Search is not available for this dataset
repo stringlengths 2 152 ⌀ | file stringlengths 15 239 | code stringlengths 0 58.4M | file_length int64 0 58.4M | avg_line_length float64 0 1.81M | max_line_length int64 0 12.7M | extension_type stringclasses 364
values |
|---|---|---|---|---|---|---|
smartbugs | smartbugs-master/tools/all/config.yaml | alias:
- confuzzius
- conkas
- ethainter
- ethor
- honeybadger
- maian
- madmax
- manticore
- mythril
- osiris
- oyente
- pakala
- securify
- sfuzz
- slither
- smartcheck
- solhint
- teether
- vandal
| 276 | 12.190476 | 17 | yaml |
smartbugs | smartbugs-master/tools/confuzzius/config.yaml | name: ConFuzzius
info: A data dependency-aware hybrid fuzzer for Ethereum smart contracts
origin: https://github.com/christoftorres/ConFuzzius
version: "#4315fb7 v0.0.1"
image: smartbugs/confuzzius:4315fb7
solidity:
command: "'$BIN/do_solidity.sh' '$FILENAME' '$TIMEOUT' '$BIN' '$MAIN'"
output: /root/results.j... | 355 | 28.666667 | 75 | yaml |
smartbugs | smartbugs-master/tools/confuzzius/findings.yaml | Arbitrary Memory Access:
classification: SWC-124, DASP-2
Assertion Failure:
classification: SWC-110, DASP-10
Block Dependency:
classification: SWC-120, DASP-6
Integer Overflow:
classification: SWC-101, DASP-3
Leaking Ether:
classification: SWC-105, DASP-2
Locking Ether:
classification: SWC-997, ... | 618 | 25.913043 | 36 | yaml |
smartbugs | smartbugs-master/tools/confuzzius/parser.py | import io
import json
import tarfile
import sb.parse_utils
VERSION = "2022/12/31"
FINDINGS = {
"Arbitrary Memory Access",
"Assertion Failure",
"Block Dependency",
"Integer Overflow",
"Leaking Ether",
"Locking Ether",
"Reentrancy",
"Transaction Order Dependency",
"Unhandled Exceptio... | 2,165 | 31.818182 | 126 | py |
smartbugs | smartbugs-master/tools/confuzzius/scripts/do_solidity.sh | #!/bin/sh
FILENAME="$1"
TIMEOUT="$2"
BIN="$3"
MAIN="$4"
export PATH="$BIN:$PATH"
chmod +x "$BIN/solc"
CONTRACT="${FILENAME%.sol}"
CONTRACT="${CONTRACT##*/}"
CONTRACTS=$(python3 "$BIN"/printContractNames.py "$FILENAME")
COUNT=$(echo $CONTRACTS | wc -w)
[ "$COUNT" -gt 0 ] || COUNT=1
OPT_CONTRACT=""
if [ "$MAIN" -eq 1... | 865 | 22.405405 | 118 | sh |
smartbugs | smartbugs-master/tools/confuzzius/scripts/printContractNames.py | import sys, json
from subprocess import PIPE, Popen
filename = sys.argv[1]
cmd = ["solc", "--standard-json", "--allow-paths", ".,/"]
settings = {
"optimizer": {"enabled": False},
"outputSelection": {
"*": {
"*": [ "evm.deployedBytecode" ],
}
},
}
input_json = json.dumps(
{
... | 915 | 25.941176 | 69 | py |
smartbugs | smartbugs-master/tools/conkas/config.yaml | name: Conkas
origin: https://github.com/smartbugs/conkas
version: "#4e0f256"
info: Conkas analyzes Ethereum smart contracts to find potential security issues. It uses Rattle to lift the bytecode to an intermediate representation and then applies symbolic execution.
