prompt listlengths 2 2 | source stringclasses 3
values | severity stringclasses 5
values | category stringclasses 186
values | has_code bool 2
classes | has_poc bool 2
classes | reference_response stringlengths 23 5k | firm stringclasses 26
values | quality_score float64 0 5 | protocol stringclasses 398
values |
|---|---|---|---|---|---|---|---|---|---|
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | solodit_api | high | Wrong Math | false | true | ## Severity
Critical
## Description
In syncRewards, the rewards are calculated by subtracting the last rewards to the total
yield. This is inaccurate because total yield keeps increasing, and last rewards are just the last amount
rewarded.
This means that over time, rewards will become much more inflated than their ... | Kann | 4 | Mystic Finance |
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: getReservesByCategory() when useSubmodules =true and submoduleReservesSelector=bytes4(0) will revert
### Description
in `getReservesByCategory() `
Lack of check `data.submoduleReservesSelector!=""`
when call `submodule.staticcall(abi.encodeWithSelector(data.submoduleReservesSelector));` will revert
### Im... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | cross-chain | true | false | ## Medium: Processing of initial balances
### Description
The LiFi code bases contain two similar source files: **Swapper.sol** and **SwapperV2.sol**. One of the differences is the processing of `msg.value` for native tokens, see pieces of code below. The implementation of **SwapperV2.sol** sends previously available ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Local authentication bypass
### Description
The manual modification of the `isUnlocked` variable in `chrome.storage` allows bypassing the sidebar's local authentication; however, this behavior does not allow conducting sensitive operations, such as revealing recovery phrases, changing the local password, or ad... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Out-of-bounds access in print_textual
### Description
The function `print_textual` is used to convert a principal ID to a base-32 textual representation. The function verifies that `outValLen` is at least 37 bytes and then calls `pageString` to copy at most 37 bytes of the ID’s textual representation to the ou... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | token | false | false | ## High: Cross-chain smart contract calls can revert but source chain tokens remain burnt and are not refunded
### Description
_Submitted by sseefried, also found by Chom_
Smart contract calls often revert. In such cases any ether sent along with the transaction is returned and sometimes the remaining gas (depending ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | oracle | true | false | ## High: Market coordinator can steal all market collateral by changing adiabatic fees
### Description
Source: https://github.com/sherlock-audit/2024-08-perennial-v2-update-3-judging/issues/27
## Found by
panprog
**Summary**
The README states the following:
> Q: Please list any known issues and explicitly state the... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | true | false | ## Low: UniswapV3Swapper uses wrong allowance check
### Description
Before the `UniswapV3Swapper` can exit a gate, it needs to set an `XPYT` allowance to the gate. The following check determines if an approval needs to be set:
```solidity
if (
args.xPYT.allowance(address(this), address(args.gate)) = previewWithdraw... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: The `operator` can make an approve to the zero address
### Description
- https://github.com/yearn/yETH-bootstrap/blob/2dd219d3af49952275934638e8c9d50d0fef0d8f/contracts/modules/CurveLP.vy#L232
The operator can make an extra approve to the zero address.
### Recommendation
We recommend adding the following che... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: | Storage Modifiers
### Description
**Description**
In `assignNamingCreditsBulk` the `address[] memory user` and `address[] memory numberOfCredits` parameters are never altered and therefore can be declared `calldata`.
**Recommendation**
Declare the variables `calldata`.
**Resolution**
NFTR Team:
- The s... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | true | false | ## Low: Missing check for `validatorMEVRewardsPercentage` in `PolygonStrategy::initialize`
### Description
**Description:** `validatorMEVRewardsPercentage`is a reward percentage with valid values ranging from 0 to 10000 (100%). `PolygonStrategy::setValidatorMEVRewardsPercentage` rightly checks that the reward percenta... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | other | true | false | ## Gas: `internal` functions only called once can be inlined to save gas
### Description
Not inlining costs 20 to 40 gas because of two extra `JUMP` instructions and additional stack operations needed for function calls.
