prompt
listlengths
2
2
source
stringclasses
3 values
severity
stringclasses
5 values
category
stringclasses
186 values
has_code
bool
2 classes
has_poc
bool
2 classes
reference_response
stringlengths
23
5k
firm
stringclasses
26 values
quality_score
float64
0
5
protocol
stringclasses
398 values
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
solodit_api
high
Wrong Math
false
true
## Severity Critical ## Description In syncRewards, the rewards are calculated by subtracting the last rewards to the total yield. This is inaccurate because total yield keeps increasing, and last rewards are just the last amount rewarded. This means that over time, rewards will become much more inflated than their ...
Kann
4
Mystic Finance
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
true
false
## Medium: getReservesByCategory() when useSubmodules =true and submoduleReservesSelector=bytes4(0) will revert ### Description in `getReservesByCategory() ` Lack of check `data.submoduleReservesSelector!=""` when call `submodule.staticcall(abi.encodeWithSelector(data.submoduleReservesSelector));` will revert ### Im...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
cross-chain
true
false
## Medium: Processing of initial balances ### Description The LiFi code bases contain two similar source files: **Swapper.sol** and **SwapperV2.sol**. One of the differences is the processing of `msg.value` for native tokens, see pieces of code below. The implementation of **SwapperV2.sol** sends previously available ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Local authentication bypass ### Description The manual modification of the `isUnlocked` variable in `chrome.storage` allows bypassing the sidebar's local authentication; however, this behavior does not allow conducting sensitive operations, such as revealing recovery phrases, changing the local password, or ad...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Out-of-bounds access in print_textual ### Description The function `print_textual` is used to convert a principal ID to a base-32 textual representation. The function verifies that `outValLen` is at least 37 bytes and then calls `pageString` to copy at most 37 bytes of the ID’s textual representation to the ou...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
token
false
false
## High: Cross-chain smart contract calls can revert but source chain tokens remain burnt and are not refunded ### Description _Submitted by sseefried, also found by Chom_ Smart contract calls often revert. In such cases any ether sent along with the transaction is returned and sometimes the remaining gas (depending ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
oracle
true
false
## High: Market coordinator can steal all market collateral by changing adiabatic fees ### Description Source: https://github.com/sherlock-audit/2024-08-perennial-v2-update-3-judging/issues/27 ## Found by panprog **Summary** The README states the following: > Q: Please list any known issues and explicitly state the...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
true
false
## Low: UniswapV3Swapper uses wrong allowance check ### Description Before the `UniswapV3Swapper` can exit a gate, it needs to set an `XPYT` allowance to the gate. The following check determines if an approval needs to be set: ```solidity if ( args.xPYT.allowance(address(this), address(args.gate)) = previewWithdraw...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: The `operator` can make an approve to the zero address ### Description - https://github.com/yearn/yETH-bootstrap/blob/2dd219d3af49952275934638e8c9d50d0fef0d8f/contracts/modules/CurveLP.vy#L232 The operator can make an extra approve to the zero address. ### Recommendation We recommend adding the following che...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: | Storage Modifiers ### Description **Description** In `assignNamingCreditsBulk` the `address[] memory user` and `address[] memory numberOfCredits` parameters are never altered and therefore can be declared `calldata`. **Recommendation** Declare the variables `calldata`. **Resolution** NFTR Team: - The s...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
true
false
## Low: Missing check for `validatorMEVRewardsPercentage` in `PolygonStrategy::initialize` ### Description **Description:** `validatorMEVRewardsPercentage`is a reward percentage with valid values ranging from 0 to 10000 (100%). `PolygonStrategy::setValidatorMEVRewardsPercentage` rightly checks that the reward percenta...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
other
true
false
## Gas: `internal` functions only called once can be inlined to save gas ### Description Not inlining costs 20 to 40 gas because of two extra `JUMP` instructions and additional stack operations needed for function calls. *There are 4 instances of this issue:*
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Swap comment order ### Description The variable order in the comment do not correspond to that of the implementation. For readability, I recommend that they do.