image: smartbugs/conkas:4e0f256
bin: scripts
solidity:... | 462 | 37.583333 | 188 | yaml |
smartbugs | smartbugs-master/tools/conkas/findings.yaml | Integer Overflow:
classification: SWC-101, DASP-3
Integer Underflow:
classification: SWC-101, DASP-3
Reentrancy:
classification: SWC-107, DASP-1
Time Manipulation:
classification: SWC-116, DASP-8
Transaction Ordering Dependence:
classification: SWC-114, DASP-7
Unchecked Low Level Call:
classific... | 343 | 25.461538 | 35 | yaml |
smartbugs | smartbugs-master/tools/conkas/parser.py | import re
import sb.parse_utils
VERSION = "2022/11/11"
FINDINGS = {
"Integer Overflow",
"Integer Underflow",
"Reentrancy",
"Time Manipulation",
"Transaction Ordering Dependence",
"Unchecked Low Level Call"
}
ERRORS = (
re.compile("([A-Z0-9]+ instruction needs return value)"),
re.compi... | 2,635 | 37.202899 | 118 | py |
smartbugs | smartbugs-master/tools/conkas/scripts/do_runtime.sh | #!/bin/sh
FILENAME="$1"
cd /conkas
python3 conkas.py -fav "$FILENAME"
| 72 | 9.428571 | 34 | sh |
smartbugs | smartbugs-master/tools/conkas/scripts/do_solidity.sh | #!/bin/sh
FILENAME="$1"
BIN="$2"
MAIN="$3"
export PATH="$BIN:$PATH"
chmod +x $BIN/solc
CONTRACT="${FILENAME%.sol}"
CONTRACT="${CONTRACT##*/}"
CONTRACTS=$(python3 "$BIN"/printContractNames.py "$FILENAME")
OPT_CONTRACT=""
if [ "$MAIN" -eq 1 ]; then
if (echo "$CONTRACTS" | grep -q "$CONTRACT"); then
OPT_CO... | 509 | 18.615385 | 61 | sh |
smartbugs | smartbugs-master/tools/conkas/scripts/printContractNames.py | import sys, json
from subprocess import PIPE, Popen
filename = sys.argv[1]
cmd = ["solc", "--standard-json", "--allow-paths", ".,/"]
settings = {
"optimizer": {"enabled": False},
"outputSelection": {
"*": {
"*": [ "evm.deployedBytecode" ],
}
},
}
input_json = json.dumps(
{
... | 915 | 25.941176 | 69 | py |
smartbugs | smartbugs-master/tools/ethainter/config.yaml | name: Ethainter
origin: https://zenodo.org/record/3760403
info: "Ethainter is a smart contract security analyzer for composite vulnerabilities. See the paper (Brent et al.: Ethainter: A Smart Contract Security Analyzer for Composite Vulnerabilities; In 41st ACM SIGPLAN Conference on Programming Language Design and Impl... | 528 | 57.777778 | 281 | yaml |
smartbugs | smartbugs-master/tools/ethainter/findings.yaml | AccessibleSelfdestruct:
classification: SWC-106, DASP-2
TaintedDelegatecall:
classification: SWC-112, DASP-10
TaintedOwnerVariable:
classification: SWC-124, DASP-2
TaintedSelfdestruct:
classification: SWC-105, DASP-2
TaintedStoreIndex:
classification: SWC-124, DASP-2
TaintedValueSend:
classifica... | 405 | 26.066667 | 36 | yaml |
smartbugs | smartbugs-master/tools/ethainter/parser.py | import tools.gigahorse.parser as gigahorse
VERSION = gigahorse.VERSION
FINDINGS = {
"TaintedStoreIndex",
"TaintedSelfdestruct",
"TaintedValueSend",
"UncheckedTaintedStaticcall",
"AccessibleSelfdestruct",
"TaintedDelegatecall",
"TaintedOwnerVariable"
}
def parse(exit_code, log, output):
