dangerous for the off-chain infrastructure.
### Recommendation
Consider using an array that stores th... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | oracle | true | true | ## Medium: Due to slot confusion, reserve amounts in the pump will be corrupted, resulting in wrong oracle values
### Description
The MultiFlowPump contract stores reserve counts on every update, using the libraries LibBytes16 and LibLastReserveBytes. Those libs pack `bytes16` values efficiently with the `storeBytes16... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | false | false | ## Low: Mint and Burn events cannot be trusted
### Description
Events associated with mint and burn calls can be produced even if these functions are not called. The ERC20CRV contract uses special Transfer events to signal the call to mint:
```python
@public
def mint(_to: address, _value: uint256):
"""
@dev Mint ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: Rewards delay release could cause yields steal and loss
### Description
In the current rewards accounting, vault shares in `deposit()` and `redeem()` can not correctly record the spot yields generated by the staked asset. Yields are released over the next rewards cycle. As a result, malicious users can stea... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | true | false | ## Low: `Silo_Module::silo_execute` will revert as approval is to the wrong contract
### Description
**Description:** D2 integrates with the lending protocol [Silo](https://www.silo.finance/) via the [`Silo_Module`](https://github.com/d2sd2s/d2-contracts/blob/c2fc257605ebc725525028a5c17f30c74202010b/contracts/modules/... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Inconsistent Use of msg.sender and _msgSender()
### Description
A contract may use the `_msgSender()` function in certain cases where it allows meta transactions by overriding the method to extract the original message sender. Consistent use of `_msgSender()/msg.sender` within a contract is important to avoid ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | other | false | false | ## Gas: `slurp` SLOAD Gas Optimization
### Description
**Severity**: *Gas Optimization*
**Likelihood**: *High*
**Status**: {Not Submitted}
**Scope**: [`slurp()`](https://github.com/code-423n4/2022-02-tribe-turbo/blob/main/src/TurboSafe.sol#L255-L290)
There are two *sloads* of `getTotalFeiBoostedForVault[vault]` that ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | token | false | false | ## Medium: ReserveStabilizer performs unsafe token transfer
### Description
The [`exchangeFei` function of the `ReserveStabilizer`](https://github.com/fei-protocol/fei-protocol-core-internal/blob/f54d7bb07c55adb78e2e142e7044f60090bb7602/contracts/stabilizer/ReserveStabilizer.sol#L43) contract burns a user’s FEI and in... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | token | true | false | ## Medium: YearnTokenAdapter's wrap can become stuck as it uses one step approval for an arbitrary underlying
### Description
_Submitted by hyh_
Some tokens do not allow for approval of positive amount when allowance is positive already (to handle approval race condition, most known example is USDT).
This can cause ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | other | true | false | ## High: Sense PTs can never be redeemed
### Description
Sense PTs can never be redeemed
### Impact
_Permanent freezing of funds_
Users will be able to lend and mint using Sense, but when it's time for Illuminate to redeem the Sense PTs, the call will always revert, meaning the associated underlying will be locked i... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | false | false | ## Low: API - CACHEABLE HTTPS RESPONSE
### Description
The API service is currently returning cacheable HTTPS responses on certain endpoints. This behavior is risky because sensitive information sent over HTTPS can be cached on the client side, potentially exposing it to unauthorized users who have access to the clien... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: `aesni` has been merged into the `aes` crate
### Description
**Severity**: Informational
**Status**: Acknowledged
**File**: Cargo.lock
**Details**:
Please use the aes crate going forward. The new repository location is at:
https://github.com/RustCrypto/block-ciphers/tree/master/aes
AES-NI is now autodetect... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: [4] Solidity compiler versions mismatch
### Description
The project is compiled with different versions of Solidity, which is not recommended because it can lead to undefined behaviors. | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Savings: Reduce `SLOAD` Usage
### Description
**Update**
Marked as "Acknowledged" by the client. The client provided the following explanation:
> Acknowledged. We don't want to change code too much at this stage, in order to make sure we don't invalidate another audits.