*There are 4 instances of this issue:* | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Swap comment order
### Description
The variable order in the comment do not correspond to that of the implementation. For readability, I recommend that they do. | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | oracle | false | false | ## Low: Missing Input Validation
### Description
**Update**
Marked as "Fixed" by the Venus team. Addressed in: `0c5f140989ee41e6ba0e2d165596d8cac1005686`, `83ceb365ba6ca55997be0e925c0b8ffa755ac626`. The Venus team provided the following explanation:
> Oracle : It could be zero see here https://github.com/VenusProtoco... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Missing Connection Timeout for Contacting Mantle DA
### Description
The implemented connection to Mantle DA is missing a defined timeout option. This might lead to issues when servers accept connections but fail to respond to calls. There are the following occurrences of connections to Mantle DA:
* Connectio... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | reentrancy | false | false | ## High: Incorrect Flashloan Integration
### Description
**Update**
The client fixed the issue in commit `0fd7b45e0e8323a437804bcd9e6d0c373d0d0896` and provided the following explanation:
> Mentioned issues were addressed in this commit, but this only can be considered fixed when VirtualPool is actually tested (not a... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: Unnecessary payable specifier for functions may allow ETH to be sent and locked/lost
### Description
Functions `LSSVMRouter.robustSwapERC20ForSpecificNFTsAndNFTsToToken()` and `LSSVMPair.initialize()` which do not expect to receive and process Ether have the payable specifier. This allows interacting users to ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | false | false | ## Low: Lack of Input Validation in react/src/hooks/useDeposit
### Description
**Severity**: Low
**Status** : Resolved
**Description**:
The function only checks the first element of the amountChanges array for validation. It does not validate the entire array or the erc20Addresses array. This might lead to issues... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | signature | true | false | ## Medium: ABI decoding for bytes: memory can be corrupted by maliciously constructing the calldata
### Description
## Security Analysis Report
## Severity:
**Medium Risk**
## Context:
`ConsiderationDecoder.sol#L51-L62`
## Description:
In the code snippet below, `size` can be made `0` by maliciously crafting the... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Unrestricted maximum value in `coolDownPeriod()`
### Description
Currently the cooldown period is 7 days as per docs. If set maximum values uses can't withdraw their tokes.
https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/Withdraw/WithdrawQueue.sol#L124-L13... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | access-control | true | false | ## High: `SessionKey` Owner Can Impersonate Another Session Key Owner for the Same Smart Wallet
### Description
The Smart Wallet (Etherspot Wallet) can enable multiple sessions at the same time, it can have N count active sessions.
When validating the signature via `CredibleAccountModule::validateUserOp()`, we are ma... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | oracle | false | false | ## Low: Unused Imports: EVMScriptCreator.sol and IValidatorsExitBusOracle.sol
### Description
In `SubmitExitRequestHashesUtils.sol`, the following imports are declared but never used within the library:
```solidity=
import "../libraries/EVMScriptCreator.sol";
import "../interfaces/IValidatorsExitBusOracle.sol";
```
... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | true | false | ## Low: No access control in `initializeVault()` allows unauthorized init
### Description
_Resolved_
The `RestrictedVaultFactory` contract restricts vault creation to the current contract owner. However, it fails to override the `initializeVault()`, which is still accessible to the previous owner who is recorded as t... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | initialization | false | false | ## High: Sellers may lose NFTs when orders are matched with `matchOrders()`
### Description
_Submitted by KIntern, also found by csanuragjain, GimelSec, kenzo, and unforgiven_
Function `matchOrders` uses custom constraints to make the matching more flexible, allow seller/buyer to specify maximum/minimum number of NFT... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | other | true | false | ## Gas: Pack struct variables
### Description
Reordering the structure of the `MarketState` ensures that the struct variables are packed efficiently, minimizing storage costs. | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Floating pragma
### Description
Contracts should be deployed with the same compiler version and flags used during development and testing. Locking the pragma helps to ensure that contracts do not accidentally get deployed using another pragma. For example, an outdated pragma version might introduce bugs that a... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: Lack of incentives for calls to Witch.auction
### Description
Users call the Witch contract’s auction function to start auctions for undercollateralized vaults. To reduce the losses incurred by the protocol, this function should be called as soon as possible after a vault has become undercollateralized. Howeve... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | dos | false | false | ## Medium: Timestamp usage
### Description
[Timestamps used](https://github.com/ether-camp/virtual-accelerator/blob/master/contracts/ProjectKudos.sol#L88-L92) correctly correspond to commented dates.