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
oracle
false
false
## Low: Missing Input Validation ### Description **Update** Marked as "Fixed" by the Venus team. Addressed in: `0c5f140989ee41e6ba0e2d165596d8cac1005686`, `83ceb365ba6ca55997be0e925c0b8ffa755ac626`. The Venus team provided the following explanation: > Oracle : It could be zero see here https://github.com/VenusProtoco...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Missing Connection Timeout for Contacting Mantle DA ### Description The implemented connection to Mantle DA is missing a defined timeout option. This might lead to issues when servers accept connections but fail to respond to calls. There are the following occurrences of connections to Mantle DA: * Connectio...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
reentrancy
false
false
## High: Incorrect Flashloan Integration ### Description **Update** The client fixed the issue in commit `0fd7b45e0e8323a437804bcd9e6d0c373d0d0896` and provided the following explanation: > Mentioned issues were addressed in this commit, but this only can be considered fixed when VirtualPool is actually tested (not a...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: Unnecessary payable specifier for functions may allow ETH to be sent and locked/lost ### Description Functions `LSSVMRouter.robustSwapERC20ForSpecificNFTsAndNFTsToToken()` and `LSSVMPair.initialize()` which do not expect to receive and process Ether have the payable specifier. This allows interacting users to ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
false
false
## Low: Lack of Input Validation in react/src/hooks/useDeposit ### Description **Severity**: Low **Status** : Resolved **Description**: The function only checks the first element of the amountChanges array for validation. It does not validate the entire array or the erc20Addresses array. This might lead to issues...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
signature
true
false
## Medium: ABI decoding for bytes: memory can be corrupted by maliciously constructing the calldata ### Description ## Security Analysis Report ## Severity: **Medium Risk** ## Context: `ConsiderationDecoder.sol#L51-L62` ## Description: In the code snippet below, `size` can be made `0` by maliciously crafting the...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Unrestricted maximum value in `coolDownPeriod()` ### Description Currently the cooldown period is 7 days as per docs. If set maximum values uses can't withdraw their tokes. https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/Withdraw/WithdrawQueue.sol#L124-L13...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
access-control
true
false
## High: `SessionKey` Owner Can Impersonate Another Session Key Owner for the Same Smart Wallet ### Description The Smart Wallet (Etherspot Wallet) can enable multiple sessions at the same time, it can have N count active sessions. When validating the signature via `CredibleAccountModule::validateUserOp()`, we are ma...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
oracle
false
false
## Low: Unused Imports: EVMScriptCreator.sol and IValidatorsExitBusOracle.sol ### Description In `SubmitExitRequestHashesUtils.sol`, the following imports are declared but never used within the library: ```solidity= import "../libraries/EVMScriptCreator.sol"; import "../interfaces/IValidatorsExitBusOracle.sol"; ``` ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
true
false
## Low: No access control in `initializeVault()` allows unauthorized init ### Description _Resolved_ The `RestrictedVaultFactory` contract restricts vault creation to the current contract owner. However, it fails to override the `initializeVault()`, which is still accessible to the previous owner who is recorded as t...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
initialization
false
false
## High: Sellers may lose NFTs when orders are matched with `matchOrders()` ### Description _Submitted by KIntern, also found by csanuragjain, GimelSec, kenzo, and unforgiven_ Function `matchOrders` uses custom constraints to make the matching more flexible, allow seller/buyer to specify maximum/minimum number of NFT...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
other
true
false
## Gas: Pack struct variables ### Description Reordering the structure of the `MarketState` ensures that the struct variables are packed efficiently, minimizing storage costs.