**File(s) affected:**`TokenVestingLine... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | oracle | false | false | ## Low: Lack of prioritization of Peggo orchestrator messages
### Description
Peggo orchestrator messages, like oracle messages (TOB-UMEE-20), are not prioritized over other transactions for inclusion in a block. As a result, if the network is highly congested, orchestrator transactions may not be included in the earl... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | oracle | false | false | ## Low: Refactoring Price Oracle
### Description
## Price Oracle Update
The existing price oracle utilizes `latestAnswer` to fetch the price from Chainlink. However, according to the latest documentation, `latestAnswer` is deprecated, and using `latestRoundData` is recommended instead.
Furthermore, the current pric... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | cyfrin_structured | low | access-control | true | false | ## Low: More efficient and simpler implementation of `BabelVault::setReceiverIsActive`
### Description
`BabelVault::setReceiverIsActive` doesn't need to cache `idToReceiver[id]` into memory since it only reads the `account` field so there is no reason to read every field from storage.
Also it only updates the `isActi... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | cyfrin_structured | high | logic-error | true | true | ## High: Vault rewards incorrectly scaled by cross-asset-class operator totals instead of asset class specific shares causing rewards leakage
### Description
The current vault reward distribution logic causes systematic under-distribution of rewards to vault stakers. The issue stems from using cross-asset-class operat... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Implement Case Insensitive Regex
### Description
## Image URL Detection in fetchNftUri
The extension is using a regex in order to detect an image URL inside `fetchNftUri`. This regular expression is checking if the URI string ends with a file extension of `.jpeg`, `.jpg`, `.gif`, or `.png` and is case-sensiti... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | other | true | false | ## Gas: Errors
### Description
### Reduce the size of error messages (Long revert Strings)
Shortening revert strings to fit in 32 bytes will decrease deployment time gas and will decrease runtime gas when the revert condition is met.
Revert strings that are longer than 32 bytes require at least one additional mstore... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Reduce without stake ID might revert in case not the first stake was reduced with ID.
### Description
**Description**
TokensFarmSDK.sol, Perpetual Tokens FarmSDK.sol: function notice Reduced StakeWithout StakeId().
In case the user has more than one stake and withdraws any stake but the first one, lastStakeCo... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: An unintentionally large vesting period
### Description
The `VestingEscrowSimple` contract can be initialized with an unintentionally large vesting period, i.e., by supplying a value denoted in milliseconds instead of seconds https://github.com/banteg/yearn-vesting-escrow/blob/945b5ca09d8bb2d2ad9132df7368cb499... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | other | false | false | ## High: AuctionEschapeHatch.sol#exitEarly updates state of the auction wrongly
### Description
_Submitted by 0x0x0x_
`AuctionEschapeHatch.sol#exitEarly` takes as input `amount` to represent how much of the
When the user exits an auction with profit, to apply the profit penalty less `maltQuantity` is liquidated comp... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Package Naming Inconsistencies in Regulation Module
### Description
The regulation module's keeper package has inconsistencies between the package declaration and the import statements. This suggests that the code may have been copied from a different project (ScallopBank) without proper adaptation to the EMon... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | other | true | false | ## Gas: `<array>.length` should not be looked up in every loop of a `for`-loop
### Description
Even memory arrays incur the overhead of bit tests and bit shifts to calculate the array length
1. File: src/AxelarGatewayMultisig.sol (line [118](https://github.com/code-423n4/2022-04-axelar/blob/f1c8bfc16f82a27797f61cb3a... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | false | false | ## Low: Meaningless override
### Description
**Description**
CryptoBearWatchClub.sol, safeTransferFrom(address,address,uint256)
Function has the same code as the parent ERC721 contract, thus its override is meaningless. It
is enough to override the safeTransferFrom(address,address,uint256,bytes).