The code [uses timestamps for contract logic](https://github.com/ether-camp/virtual-accelerator/blob/6665fdd4b7108844... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: Proof Verification DoS via Duplicate Nullifier Account
### Description
## Protection Against Simultaneous Proof Verification
To protect multiple wardens from executing the same proof verification simultaneously (resulting in all but one of the wardens missing out on a fee payout), the verification flow uses a... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | flash-loan | false | false | ## Medium: Supply part of the accrued debt can be stolen
### Description
_Submitted by cmichel_.
The `LendingPair.uniClaimDeposit` function allows the user to "collect fees" and mint new supply shares with the collected amounts.
#### `uniClaimDeposit` does not accrue tokens
However, the current total supply is not ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: spikes after outages may prevent order execution
### Description
Users are required to specify execution fee at order creation. This fee is to reimburse the keeper for executing their order, and is based on a formula that includes the `tx.price` of the keeper when it executes the order.
### Impact
It's ent... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: `maxUnstakeRequests` is not validated when `unstakeRequests` are reused
### Description
The `maxUnstakeRequests` variable helps limit the number of `unstakeRequests` a user can have. This variable is validated in the `requestUnstake()` function in lines `RivusTAO#L607-609`:
The problem is that `maxUnstakeReq... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | signature | false | false | ## Low: Operator AVS Registrations Cannot Be Cancelled
### Description
EigenLayer Operators are able to provide a signature with a corresponding salt and expiry to an AVS in order to link the AVS and Operator. If an operator accidentally provides a signature to the wrong AVS this signature cannot be cancelled, and is ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | access-control | false | false | ## Low: Role Transfer Not Following Two-Step Pattern
### Description
**Update**
Marked as "Acknowledged" by the client. The client provided the following explanation:
That would be handled carefully; we don't want to make any modifications to LayerZero's current code because we inherit LayerZero's and LzApp is exte... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | solodit_api | high | initialization | false | true |
<https://github.com/code-423n4/2022-07-golom/blob/e5efa8f9d6dda92a90b8b2c4902320acf0c26816/contracts/rewards/RewardDistributor.sol#L172-L210><br>
<https://github.com/code-423n4/2022-07-golom/blob/e5efa8f9d6dda92a90b8b2c4902320acf0c26816/contracts/rewards/RewardDistributor.sol#L185><br>
A malicious user can repeatedl... | Code4rena | 5 | Golom |
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | access-control | false | false | ## Medium: MALICIOUS UPLOAD DOCUMENTS FOR KYC PROCESS
### Description
An attacker could upload malicious PDF files within the KYC process. This presents a significant impact as it introduces the risk of unauthorized code execution or the dissemination of malicious content. The presence of these malicious files within ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | overflow | true | false | ## Medium: hasDuplicate runs out of gas when the input list is empty
### Description
The `hasDuplicate` function is incorrectly implemented. The `hasDuplicate` function, which determines if a list of addresses contains duplicates, is shown in Figure 1. Its documentation states that it returns true if it finds duplica... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: | Unequal Royalty Rewards
### Description
**Description**
In the `receive` and `fallback` functions, the rewards distribution to `CYBERs` holders can only occur before the second mint and never after.
**Recommendation**
Ensure this is the expected behavior. If it isn’t, refactor the reward logic to more fai... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | cross-chain | true | false | ## High: TransactionManager - Receiver-side check also on sending side ✓ Unverified Fix
### Description
The functions `prepare`, `cancel`, and `fulfill` in the `TransactionManager` all have a “common part” that is executed on both the sending and the receiving chain and side-specific parts that are only executed eithe... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: Unnecessary assert on immutable variable
### Description
Assertion `address(investmentToken) != address(want)` in `_buyInvestmentTokenWithWant` is not necessary during contract execution
https://github.com/therealmonoloco/maker-dai-delegate/blob/97949a51062df956fd0172b7b1c778f66844b634/contracts/Strategy.sol#... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: Unnecessary `payable` function
### Description
The `DoubleTokenLexscrow` constructor doesn't use `msg.value` so it is unnecessary to mark the function as `payable`: https://github.com/MetaLex-Tech/LeXscrow/blob/94ca277528bb25b8421dc127941c18915144eb29/src/DoubleTokenLexscrow.sol#L238-L248.