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Floating pragma ### Description Contracts should be deployed with the same compiler version and flags used during development and testing. Locking the pragma helps to ensure that contracts do not accidentally get deployed using another pragma. For example, an outdated pragma version might introduce bugs that a...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: Lack of incentives for calls to Witch.auction ### Description Users call the Witch contract’s auction function to start auctions for undercollateralized vaults. To reduce the losses incurred by the protocol, this function should be called as soon as possible after a vault has become undercollateralized. Howeve...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
dos
false
false
## Medium: Timestamp usage ### Description [Timestamps used](https://github.com/ether-camp/virtual-accelerator/blob/master/contracts/ProjectKudos.sol#L88-L92) correctly correspond to commented dates. The code [uses timestamps for contract logic](https://github.com/ether-camp/virtual-accelerator/blob/6665fdd4b7108844...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: Proof Verification DoS via Duplicate Nullifier Account ### Description ## Protection Against Simultaneous Proof Verification To protect multiple wardens from executing the same proof verification simultaneously (resulting in all but one of the wardens missing out on a fee payout), the verification flow uses a...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
flash-loan
false
false
## Medium: Supply part of the accrued debt can be stolen ### Description _Submitted by cmichel_. The `LendingPair.uniClaimDeposit` function allows the user to "collect fees" and mint new supply shares with the collected amounts. #### `uniClaimDeposit` does not accrue tokens However, the current total supply is not ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
true
false
## Medium: spikes after outages may prevent order execution ### Description Users are required to specify execution fee at order creation. This fee is to reimburse the keeper for executing their order, and is based on a formula that includes the `tx.price` of the keeper when it executes the order. ### Impact It's ent...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: `maxUnstakeRequests` is not validated when `unstakeRequests` are reused ### Description The `maxUnstakeRequests` variable helps limit the number of `unstakeRequests` a user can have. This variable is validated in the `requestUnstake()` function in lines `RivusTAO#L607-609`: The problem is that `maxUnstakeReq...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
signature
false
false
## Low: Operator AVS Registrations Cannot Be Cancelled ### Description EigenLayer Operators are able to provide a signature with a corresponding salt and expiry to an AVS in order to link the AVS and Operator. If an operator accidentally provides a signature to the wrong AVS this signature cannot be cancelled, and is ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
access-control
false
false
## Low: Role Transfer Not Following Two-Step Pattern ### Description **Update** Marked as "Acknowledged" by the client. The client provided the following explanation: That would be handled carefully; we don't want to make any modifications to LayerZero's current code because we inherit LayerZero's and LzApp is exte...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
solodit_api
high
initialization
false
true
<https://github.com/code-423n4/2022-07-golom/blob/e5efa8f9d6dda92a90b8b2c4902320acf0c26816/contracts/rewards/RewardDistributor.sol#L172-L210><br> <https://github.com/code-423n4/2022-07-golom/blob/e5efa8f9d6dda92a90b8b2c4902320acf0c26816/contracts/rewards/RewardDistributor.sol#L185><br> A malicious user can repeatedl...
Code4rena
5
Golom
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
access-control
false
false
## Medium: MALICIOUS UPLOAD DOCUMENTS FOR KYC PROCESS ### Description An attacker could upload malicious PDF files within the KYC process. This presents a significant impact as it introduces the risk of unauthorized code execution or the dissemination of malicious content. The presence of these malicious files within ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
overflow
true
false
## Medium: ​hasDuplicate runs out of gas when the input list is empty ### Description The `hasDuplicate` function is incorrectly implemented. The `hasDuplicate` function, which determines if a list of addresses contains duplicates, is shown in Figure 1. Its documentation states that it returns true if it finds duplica...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: | Unequal Royalty Rewards ### Description **Description** In the `receive` and `fallback` functions, the rewards distribution to `CYBERs` holders can only occur before the second mint and never after. **Recommendation** Ensure this is the expected behavior. If it isn’t, refactor the reward logic to more fai...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
cross-chain
true
false