... | 379 | 21.352941 | 60 | py |
smartbugs | smartbugs-master/tools/ethainter/docker/scripts/run.sh | #!/bin/sh
FILENAME="$1"
./analyze.py --reuse_datalog_bin --restart --rerun_clients -d /data -C ../../ethainter-inlined.dl
| 124 | 19.833333 | 97 | sh |
smartbugs | smartbugs-master/tools/ethainter/scripts/do_runtime.sh | #!/bin/sh
FILENAME="$1"
TIMEOUT="$2"
SB=$(dirname "$FILENAME")
OPT_TIMEOUT=""
if [ "$TIMEOUT" -ge 170 ]; then
# reserve 50s for Ethainter to finish after timeout
TO=$((TIMEOUT-50))
OPT_TIMEOUT="-T $TO"
fi
cd /home/reviewer/gigahorse-toolchain/logic
./analyze.py --reuse_datalog_bin --restart --rerun_clien... | 375 | 22.5 | 110 | sh |
smartbugs | smartbugs-master/tools/ethor/config.yaml | name: eThor
origin: https://secpriv.wien/ethor
version: "2021 (CCS 2020)"
info: eThor is a sound static analyzer for EVM smart contracts based on HoRSt.
runtime:
image: smartbugs/ethor:rmvi20q
command: "ethor-with-reconstruction '$FILENAME' --prune-strategy=aggressive --predicate-inlining-strategy=linear --prea... | 329 | 40.25 | 131 | yaml |
smartbugs | smartbugs-master/tools/ethor/findings.yaml | insecure:
classification: SWC-107, DASP-1
secure:
classification: SWC-0, DASP-10
| 89 | 17 | 35 | yaml |
smartbugs | smartbugs-master/tools/ethor/parser.py | import re
import sb.parse_utils
VERSION = "2022/11/11"
FINDINGS = ("secure", "insecure")
UNKNOWN_BYTECODE = "Encountered an unknown bytecode"
FAILS = (
re.compile("OpenJDK.* failed; error='([^']+)'"),
re.compile("(Floating-point arithmetic exception) signal in rule"),
re.compile(".*(Undefined relation [... | 1,864 | 31.155172 | 87 | py |
smartbugs | smartbugs-master/tools/ethor/docker/README.md | The docker container created by these files bundles the version of eThor used for the experiments published in CCS.
## Build
```
nix-build dockertools.nix
```
(if you know how to use docker but don't have nix-build installed, the easiest way _might be_ to get a NixOS docker image and call `nix-build` within)
After ... | 2,598 | 38.378788 | 264 | md |
smartbugs | smartbugs-master/tools/gigahorse/parser.py | import io, json, tarfile
import sb.parse_utils
VERSION = "2022/11/17"
def parse(exit_code, log, output, FINDINGS):
findings, infos = [], set()
errors, fails = sb.parse_utils.errors_fails(exit_code, log)
if "Writing results to results.json" not in log:
infos.add("analysis incomplete")
if n... | 1,926 | 32.807018 | 80 | py |
smartbugs | smartbugs-master/tools/honeybadger/config.yaml | name: HoneyBadger
version: "#ff30c9a"
info: An analysis tool to detect honeypots in Ethereum smart contracts
origin: https://github.com/christoftorres/HoneyBadger
image: smartbugs/honeybadger:ff30c9a
bin: scripts
solidity:
entrypoint: "'$BIN/do_solidity.sh' '$FILENAME' '$TIMEOUT' '$BIN' '$MAIN'"
solc: yes
runti... | 386 | 31.25 | 77 | yaml |
smartbugs | smartbugs-master/tools/honeybadger/findings.yaml | Balance disorder:
classification: SWC-0, DASP-10