### Recommendation
... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Superfluous condition in require statement
### Description
Within the [`_acceptAdmin`](https://github.com/compound-finance/compound-protocol/blob/f86c247f6f81e14f8e0fd78402653a0b8371266a/contracts/Governance/GovernorBravoDelegate.sol#L286) function of the `GovernorBravoDelegate` contract, there is a [`require`... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | access-control | true | false | ## Medium: If the strategy incurs a loss the Active Pool will stop working until the shortfall is paid out entirely
### Description
## Lines of code
https://github.com/code-423n4/2023-02-ethos/blob/73687f32b934c9d697b97745356cdf8a1f264955/Ethos-Core/contracts/ActivePool.sol#L251-L252
## Vulnerability details
- Vau... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | dos | false | false | ## High: Router - handleMetaTxRequest - gas griefing / race conditions / missing validations / free meta transactions
### Description
There’s a comment in `handleMetaTxRequest` that asks whether data needs to be validated before interacting with the contract and the answer is yes, always, or else this opens up a gas g... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | liquidation | true | false | ## High: LienToken payee not reset on transfer
### Description
The `payee` and `ownerOf` functionalities are detached, meaning that owners may set a `payee`, and the owner may transfer the `LienToken` to a new owner without affecting the `payee`. The `payee` does not reset upon transfer.
### Recommendation
Reset `pay... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: No address(0) check
### Description
**Severity**: Low
**Status**: Resolved
**Description**
In Contract PythOracle.sol, the method rescueFunds() does not validate if _receiver is address(0) or not. If accidentally set to address(0), funds would be lost.
In Contract PairInfos.sol, the method initialize(...) ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | other | false | false | ## High: Winner's payout is incorrectly calculated
### Description
**Severity**
**Impact:** High
**Likelihood:** High
**Description**
When a winner wins money, the function incorrectly calculates the payout for the winner, resulting in much more payout for the winner than intended.
When the admin calls `endGame()... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | other | false | false | ## High: Funds may freeze on the `TimeLock` if the beneficiary does not implement `claim()`
### Description
Assets from the `TimeLock` can only be claimed by their respective beneficiaries via calling the `claim` function. However, if the beneficiary is an immutable smart contract with no ability to invoke `claim` aga... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | solodit_api | medium | Rounding | false | true |
[DBR.sol#L287](https://github.com/code-423n4/2022-10-inverse/blob/main/src/DBR.sol#L287)<br>
While a user borrows DOLA, his debt position in the DBR contract accrues more debt over time. However, Solidity contracts cannot update their storage automatically over time; state updates must always be triggered by external... | Code4rena | 4 | Inverse Finance |
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | cyfrin_structured | low | token | true | false | ## Low: Use named imports
### Description
The contracts mostly use named imports but strangely some import statements don't; use named imports everywhere:
`MTokenMessager`:
```solidity
import "./interfaces/ICCIPClient.sol";
```
`MTokenMessagerLZ`:
```solidity
import "./MTokenMessagerBase.sol";
import "./interfaces/I... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | signature | true | false | ## Low: Possible Index Out Of Bounds Error During Loop Iteration
### Description
The `atomicVerifyAndMatch()` function iterates over the three arrays `actions`, `signatures`, and `atomicActionData` reading from each index. However, there is no check to ensure that all three arrays are the same length. This could lead ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: No security patching process
### Description
There's no process in place to automatically update the OS packages regarding security patches.