## High: TransactionManager - Receiver-side check also on sending side ✓ Unverified Fix ### Description The functions `prepare`, `cancel`, and `fulfill` in the `TransactionManager` all have a “common part” that is executed on both the sending and the receiving chain and side-specific parts that are only executed eithe...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: Unnecessary assert on immutable variable ### Description Assertion `address(investmentToken) != address(want)` in `_buyInvestmentTokenWithWant` is not necessary during contract execution https://github.com/therealmonoloco/maker-dai-delegate/blob/97949a51062df956fd0172b7b1c778f66844b634/contracts/Strategy.sol#...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: Unnecessary `payable` function ### Description The `DoubleTokenLexscrow` constructor doesn't use `msg.value` so it is unnecessary to mark the function as `payable`: https://github.com/MetaLex-Tech/LeXscrow/blob/94ca277528bb25b8421dc127941c18915144eb29/src/DoubleTokenLexscrow.sol#L238-L248. ### Recommendation ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Superfluous condition in require statement ### Description Within the [`_acceptAdmin`](https://github.com/compound-finance/compound-protocol/blob/f86c247f6f81e14f8e0fd78402653a0b8371266a/contracts/Governance/GovernorBravoDelegate.sol#L286) function of the `GovernorBravoDelegate` contract, there is a [`require`...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
access-control
true
false
## Medium: If the strategy incurs a loss the Active Pool will stop working until the shortfall is paid out entirely ### Description ## Lines of code https://github.com/code-423n4/2023-02-ethos/blob/73687f32b934c9d697b97745356cdf8a1f264955/Ethos-Core/contracts/ActivePool.sol#L251-L252 ## Vulnerability details - Vau...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
dos
false
false
## High: Router - handleMetaTxRequest - gas griefing / race conditions / missing validations / free meta transactions ### Description There’s a comment in `handleMetaTxRequest` that asks whether data needs to be validated before interacting with the contract and the answer is yes, always, or else this opens up a gas g...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
liquidation
true
false
## High: LienToken payee not reset on transfer ### Description The `payee` and `ownerOf` functionalities are detached, meaning that owners may set a `payee`, and the owner may transfer the `LienToken` to a new owner without affecting the `payee`. The `payee` does not reset upon transfer. ### Recommendation Reset `pay...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: No address(0) check ### Description **Severity**: Low **Status**: Resolved **Description** In Contract PythOracle.sol, the method rescueFunds() does not validate if _receiver is address(0) or not. If accidentally set to address(0), funds would be lost. In Contract PairInfos.sol, the method initialize(...) ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
false
false
## High: Winner's payout is incorrectly calculated ### Description **Severity** **Impact:** High **Likelihood:** High **Description** When a winner wins money, the function incorrectly calculates the payout for the winner, resulting in much more payout for the winner than intended. When the admin calls `endGame()...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
false
false
## High: Funds may freeze on the `TimeLock` if the beneficiary does not implement `claim()` ### Description Assets from the `TimeLock` can only be claimed by their respective beneficiaries via calling the `claim` function. However, if the beneficiary is an immutable smart contract with no ability to invoke `claim` aga...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
solodit_api
medium
Rounding
false
true
[DBR.sol#L287](https://github.com/code-423n4/2022-10-inverse/blob/main/src/DBR.sol#L287)<br> While a user borrows DOLA, his debt position in the DBR contract accrues more debt over time. However, Solidity contracts cannot update their storage automatically over time; state updates must always be triggered by external...
Code4rena
4
Inverse Finance
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
low
token
true
false
## Low: Use named imports ### Description The contracts mostly use named imports but strangely some import statements don't; use named imports everywhere: `MTokenMessager`: ```solidity import "./interfaces/ICCIPClient.sol"; ``` `MTokenMessagerLZ`: ```solidity import "./MTokenMessagerBase.sol"; import "./interfaces/I...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
signature
true
false
## Low: Possible Index Out Of Bounds Error During Loop Iteration ### Description The `atomicVerifyAndMatch()` function iterates over the three arrays `actions`, `signatures`, and `atomicActionData` reading from each index. However, there is no check to ensure that all three arrays are the same length. This could lead ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: No security patching process ### Description There's no process in place to automatically update the OS packages regarding security patches. ### Recommendation This is OS dependent. For Amazon Linux, it can be something like running `yum update --security` periodically.