**Recommendation**:... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Unnecessary Quote Addition
### Description
## Counter Quote Vulnerability
`counter_quote` allows the addition of the same quote multiple times without proper validation. The `counter_quotes` vector of the ride may end up containing redundant or duplicate counter quotes for the same driver. This redundant data... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | false | false | ## Low: Lack of input validation
### Description
* The [`approve` function](https://github.com/compound-finance/compound-protocol-alpha/blob/6858417c91921208c0b3ff342b11065c09665b1b/contracts/Governance/Comp.sol#L80) of the `Comp` contract does not ensure that the `spender` address is not zero. See [OpenZeppelin’s imp... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | solodit_api | medium | Royalty | true | false | Source: https://github.com/sherlock-audit/2022-10-nftport-judging/issues/83
## Found by
ElKu, rvierdiiev, obront, pashov, ctf\_sec, joestakey, ak1, JohnnyTime, GimelSec, Dravee, JohnSmith, cccz
## Summary
In past audits, we have seen contract admins claim that invalidated configuration setters are fine since “admi... | Sherlock | 4 | NFTPort |
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: [07] Nouns fork may not efficiently remedy a bad situation
### Description
The `20%` threshold, as [documented in the FAQs](https://mirror.xyz/0x10072dfc23771101dC042fD0014f263316a6E400/iN0FKOn_oYVBzlJkwPwK2mhzaeL8K2-W80u82F7fHj8) for instance, `800 * 0.2 = 160` of Nouns tokens, is not a small number comparati... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | storage | true | false | ## Low: Lack of contract existence check on call
### Description
The factories and the registry client all have a `multiexcall` function, which is designed to create batched calls to various target addresses. To do this, it uses the `call` opcode to execute arbitrary calldata. If the target address is set to an incorr... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Strategy `PDA` Cannot Be Closed, Resulting in Locked Rent
### Description
**Update**
Marked as "Acknowledged" by the client.
**File(s) affected:**`programs/ntbundle/src/instructions/remove_strategy.rs`
**Description:** The `remove_strategy` instruction fails to close the `strategy_account` PDA after disablin... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | overflow | true | false | ## High: PoolTemplate.sol#resume() Wrong implementation of resume() will compensate overmuch redeem amount from index pools
### Description
## Handle
WatchPug
## Vulnerability details
## Root Cause
Wrong arithmetic.
---
https://github.com/code-423n4/2022-01-insure/blob/19d1a7819fe7ce795e6d4814e7ddf8b8e1323df3/c... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | initialization | true | false | ## Medium: A claim cannot be paid out or escalated if the protocol agent changes after the claim has been initialized
### Description
The `escalate` and `payoutClaim` functions can be called only by the protocol agent that started the claim. Therefore, if the protocol agent role is reassigned after a claim is started,... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Incorrect Event Emission
### Description
Within the `LockerList` contract, if an attempt is made to [add](https://github.com/radiant-capital/v2-core/blob/e8f21f103e17736907b62809d1ad902febc53714/contracts/radiant/libraries/LockerList.sol#L44-L48) a `locker` address that already exists to the [`userlist`](https... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | front-running | false | false | ## Low: tx.gasprice should not be used to check for frontrunning
### Description
## Understanding tx.gasprice and Frontrunning
The `tx.gasprice` is used to determine whether a transaction is being frontrunned. If the transaction gas price is above 1 ETH or an arbitrary value set by the admin, then the transaction wil... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | reentrancy | true | false | ## Low: [06] Ineffective check in the `releaseNFT` function
### Description
### Lines of code
https://github.com/code-423n4/2024-02-althea-liquid-infrastructure/blob/bd6ee47162368e1999a0a5b8b17b701347cf9a7d/liquid-infrastructure/contracts/LiquidInfrastructureERC20.sol#L431
### Impact
This check is redundant and doe... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | false | false | ## Medium: SRP. Method `mint` of Smart contract CryptoBearWatchClub has misleading name as it used for running auction sale and not just mint.
### Description
**Recommendation**:
Split mint by Smart contract owner functionality and auction sale to two diffrent methods. | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | initialization | false | false | ## High: Battle fishing attack
### Description
The `Arena` smart contract contains a public [`createBattle`](https://github.com/DivergenceProtocol/diver-contracts/blob/e5286f94a7ccb9d6279fae51ea66a8833672628a/src/core/Arena.sol#L67) function that creates a new battle without initializing. This function is used in the ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Eclipse Mitigations
### Description
One of the main attacks against any discovery protocol is an eclipse. An attacker generates a large and occasionally specific set of node-ids in order to populate the first 10 or so buckets of a node's routing table with malicious entries. Once achieved, the attacker can for... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | false | false | ## Low: Contracts Set in the Protocol Can Implement Different Logic
### Description
Throughout the codebase, there are several access\-controlled actions that allow the respective roles to set/link the different modules between each other relying only (in [some cases](https://github.com/radiant-capital/riz/blob/65ca7b... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: REWARDS PERIOD SHOULD BE GREATER THAN ZERO
### Description
In the function `update_rewards_batch_speed`, there is a possibility that the calculated rewards batch period `dt` could be zero. This may lead to unexpected behavior, such as the rewards batch being stuck in the current state and preventing further re... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: Parameter updates not propagated
### Description
_Submitted by gpersoon, also found by cmichel_
There are several functions to update parameters. However these parameters are only updated on the top level and not propagated to the other contracts. This could lead to various unpredictable results.