### Recommendation
This is OS dependent. For Amazon Linux, it can be something like running `yum update --security` periodically. | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | liquidation | true | true | ## Low: Validation of system invariants is error prone
### Description
The architecture of the f(x) protocol is interleaved, and its interactions are complex. The interdependencies of the components are not managed well, and validations are distributed in disparate components rather than maintaining logical separation... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | cross-chain | false | false | ## Low: `propose()` Returns an Incorrect `proposalId`
### Description
**Update**
Marked as "Fixed" by the client. Addressed in: `112ef70805d4eb6ea323168f879e688f2e7d52da`. The client provided the following explanation:
> Modify according to recommendations.
**File(s) affected:**`Layer2Bridge.sol`
**Description:** T... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | solodit_api | high | Vault | false | false | Source: https://github.com/sherlock-audit/2022-11-sense-judging/issues/22
## Found by
0x52
## Summary
AutoRoller#eject collects all the current yield of the YTs, combines the users share of the PTs and YTs then sends the user the entire target balance of the contract. The problem is that combine claims the yield f... | Sherlock | 5 | Sense |
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | oracle | true | true | ## High: Pool weight calculation in computepoolweights /computepoolweight always return wrong an- swer because totalusdvalue returns 0
### Description
When calculating the pool's weight, it first gets the pool's `underlyingToken` by calling `Price-Feed.getUSDPrice`:
```solidity
function getUSDPrice(address token) pub... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | solodit_api | medium | Needless receive() | false | false |
[HolographERC721.sol#L962](https://github.com/code-423n4/2022-10-holograph/blob/f8c2eae866280a1acfdc8a8352401ed031be1373/contracts/enforcer/HolographERC721.sol#L962)<br>
HolographERC721.sol is an enforcer of the ERC721 standard. In its fallback function, it calls the actual implementation in order to handle additiona... | Code4rena | 4 | Holograph |
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: Increase consistency in string comparison using EqualFold
### Description
More consistency in string comparison.
### Recommendation
Use `strings.EqualFold` to be more consistent across the code base, like in `IsApprovedByUser()` (mfa.go#L12):
```go
func IsAllowedToApprove(mfaReq *cubistv0.MfaRequestInfo, use... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | overflow | false | false | ## Medium: Incorrect implementation of `RRUtils.serialNumberGte`
### Description
[RRUtils.sol#L266-L268](https://github.com/code-423n4/2022-07-ens/blob/main/contracts/dnssec-oracle/RRUtils.sol#L266-L268)
Comparing serial numbers should follow RFC1982 due to the possibility of numbers wrapping around. `RRUtils.serialN... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | access-control | true | false | ## Medium: Tier Removal in `setRarityWeights()` Can Invalidate Active Stakes
### Description
The `setRarityWeights()` function allows the contract owner to update the `rarityWeights` array. However, the function contains a critical flaw: it does not check whether the new, shorter array is removing rarity tiers that cu... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | false | false | ## Medium: Master Encryption Key Derived Solely From Device `RNG` Weakens Wallet Security
### Description
**Update**
Marked as "Unresolved" by the client. The client provided the following explanation:
> We can still introduce some auto-generated user entropy, but would like to otherwise remove it from the scope of t... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | rounding | true | false | ## High: ReseedSilo doesn't update total balances of Stalk and Roots
### Description
ReseedSilo is used to migrate Silo deposits owned by EOA. It writes Stalk associated with migrated deposits and misses to write Roots (but that's another issue submitted in another report). However it doesn't update total supply
### ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Using function without any logic
### Description
At `Voting.sol` using empty useless function at
https://github.com/lidofinance/aragon-apps/blob/8c46da8704d0011c42ece2896dbf4aeee069b84a/apps/voting/contracts/Voting.sol#L191.
### Recommendation
It is recommended to comment it or delete. | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | liquidation | false | false | ## Low: Avoid Precision Loss
### Description
## Handle Redistribution in the Bucket Module
The `handle_redistribution` in the bucket module handles the collateral and debt redistribution to the users. The calculation of the remaining collateral after taking out the fee and rebate amount is improper, giving less preci... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | other | true | false | ## High: compress right after convert can bypass completeness checks
### Description
In the recursion pipeline of pico, multiple recursion circuits are whitelisted, and the typical recursion pipeline goes like this:
1. riscv proof (leaf) -> A single precompile, memory, or execution chunk is proven
2. convert -> Leaf ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | token | true | true | ## High: Potential issues that can arise from BGT being reward token
### Description
The expected reward token gotten from staking on berachain is potentially the Bera Governance Token, BGT.