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
liquidation
true
true
## Low: Validation of system invariants is error prone ### Description The architecture of the f(x) protocol is interleaved, and its interactions are complex. The interdependencies of the components are not managed well, and validations are distributed in disparate components rather than maintaining logical separation...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
cross-chain
false
false
## Low: `propose()` Returns an Incorrect `proposalId` ### Description **Update** Marked as "Fixed" by the client. Addressed in: `112ef70805d4eb6ea323168f879e688f2e7d52da`. The client provided the following explanation: > Modify according to recommendations. **File(s) affected:**`Layer2Bridge.sol` **Description:** T...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
solodit_api
high
Vault
false
false
Source: https://github.com/sherlock-audit/2022-11-sense-judging/issues/22 ## Found by 0x52 ## Summary AutoRoller#eject collects all the current yield of the YTs, combines the users share of the PTs and YTs then sends the user the entire target balance of the contract. The problem is that combine claims the yield f...
Sherlock
5
Sense
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
oracle
true
true
## High: Pool weight calculation in computepoolweights /computepoolweight always return wrong an- swer because totalusdvalue returns 0 ### Description When calculating the pool's weight, it first gets the pool's `underlyingToken` by calling `Price-Feed.getUSDPrice`: ```solidity function getUSDPrice(address token) pub...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
solodit_api
medium
Needless receive()
false
false
[HolographERC721.sol#L962](https://github.com/code-423n4/2022-10-holograph/blob/f8c2eae866280a1acfdc8a8352401ed031be1373/contracts/enforcer/HolographERC721.sol#L962)<br> HolographERC721.sol is an enforcer of the ERC721 standard. In its fallback function, it calls the actual implementation in order to handle additiona...
Code4rena
4
Holograph
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: Increase consistency in string comparison using EqualFold ### Description More consistency in string comparison. ### Recommendation Use `strings.EqualFold` to be more consistent across the code base, like in `IsApprovedByUser()` (mfa.go#L12): ```go func IsAllowedToApprove(mfaReq *cubistv0.MfaRequestInfo, use...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
overflow
false
false
## Medium: Incorrect implementation of `RRUtils.serialNumberGte` ### Description [RRUtils.sol#L266-L268](https://github.com/code-423n4/2022-07-ens/blob/main/contracts/dnssec-oracle/RRUtils.sol#L266-L268) Comparing serial numbers should follow RFC1982 due to the possibility of numbers wrapping around. `RRUtils.serialN...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
access-control
true
false
## Medium: Tier Removal in `setRarityWeights()` Can Invalidate Active Stakes ### Description The `setRarityWeights()` function allows the contract owner to update the `rarityWeights` array. However, the function contains a critical flaw: it does not check whether the new, shorter array is removing rarity tiers that cu...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
false
false
## Medium: Master Encryption Key Derived Solely From Device `RNG` Weakens Wallet Security ### Description **Update** Marked as "Unresolved" by the client. The client provided the following explanation: > We can still introduce some auto-generated user entropy, but would like to otherwise remove it from the scope of t...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
rounding
true
false
## High: ReseedSilo doesn't update total balances of Stalk and Roots ### Description ReseedSilo is used to migrate Silo deposits owned by EOA. It writes Stalk associated with migrated deposits and misses to write Roots (but that's another issue submitted in another report). However it doesn't update total supply ### ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Using function without any logic ### Description At `Voting.sol` using empty useless function at https://github.com/lidofinance/aragon-apps/blob/8c46da8704d0011c42ece2896dbf4aeee069b84a/apps/voting/contracts/Voting.sol#L191. ### Recommendation It is recommended to comment it or delete.