Examples ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | false | false | ## Medium: Unchecked stake ownership in ticket casting
### Description
## getLotTicketByStaking Instruction Vulnerability
The `getLotTicketByStaking` instruction allows the owner of a legacy Frakt stake account to obtain raffle tickets. However, it does not verify that the stake account is actually owned by the invok... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | cyfrin_structured | low | timing | true | false | ## Low: Inconsistent deadline check in `V3DexSwap.swap `
### Description
The swap() function in V3DexSwap implements the require check in the snippet below which ensures block.timestamp is strictly less than the `_deadline`.
```solidity
require(_deadline > block.timestamp, DeadlineInThePast());
```
However, the [Ram... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | initialization | true | true | ## Medium: Incorrect rounding in `mint()`
### Description
In the `HyperEvmVault` contract, the `mint()` function calculates the number of assets by rounding down:
```solidity
function mint(uint256 shares, address receiver) public override(ERC4626Upgradeable, IERC4626) nonReentrant returns (uint256 assets) {
V1Sto... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Comparing LP Minting Strategy Between StablePool and StablePool2
### Description
**Contract StablePool** and **StablePool2** are two pool implementations that use different minting strategies. Both are inspired by Solidly Exchange’s pool implementation.
During LP minting, the contract StablePool computes a ne... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | true | false | ## Low: FundraisingMultisigTemplate - DAI/ANT token address cannot be zero ✓ Fixed
### Description
The fundraising template is configured with the `DAI` and `ANT` token address upon deployment and checks if the provided addresses are valid. The check performed is `_ensureTokenIsContractOrETH()` which allows the `addre... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | reentrancy | true | false | ## Low: Potential reentrancy behavior when harvesting
### Description
The `_harvest()` function of the `StrategyAerodromeGaugeGreen` contract makes several external calls for compounding earnings and charging performance fees before updating state. Although all external calls are made to trusted contracts, the sequenc... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | oracle | true | false | ## Medium: Chainlink’s latestRoundData might return stale or incorrect results
### Description
## Handle
nikitastupin
## Vulnerability details
## Proof of Concept
https://github.com/code-423n4/2021-10-mochi/blob/8458209a52565875d8b2cefcb611c477cefb9253/projects/mochi-cssr/contracts/adapter/ChainlinkAdapter.sol#L4... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | access-control | false | false | ## Medium: The Modifier `onlyAcceptedContracts()` Can Be Bypassed After an Update of the Mapping of `AddressResolver`
### Description
**Update**
Marked as "Acknowledged" by the client. The client provided the following explanation:
> _We use a multi-sig wallet as all contract's owners. In addition, this access contro... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | liquidation | true | false | ## Gas: Redundant _depositor function argument in _updateDepositAndSnapshots
### Description
The current implementation of `_updateDepositAndSnapshots` includes the `address _depositor` argument, which is set as `msg.sender` in all call sites. This approach introduces unnecessary complexity as `msg.sender` can be acce... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | true | false | ## Low: Spendpermission can be create by account that have 0 tokens to spend
### Description
The owner of a spend permission can create spend permissions even if they have a 0 token balance, effectively preventing the spender from using the permission. The owner can either maintain a 0 token balance or transfer tokens... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | false | false | ## Low: SafeERC20 imported but unused
### Description
SafeERC20 is imported but the conventional `.transfer()` and `.transferFrom()` methods are used instead of the `safeTransfer()` and `safeTransferFrom()` counterparts.
### Recommendation
```diff
- IERC20(tokenContract).transfer(counterparty, amount);
+ IERC20(token... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: PROPOSAL LACKS MULTIPLE IMPORTANT LOGIC CHECKS
### Description
In `Governance.sol` contracts, the `propose` function lacks the multiple logical checks listed below.