```solidity
/// @notice ERC20 token in which rewards are denominated and distributed.
/// Typically the BGT(i.e. Berachain... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | cross-chain | true | false | ## Gas: Optimize away `nativeMappingValue` variable in `TokenBridge::completeBridging`
### Description
**Description:** Optimize away `nativeMappingValue` variable in `TokenBridge::completeBridging` by for example:
**Linea:**
Acknowledged; will be part of a future release. | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | gas | initialization | true | false | ## Gas: Multiple accesses of a mapping/array should use a storage pointer
### Description
Caching a mapping’s value in a storage pointer when the value is accessed multiple times saves ~40 gas per access due to not having to perform the same offset calculation every time. Help the Optimizer by saving a storage variabl... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | front-running | false | false | ## Low: Missing Slippage Protection for Direct Zapping
### Description
The `LiquidityZap` contract implements the [`zapETH`](https://github.com/radiant-capital/v2-core/blob/e8f21f103e17736907b62809d1ad902febc53714/contracts/radiant/zap/helpers/LiquidityZap.sol#L101-L104) and [`addLiquidityETHOnly`](https://github.com/... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | cyfrin_structured | low | other | true | false | ## Low: Consolidate `SCALE_FACTOR` used in two contracts into one shared constant
### Description
Consolidate `SCALE_FACTOR` used in two contracts into one shared constant:
```solidity
contracts/core/StabilityPool.sol
30: uint256 public constant SCALE_FACTOR = 1e9;
contracts/dao/BoostCalculator.sol
59: uint256 ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | overflow | true | false | ## Low: Code Clarity
### Description
## Code Review Summary
## Issues Identified
1. In the `quote` module, `amount_out_net`, `amount_out_net_of_protocol_fees`, `output_fee_rate`, and `amount_out_net_of_pool_fees` perform subtraction on `amount_out` by the respective fees (`protocol_fees` and `pool_fees`). However, t... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | oracle | false | false | ## Low: Unable to Resubmit Report Until Next Frame
### Description
**Update**
The team acknowledged the issue and stated that they will add it to the backlog and prioritize it appropriately in the future.
**File(s) affected:**`oracle/report.go`, `oracle/tx.go`
**Description:** The `report.go:shouldReport()` function... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | cyfrin_structured | low | access-control | true | false | ## Low: Missing `address(0)` check in `setDistributor`
### Description
The `StakingVault::setDistributor` function allows administrators to grant or revoke the DISTRIBUTOR_ROLE to specified accounts, but it lacks validation to prevent assigning this critical role to the zero address (address(0)). While this doesn't cr... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: `BabelVault::registerReceiver` should check `bool` return when calling `IEmissionReceiver::notifyRegisteredId`
### Description
**Description:** `BabelVault::registerReceiver` should check `bool` return when calling `IEmissionReceiver::notifyRegisteredId` since this call is intended as a sanity check to ensure ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | liquidation | false | false | ## Low: Events not indexed
### Description
## Email address
mail@cmichel.io
## Handle
@cmichelio
## Eth address
0x6823636c2462cfdcD8d33fE53fBCD0EdbE2752ad
## Vulnerability details
The `CrossDeposit`, `CrossTrade`, `CrossWithdraw`, `CrossBorrow`, `CrossOvercollateralizedBorrow` events in `MarginRouter` are no... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | initialization | false | false | ## Medium: Missing zero address checks
### Description
**Severity**: Medium
**Status**: Resolved
**Location**: LiquidityFreeLaunch.sol and LiquidityFreeLaunchFactory.sol
**Description**:
In `LiquidityFreeLaunch.sol`, there is missing zero address check for token and `zapTreasury`. If set once, they cannot be chang... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Empty strategies can be created due to missing zero length check