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
liquidation
false
false
## Low: Avoid Precision Loss ### Description ## Handle Redistribution in the Bucket Module The `handle_redistribution` in the bucket module handles the collateral and debt redistribution to the users. The calculation of the remaining collateral after taking out the fee and rebate amount is improper, giving less preci...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
other
true
false
## High: compress right after convert can bypass completeness checks ### Description In the recursion pipeline of pico, multiple recursion circuits are whitelisted, and the typical recursion pipeline goes like this: 1. riscv proof (leaf) -> A single precompile, memory, or execution chunk is proven 2. convert -> Leaf ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
token
true
true
## High: Potential issues that can arise from BGT being reward token ### Description The expected reward token gotten from staking on berachain is potentially the Bera Governance Token, BGT. ```solidity /// @notice ERC20 token in which rewards are denominated and distributed. /// Typically the BGT(i.e. Berachain...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
cross-chain
true
false
## Gas: Optimize away `nativeMappingValue` variable in `TokenBridge::completeBridging` ### Description **Description:** Optimize away `nativeMappingValue` variable in `TokenBridge::completeBridging` by for example: **Linea:** Acknowledged; will be part of a future release.
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
gas
initialization
true
false
## Gas: Multiple accesses of a mapping/array should use a storage pointer ### Description Caching a mapping’s value in a storage pointer when the value is accessed multiple times saves ~40 gas per access due to not having to perform the same offset calculation every time. Help the Optimizer by saving a storage variabl...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
front-running
false
false
## Low: Missing Slippage Protection for Direct Zapping ### Description The `LiquidityZap` contract implements the [`zapETH`](https://github.com/radiant-capital/v2-core/blob/e8f21f103e17736907b62809d1ad902febc53714/contracts/radiant/zap/helpers/LiquidityZap.sol#L101-L104) and [`addLiquidityETHOnly`](https://github.com/...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
low
other
true
false
## Low: Consolidate `SCALE_FACTOR` used in two contracts into one shared constant ### Description Consolidate `SCALE_FACTOR` used in two contracts into one shared constant: ```solidity contracts/core/StabilityPool.sol 30: uint256 public constant SCALE_FACTOR = 1e9; contracts/dao/BoostCalculator.sol 59: uint256 ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
overflow
true
false
## Low: Code Clarity ### Description ## Code Review Summary ## Issues Identified 1. In the `quote` module, `amount_out_net`, `amount_out_net_of_protocol_fees`, `output_fee_rate`, and `amount_out_net_of_pool_fees` perform subtraction on `amount_out` by the respective fees (`protocol_fees` and `pool_fees`). However, t...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
oracle
false
false
## Low: Unable to Resubmit Report Until Next Frame ### Description **Update** The team acknowledged the issue and stated that they will add it to the backlog and prioritize it appropriately in the future. **File(s) affected:**`oracle/report.go`, `oracle/tx.go` **Description:** The `report.go:shouldReport()` function...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
low
access-control
true
false
## Low: Missing `address(0)` check in `setDistributor` ### Description The `StakingVault::setDistributor` function allows administrators to grant or revoke the DISTRIBUTOR_ROLE to specified accounts, but it lacks validation to prevent assigning this critical role to the zero address (address(0)). While this doesn't cr...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: `BabelVault::registerReceiver` should check `bool` return when calling `IEmissionReceiver::notifyRegisteredId` ### Description **Description:** `BabelVault::registerReceiver` should check `bool` return when calling `IEmissionReceiver::notifyRegisteredId` since this call is intended as a sanity check to ensure ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
liquidation