* Missing to check if the length of the provided `targets` is equal to `values,` `data` length or not. Thus allowing the incorrect submission ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: Initialization front-running
### Description
It is possible to front-run initialization of the Claiming contract.
https://github.com/FantiumAG/smart-contracts/blob/a2d126453c1105028f12277b8f342d2cdbf01a77/contracts/claiming/FantiumClaimingV1.sol#L135-L150
### Recommendation
We recommend checking that the Clai... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Potential Path Traversal
### Description
## Vulnerability in generateImage Function
The `generateImage` function's `baseImageFilePath` is attacker-controlled and may contain path traversal payloads or paths with `../`. This vulnerability allows the attacker to determine if a file exists on the server file sys... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | dos | false | false | ## Low: Failure of a single broadcast Ethereum transaction causes a batch-wide failure
### Description
The Peggo orchestrator broadcasts Ethereum events as Cosmos messages and sends them in batches of 10 (at least by default). According to a code comment (figure 32.1), if the execution of a single message fails on the... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | other | false | false | ## High: Covering impermanent loss allows profiting off asymmetric liquidity provision at expense of reserve holdings
### Description
_Submitted by hyh_
#### Impact
Pool funds will be siphoned out over time as swaps and asymmetric LP provision are balancing each other economically, while with introduction of IL reim... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | storage | true | false | ## Low: Storage collision risk in UUPS upgradeable `StakingProxy` due to missing storage gap
### Description
**Description:** `StakingProxy` contract inherits from `UUPSUpgradeable` and `OwnableUpgradeable` but does not implement storage gaps to protect against storage collisions during upgrades.
`StakingProxy` is in... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | false | false | ## Low: Follow the one style for error messages in the contracts.
### Description
**Recommendation**:
Consider changing the error message in ERC20 contract related to exceeding the cap as
follow:
require(totalSupply().add(amount) <= cap(), "ERC20: only 100 million MIMIR Exist");
**Re-audit**:
Not valid since require ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: Unsafe ABI Encoding
### Description
It is not uncommon to use `abi.encodeWithSignature` or `abi.encodeWithSelector` to generate calldata for a low\-level call. However, the first option is not typo\-safe and the second option is not type\-safe. As such, both of these methods are error\-prone and ought to be co... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | signature | false | false | ## Low: Paymaster has no internal replay protection mechanisms
### Description
The Paymaster contract validates that a signature indeed resolves to the `verifyingSigner` state variable. However, it does not internally track for any replay protection. It is thus dependent on its associated `entryPoint` contract to appr... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | initialization | true | false | ## High: Destruction of the `SmartAccount` implementation
### Description
[contracts/smart-contract-wallet/SmartAccount.sol#L166](https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L166)
[contracts/smart-contract-w... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: Arbitrary User Activation and Referral Reward Capture.
### Description
**Severity**: Low
**Status**: Acknowldeged
**description**
bpnmMain.sol: activate().
The `activate()` function in the contract allows for a new user registration without strict
validation of its origin. This raises the potential issue th... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Variable Shadowing Issue in `getPools` Function
### Description
**Severity**: Informational
**Status**: Acknowledged
**Location**: XYKPoolFactory.sol/StableSwapPoolFactory.sol
**Description**
The return variable pools in the getPools function shadows the state variable pools, which can lead to confusion an... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: Escrow record not cleared on cancellation and order fill
### Description
In `DirectBuyIssuer.sol`, a market buy requires the operator to take the payment token as escrow prior to filling the order. Checks are in place so that the math works out in terms of how much escrow has been taken vs the order's remai... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | cyfrin_structured | low | access-control | true | false | ## Low: Hooklet validation is recommended upon deploying new Bunni tokens
### Description
Uniswap V4 performs some validation on the hook address to ensure that a valid contract has been provided:
```solidity
function initialize(PoolKey memory key, uint160 sqrtPriceX96) external noDelegateCall returns (int24 tick) {
... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | token | false | false | ## High: Wrong Parameters Used to Check the Evidences of L1 -> L2 Transfers
### Description
**Update**
The team updated both parameters and created a dedicated set of tests to make sure that the function returns the correct result in the current supported chains (commit `4dece677b2c843390d5b8cc76a4a0ce10e909cef`).
**... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | dos | true | false | ## Low: RocketDepositPool - Potential gasDoS in assignDeposits Acknowledged
### Description
`assignDeposits` seems to be a gas heavy function, with many external calls in general, and few of them are inside the for loop itself. By default, `rocketDAOProtocolSettingsDeposit.getMaximumDepositAssignments()` returns `2`,... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | signature | true | false | ## Medium: `Nonce` reset vulnerability on Owner change
### Description
The nonce, which is tied to the `accountOwner`, is reset to zero when the owner is changed using the `AccountModule::notifyAccountTransfer` function. This resetting allows for the potential replay of previously processed signed messages, posing a s... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | access-control | false | false | ## High: Excessive minting `aETH` permissions for strategies
### Description
The issue is identified in the `CorePrimary.strategyMinting` function.
Currently, the function, which can only be invoked by a `strategy`, permits the minting of an unrestricted amounts of `AETH` to the arbitrary address. It presents a signif... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | true | false | ## Low: math.NewU256FromBigInt succeeds with negative integers
### Description
Like oversized integers (> 256 bits), negative integers ought to be rejected by `math.NewU256FromBigInt(b)` as neither can be expressed in the U256 type:
```go
package main
import (
"github.com/berachain/beacon-kit/mod/primitives/pkg/mat... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | oracle | true | false | ## Medium: Trades in blocks where the bid or ask drops to zero will be priced using the previous block's price
### Description
The oracle prices used for traces allow multiple oracles and their last prices to be provided. The oldest block's price becomes the primary price, and the newer price becomes the secondary pri... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | storage | false | false | ## Medium: Incorrect __gap Variable Decrement in VaultStorage
### Description
In the audited version of the contract, 4 slots were added to the storage of the `VaultStorage` contract:
* `dripper`, which [occupies](https://github.com/OriginProtocol/origin-dollar/blob/eca6ffa74d9d0c5fb467551a30912cb722fab9c2/contracts... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Consider expanding invariant testing to handle expected errors.
### Description
The current bounding in the invariant handlers force call parameters into expected successful paths. While this can make shallower invariant runs find numerical regressions more successfully, consider an invariant process that allo... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Solidity compiler optimizations can be dangerous
### Description
The compilation of the TokenCard smart contracts has optional Solidity compiler optimizations enabled. There have been several bugs with security implications related to optimizations. Moreover, optimizations are actively being developed. Solidit... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | solodit_api | medium | Two-Step Pattern | false | true | ## Handle
defsec
## Vulnerability details
## Impact
The current ownership transfer process involves the current owner calling Swap.transferOwnership(). This function checks the new owner is not the zero address and proceeds to write the new owner's address into the owner's state variable. If the nominated EOA acco... | Code4rena | 3 | Boot Finance |
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Transient Stake Account Only Moves In One Direction
### Description
## Transient Stake Account Overview
A transient stake account represents stake that is either activating or deactivating. The `IncreaseValidatorStake` and `DecreaseValidatorStake` instructions ensure that only one transient stake account is a... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: If WithdrawAddrEnabled = false, execute_claim() will fail
### Description
Currently, contracts that execute `execute_claim()` set `DistributionMsg::SetWithdrawAddress` first.
If `WithdrawAddrEnabled = false`, the execution will not succeed and the `claim` will not be executed.
### Impact
can't claim rewar... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Missing `redeem` convenience function in the `StakingVault.sol`
### Description
**Description:** `StakingVault.sol` implements a number of convenience functions: `stake(uint256 assets)` ,`unstake(uint256 assets)` and `mint(uint256 shares)`:
But it does not have a convenience function for `redeem`, consider... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | false | false | ## Medium: Iteration through all locks, including expired locks.
### Description
**Description**
Expo.sol: functions transfer(), send(), burn(), transferWithLock(). Functions iterate through all user's locks to verify that he doesn't transfer more than locked until some period of time. Iteration is performed through ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | dos | false | false | ## Medium: `UniswapV2/SushiwapLPAdapter` update the wrong token
### Description
_Submitted by cmichel_
The `UniswapV2LPAdapter/SushiswapV2LPAdapter.update` function retrieves the `underlying` from the LP token pair (`_asset`) but then calls `router.update(_asset, _proof)` which is the LP token itself again.
This will... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | access-control | true | false | ## High: `Vault#setController()` owner of the Vault contracts can drain funds from the Vault
### Description
_Submitted by WatchPug_
The owner of the Vault contract can set an arbitrary address as the `controller`.
A malicious `controller` contract can transfer funds from the Vault to the attacker.