### Description
**Description:** `StrategyBuilderPlugin.createStrategy()` does not currently revert if the `steps` array length is zero. This means strategies can be created that can never be deleted, per the `strategyExist` modifier logic that i... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | true | false | ## Low: Missing Input Validation
### Description
During the security assessment, several functions in the smart contracts were found to lack adequate input validation. Without proper checks, critical parameters may be set to invalid, undesired, or unrealistic values, which could lead to vulnerabilities, unexpected beh... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | access-control | true | false | ## High: tbtc - Anyone can emit log events due to missing access control ✓ Addressed
### Description
Access control for `DepositLog` is not implemented. `DepositLog` is inherited by `TBTCSystem` and its functionality is usually consumed by `Deposit` contracts to emit log events on `TBTCSystem`. Due to the missing acce... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Emissions added before first voting epoch period remain unallocated
### Description
_Acknowledged_
The `Voter.notifyRewardAmount()` function allows anyone to donate `KITTEN` tokens to be distributed across gauges proportionally to their vote share for the current period. This same function is also used by `Mi... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | high | oracle | false | false | ## High: `totalLiquidityWeight` Is Updated When Adding New Token Pairs Which Skews Price Data For `getVaderPrice` and `getUSDVPrice`
### Description
_Submitted by leastwood_
The `_addVaderPair` function is called by the `onlyOwner` role. The relevant data in the `twapData` mapping is set by querying the respective li... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | initialization | false | false | ## Low: Checks improvements on l2 tokens in the initGateways
### Description
During the deployment phase, various checks are performed for the soon-to-be registered tokens on L1/L2 gateways:
- `cfg.l1Tokens.length == cfg.l2Tokens.length`: Length must match.
- Both L1/L2 tokens at position `i` in the array must not be... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | liquidation | false | false | ## Medium: maintainer can be pushed out
### Description
The function liquidate (in both `CrossMarginLiquidation.sol` and `IsolatedMarginLiquidation.sol`) can be called by everyone. If an attacker calls this repeatedly then the maintainer will be punished and eventually be reported as maintainerIsFailing
And then the a... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | access-control | false | false | ## Medium: Privileged Roles and Ownership
### Description
**Update**
The team documented the roles and privileges in user-facing documentation.
* Relayer role : https://docs.pheasant.network/contracts/technical-details#update-functions
* Owner role: https://docs.pheasant.network/contracts/technical-details#owner
*... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | solodit_api | medium | Access Control | true | true |
<https://github.com/code-423n4/2022-11-stakehouse/blob/a0558ed7b12e1ace1fe5c07970c7fc07eb00eebd/contracts/liquid-staking/LiquidStakingManager.sol#L882><br>
<https://github.com/code-423n4/2022-11-stakehouse/blob/23c3cf65975cada7fd2255a141b359a6b31c2f9c/contracts/syndicate/Syndicate.sol#L22>
`LiquidStakingManager._auto... | Code4rena | 4 | Stakehouse Protocol |
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: Bonding.sol _unbondAndBreak does not account for edge case where no tokens are returned
### Description
_Submitted by harleythedog_
In Bonding.sol, the internal function `_unbondAndBreak` transfers a user's stake tokens to the dexHandler and then calls `removeLiquidity` on the dexHandler. Within the Uniswa... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | true | false | ## Low: Unnecessary nested mapping
### Description
**Severity**: Low
**Status**: Acknowledged
**Description**
In Contract AFiStorage.sol, the variables aaveTokenCopy, compoundCopy, dTokenCopy are a mapping of type (address => (address => address)).
Here, the first key is the aFiBase Contract address, the second ke... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | initialization | true | true | ## Medium: payoutPeriodStartTime skips 1 second for payouts
### Description
When yield is being distributed via `PayoutManager._initiateInterestPayout`, the deal admin specifies a period end time. The period start time is taken as the last end time + 1 in `payoutPeriodStartTime`.
```solidity
function payoutPeriodStar... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | oracle | true | true | ## Medium: Lack of maximum opening fee check could cause issues
### Description
When new trade is executed and registered, opening fees will be deducted from users collateral.