false
false
## Low: Events not indexed ### Description ## Email address mail@cmichel.io ## Handle @cmichelio ## Eth address 0x6823636c2462cfdcD8d33fE53fBCD0EdbE2752ad ## Vulnerability details The `CrossDeposit`, `CrossTrade`, `CrossWithdraw`, `CrossBorrow`, `CrossOvercollateralizedBorrow` events in `MarginRouter` are no...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
initialization
false
false
## Medium: Missing zero address checks ### Description **Severity**: Medium **Status**: Resolved **Location**: LiquidityFreeLaunch.sol and LiquidityFreeLaunchFactory.sol **Description**: In `LiquidityFreeLaunch.sol`, there is missing zero address check for token and `zapTreasury`. If set once, they cannot be chang...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Empty strategies can be created due to missing zero length check ### Description **Description:** `StrategyBuilderPlugin.createStrategy()` does not currently revert if the `steps` array length is zero. This means strategies can be created that can never be deleted, per the `strategyExist` modifier logic that i...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
true
false
## Low: Missing Input Validation ### Description During the security assessment, several functions in the smart contracts were found to lack adequate input validation. Without proper checks, critical parameters may be set to invalid, undesired, or unrealistic values, which could lead to vulnerabilities, unexpected beh...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
access-control
true
false
## High: tbtc - Anyone can emit log events due to missing access control ✓ Addressed ### Description Access control for `DepositLog` is not implemented. `DepositLog` is inherited by `TBTCSystem` and its functionality is usually consumed by `Deposit` contracts to emit log events on `TBTCSystem`. Due to the missing acce...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Emissions added before first voting epoch period remain unallocated ### Description _Acknowledged_ The `Voter.notifyRewardAmount()` function allows anyone to donate `KITTEN` tokens to be distributed across gauges proportionally to their vote share for the current period. This same function is also used by `Mi...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
high
oracle
false
false
## High: `totalLiquidityWeight` Is Updated When Adding New Token Pairs Which Skews Price Data For `getVaderPrice` and `getUSDVPrice` ### Description _Submitted by leastwood_ The `_addVaderPair` function is called by the `onlyOwner` role. The relevant data in the `twapData` mapping is set by querying the respective li...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
initialization
false
false
## Low: Checks improvements on l2 tokens in the initGateways ### Description During the deployment phase, various checks are performed for the soon-to-be registered tokens on L1/L2 gateways: - `cfg.l1Tokens.length == cfg.l2Tokens.length`: Length must match. - Both L1/L2 tokens at position `i` in the array must not be...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
liquidation
false
false
## Medium: maintainer can be pushed out ### Description The function liquidate (in both `CrossMarginLiquidation.sol` and `IsolatedMarginLiquidation.sol`) can be called by everyone. If an attacker calls this repeatedly then the maintainer will be punished and eventually be reported as maintainerIsFailing And then the a...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
access-control
false
false
## Medium: Privileged Roles and Ownership ### Description **Update** The team documented the roles and privileges in user-facing documentation. * Relayer role : https://docs.pheasant.network/contracts/technical-details#update-functions * Owner role: https://docs.pheasant.network/contracts/technical-details#owner *...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
solodit_api
medium
Access Control
true
true
<https://github.com/code-423n4/2022-11-stakehouse/blob/a0558ed7b12e1ace1fe5c07970c7fc07eb00eebd/contracts/liquid-staking/LiquidStakingManager.sol#L882><br> <https://github.com/code-423n4/2022-11-stakehouse/blob/23c3cf65975cada7fd2255a141b359a6b31c2f9c/contracts/syndicate/Syndicate.sol#L22> `LiquidStakingManager._auto...