#### Proof of ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | reentrancy | true | false | ## Medium: Token depreciation due to ETH donating
### Description
The `TokenFactory.pauseAndWithdrawToPurple` function pauses a token and donates its ETH to Purple DAO when not reach the price target within a certain period of time. So all token holders lose the possibility to sell tokens back. It means decreasing the... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | rounding | true | false | ## Medium: Users can manipulate the observation creation
### Description
Users can alter the record of their balances.
### Proof of Concept
If the users `delegateBalance` has changed, observations will be recorded. If there is a need for a new observation, the new observation will be created; otherwise, it will be o... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | oracle | true | false | ## Gas: State variables only set in the constructor should be declared `immutable`
### Description
Avoids a Gsset (20000 gas)
1. File: contracts/ManagedIndex.sol (line [17](https://github.com/code-423n4/2022-04-phuture/blob/594459d0865fb6603ba388b53f3f01648f5bb6fb/contracts/ManagedIndex.sol#L17))
2. File: contrac... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | initialization | false | false | ## Medium: Not all calls forward msg.value
### Description
Most functions of the codebase are payable. When these functions perform an inner call, the `msg.value` is not always forwarded:
- `Nexus.executeUserOp` does not forward it in `target.call(data)`.
- `Nexus.fallback` handler.
- `BiconomyMetaFactory.deployWithFa... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | false | false | ## Medium: Division by Zero in `_getNextClaimableAmount` Function
### Description
**Severity**: Medium
**Status**: Resolved
**Description**:
The `VestingSchedule` contract, particularly in its `_getNextClaimableAmount` function, is vulnerable to a division by zero error. This issue occurs when `groupVestingDuration... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | true | false | ## Low: Unecessary Parent Contracts ✓ Fixed
### Description
Contract `BlacklistableV1` and `RescuableV1` extends `ContextUpgradeable` and `ERC20Upgradeable,` which are not used in any of contract functions and are already inherited by the child contract `FiatTokenV1`.
### Recommendation
Remove the unnecessary parent ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Inaccurate Storage Size Calculation
### Description
## Potential Inaccuracy in Storage Size Calculation in `PreparedFill::compute_size`
In `PreparedFill::compute_size`, there is a potential inaccuracy in storage size calculation. The code assumes eight bytes of storage for one of the `u8` fields. This is inco... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Incorrect value emitted in Bonded event may affect offchain tracking
### Description
`ExManager.bond()` emits a Bonded event to capture the amount of exLST shares escrowed for operator bonded capital. This event uses the shares value instead of `opBond`. However, shares minted may be in excess of `opBond`, in ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | cyfrin_structured | low | integer-overflow | true | true | ## Low: Unchecked queue withdrawal timestamp logic is implemented incorrectly
### Description
Unchecked math is used within `BunniHubLogic::queueWithdraw` to wrap around if the sum of the block timestamp with `WITHDRAW_DELAY` exceeds the maximum `uint56`:
```solidity
// update queued withdrawal
// use uncheck... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | liquidation | true | true | ## High: Valid redemption proposals can be disputed by decreasing collateral
### Description
### Impact
When a user creates a redemption proposal with the `proposeRedemption` function the user has to provide a list of the short records (SRs) with the lowest collateral ratios (CR) in the system ascending.
To prevent ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | initialization | true | false | ## Medium: Permissionless OffRampState initialization under official program ID enables spoofed “official” instances
### Description
**Description:** The `initialize` instruction lets any signer create a new `OffRampState` and become its `admin`. The global `OffRampCounter` is `init_if_needed` and unguarded, and the n... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | overflow | false | false | ## High: Steal Rewards and Take over Network by Faking A...
### Description
Report type: Blockchain/DLT
Target: https://github.com/shardeum/shardus-core/tree/dev
Impacts:
* Direct loss of funds
## Description
## Impact
1. Steal other nodes' rewards
2. Create many nodes without staking any actual stake, thus tak... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Execution mode restriction in `LogicalOrWrapperEnforcer` can be removed
### Description
**Description:** The `LogicalOrWrapperEnforcer` contract currently includes the `onlyDefaultExecutionMode` modifier on all of its hook functions. This creates an unnecessary restriction since the individual enforcers being ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Adding custom revert errors in AdaptiveFeeCalculator would maintain convention
### Description
Throughout most of the HMX codebase, custom revert errors are used instead of `require()` statements. On the other hand, the new AdaptiveFeeCalculator is using two `require()` statements in the `pow()` function.
###... | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.