```solidity
function registerTrade(uint256 tradeId, IOstiumTradingStorage.Trade memory trade, uint256 latestPrice)
private
returns (IOst... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | other | true | false | ## Medium: `setTVLLimits` incorrectly assigns `_newMaxTotalDeposits` to `maxPerDeposit` instead of `maxTotalDeposits`.
### Description
Current implementation of `setTVLLimits` is incorrectly assigns `_newMaxTotalDeposits` to `maxPerDeposit` instead of `maxTotalDeposits`.
```solidity
function setTVLLimits(uint256 _n... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: The consensus protocol uses vulnerable dependencies
### Description
The consensus protocol’s implementation depends on a number of crates with known vulnerabilities. By using `cargo-audit`, we identified the following vulnerable dependencies. (All of the identified crates except for `tiny_http` are transitive ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | cross-chain | true | false | ## Medium: Layerzero fee refund address is not handled correctly
### Description
The protocol aims to integrate with layerzero v2. To leverage layerzero infrastructure to send out cross-chain message, the user has to pay the native fee. If the user underpays the message fee, transaction reverts. If the user overpays t... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | other | false | false | ## Low: RESTRICTED MODIFIER IS RECOMMENDED TO BE USED ONLY IN EXTERNAL FUNCTIONS
### Description
**Severity**: Low
**Status**: Resolved
**Description**
LendingVault.sol inherits from AccessManaged.sol, which is a library from OpenZeppelin (https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/contract... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | cross-chain | false | false | ## Low: | Typo
### Description
**Description**
The `withelistTokens`, `withelistUsers`, and `withelistUser` functions all have a typo.
**Recommendation**
Correct them to `whitelistTokens`, `whitelistUsers`, and `whitelistUser`.
**Resolution**
Bridges Team:
- Typos have been corrected. | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | solodit_api | medium | DOS | true | false |
Subnets using `permissionMode.collateral` uses staked collateral to determine validators power. Validators can stake and unstake their collateral.
When a subnet gets bootstrapped (i.e. reached the `minActivationCollateral` to activate the subnet) validators unstaking requires the request to be recorded which would l... | Code4rena | 5 | Recall |
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | reentrancy | true | false | ## Medium: Use of external calls with a fixed amount of gas Won't Fix
### Description
The converter smart contract uses the Solidity transfer() function to transfer Ether.
.transfer() and .send() forward exactly 2,300 gas to the recipient. The goal of this hardcoded gas stipend was to prevent reentrancy vulnerabili... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | cyfrin_structured | medium | other | true | false | ## Medium: While changing vote delegator from himself to another user, `_delegateBalances` should not be decreased
### Description
In `setUserVoteDelegate` function, when a user set vote delegator to himeself, his `_delegateBalances` value doesn't contain his `userBalance` from L149.
When he changes vote delegator fro... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | dos | false | false | ## Medium: DoS on KeeperGauge due to division by zero
### Description
_Submitted by fatherOfBlocks_
In the **\_calcTotalClaimable()** function it should be validated that perPeriodTotalFees\[i] != 0 since otherwise it would generate a DoS in **claimableRewards()** and **claimRewards()**.
This would be possible since ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | medium | access-control | false | false | ## Medium: Insu�cient protection of sensitive information
### Description
Sensitive information such as a mnemonic seed phrase and API keys is stored in process environments and environment files. This method of storage could make it easier for an attacker to compromise the information; compromise of the seed phrase, ... | 0 | ||
[
{
"role": "system",
"content": "You are an expert smart contract security auditor. Analyze the provided Solidity code for vulnerabilities.\n\nFor each finding, output a structured block:\nFINDING | contract: <name> | function: <name> | bug_class: <CWE/category> | confidence: <0-100>\n\nThen provide:\n- desc... | skyward_49k | low | token | true | false | ## Low: `ERC20Staker` does not expose locked incentives data
### Description
_Resolved_
`ERC20Staker` uses the `_lockedIncentives` set and the `_tokenLockedIncentives` mapping to track locked incentives.
In the code, the use of these variables is limited to adding and removing the incentive IDs, so it is expected t... | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.