Code4rena
4
Stakehouse Protocol
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
true
false
## Medium: Bonding.sol _unbondAndBreak does not account for edge case where no tokens are returned ### Description _Submitted by harleythedog_ In Bonding.sol, the internal function `_unbondAndBreak` transfers a user's stake tokens to the dexHandler and then calls `removeLiquidity` on the dexHandler. Within the Uniswa...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
true
false
## Low: Unnecessary nested mapping ### Description **Severity**: Low **Status**: Acknowledged **Description** In Contract AFiStorage.sol, the variables aaveTokenCopy, compoundCopy, dTokenCopy are a mapping of type (address => (address => address)). Here, the first key is the aFiBase Contract address, the second ke...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
initialization
true
true
## Medium: payoutPeriodStartTime skips 1 second for payouts ### Description When yield is being distributed via `PayoutManager._initiateInterestPayout`, the deal admin specifies a period end time. The period start time is taken as the last end time + 1 in `payoutPeriodStartTime`. ```solidity function payoutPeriodStar...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
oracle
true
true
## Medium: Lack of maximum opening fee check could cause issues ### Description When new trade is executed and registered, opening fees will be deducted from users collateral. ```solidity function registerTrade(uint256 tradeId, IOstiumTradingStorage.Trade memory trade, uint256 latestPrice) private returns (IOst...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
other
true
false
## Medium: `setTVLLimits` incorrectly assigns `_newMaxTotalDeposits` to `maxPerDeposit` instead of `maxTotalDeposits`. ### Description Current implementation of `setTVLLimits` is incorrectly assigns `_newMaxTotalDeposits` to `maxPerDeposit` instead of `maxTotalDeposits`. ```solidity function setTVLLimits(uint256 _n...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: The consensus protocol uses vulnerable dependencies ### Description The consensus protocol’s implementation depends on a number of crates with known vulnerabilities. By using `cargo-audit`, we identified the following vulnerable dependencies. (All of the identified crates except for `tiny_http` are transitive ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
cross-chain
true
false
## Medium: Layerzero fee refund address is not handled correctly ### Description The protocol aims to integrate with layerzero v2. To leverage layerzero infrastructure to send out cross-chain message, the user has to pay the native fee. If the user underpays the message fee, transaction reverts. If the user overpays t...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
other
false
false
## Low: RESTRICTED MODIFIER IS RECOMMENDED TO BE USED ONLY IN EXTERNAL FUNCTIONS ### Description **Severity**: Low **Status**: Resolved **Description** LendingVault.sol inherits from AccessManaged.sol, which is a library from OpenZeppelin (https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/contract...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
cross-chain
false
false
## Low: | Typo ### Description **Description** The `withelistTokens`, `withelistUsers`, and `withelistUser` functions all have a typo. **Recommendation** Correct them to `whitelistTokens`, `whitelistUsers`, and `whitelistUser`. **Resolution** Bridges Team: - Typos have been corrected.
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
solodit_api
medium
DOS
true
false
Subnets using `permissionMode.collateral` uses staked collateral to determine validators power. Validators can stake and unstake their collateral. When a subnet gets bootstrapped (i.e. reached the `minActivationCollateral` to activate the subnet) validators unstaking requires the request to be recorded which would l...
Code4rena
5
Recall
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
reentrancy
true
false
## Medium: Use of external calls with a fixed amount of gas  Won't Fix ### Description The converter smart contract uses the Solidity transfer() function to transfer Ether. .transfer() and .send() forward exactly 2,300 gas to the recipient. The goal of this hardcoded gas stipend was to prevent reentrancy vulnerabili...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
cyfrin_structured
medium
other
true
false
## Medium: While changing vote delegator from himself to another user, `_delegateBalances` should not be decreased ### Description In `setUserVoteDelegate` function, when a user set vote delegator to himeself, his `_delegateBalances` value doesn't contain his `userBalance` from L149. When he changes vote delegator fro...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
dos
false
false
## Medium: DoS on KeeperGauge due to division by zero ### Description _Submitted by fatherOfBlocks_ In the **\_calcTotalClaimable()** function it should be validated that perPeriodTotalFees\[i] != 0 since otherwise it would generate a DoS in **claimableRewards()** and **claimRewards()**. This would be possible since ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
medium
access-control
false
false
## Medium: Insu�cient protection of sensitive information ### Description Sensitive information such as a mnemonic seed phrase and API keys is stored in process environments and environment files. This method of storage could make it easier for an attacker to compromise the information; compromise of the seed phrase, ...
0
[ { "role": "system", "content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc...
skyward_49k
low
token
true
false
## Low: `ERC20Staker` does not expose locked incentives data ### Description _Resolved_ `ERC20Staker` uses the `_lockedIncentives` set and the `_tokenLockedIncentives` mapping to track locked incentives. In the code, the use of these variables is limited to adding and removing the incentive IDs, so it is expected t...
0