Hidden state update:
classification: SWC-0, DASP-10
Hidden transfer:
classification: SWC-0, DASP-10
Inheritance disorder:
classification: SWC-0, DASP-10
Money flow:
classification: SWC-0, DASP-10
Skip empty string:
classification: SWC-0, DASP-10
S... | 481 | 24.368421 | 34 | yaml |
smartbugs | smartbugs-master/tools/honeybadger/parser.py | import tools.oyente.parser as oyente
VERSION = oyente.VERSION
FINDINGS = {
"Money flow",
"Balance disorder",
"Hidden transfer",
"Inheritance disorder",
"Uninitialised struct",
"Type overflow",
"Skip empty string",
"Hidden state update",
"Straw ma... | 418 | 21.052632 | 47 | py |
smartbugs | smartbugs-master/tools/honeybadger/scripts/do_runtime.sh | #!/bin/sh
FILENAME="$1"
TIMEOUT="$2"
OPT_TIMEOUT=""
if [ "$TIMEOUT" -gt 0 ]; then
# TO = TIMEOUT * 80%
# the remaining 20% are for honeybadger to finish
TO=$(( (TIMEOUT*8+9)/10 ))
OPT_TIMEOUT="-glt $TO"
fi
python honeybadger/honeybadger.py $OPT_TIMEOUT -b -s "$FILENAME"
| 290 | 18.4 | 64 | sh |
smartbugs | smartbugs-master/tools/honeybadger/scripts/do_solidity.sh | #!/bin/sh
FILENAME="$1"
TIMEOUT="$2"
BIN="$3"
MAIN="$4"
export PATH="$BIN:$PATH"
chmod +x "$BIN/solc"
CONTRACT="${FILENAME%.sol}"
CONTRACT="${CONTRACT##*/}"
CONTRACTS=$(python3 "$BIN"/printContractNames.py "$FILENAME")
OPT_CONTRACT=""
if [ "$MAIN" -eq 1 ]; then
if (echo "$CONTRACTS" | grep -q "$CONTRACT"); then... | 723 | 20.294118 | 75 | sh |
smartbugs | smartbugs-master/tools/honeybadger/scripts/printContractNames.py | import sys, json
from subprocess import PIPE, Popen
filename = sys.argv[1]
cmd = ["solc", "--standard-json", "--allow-paths", ".,/"]
settings = {
"optimizer": {"enabled": False},
"outputSelection": {
"*": {
"*": [ "evm.deployedBytecode" ],
}
},
}
input_json = json.dumps(
{
... | 915 | 25.941176 | 69 | py |
smartbugs | smartbugs-master/tools/madmax/config.yaml | name: MadMax
origin: https://github.com/nevillegrech/MadMax
version: "#6e9a6e9"
info: Madmax consists of a series of analyses and queries that find gas-focused vulnerabilities in Ethereum smart contracts.
image: smartbugs/madmax:6e9a6e9
runtime:
entrypoint: "'$BIN/do_runtime.sh' '$FILENAME' '$TIMEOUT'"
bin: scr... | 358 | 34.9 | 124 | yaml |
smartbugs | smartbugs-master/tools/madmax/findings.yaml | OverflowLoopIterator:
classification: SWC-101, DASP-3
UnboundedMassOp:
classification: SWC-128, DASP-5
WalletGriefing:
classification: SWC-113, DASP-5
| 163 | 22.428571 | 35 | yaml |
smartbugs | smartbugs-master/tools/madmax/parser.py | import tools.gigahorse.parser as gigahorse
VERSION = gigahorse.VERSION
FINDINGS = {
"OverflowLoopIterator",
"UnboundedMassOp",
"WalletGriefing"
}
def parse(exit_code, log, output):
return gigahorse.parse(exit_code, log, output, FINDINGS)
| 257 | 18.846154 | 60 | py |
smartbugs | smartbugs-master/tools/madmax/docker/scripts/run.sh | #!/bin/sh
FILENAME=$1
CODE=$(cat ${FILENAME})
python3 gigahorse-toolchain/gigahorse.py --reuse_datalog_bin --rerun_clients --restart -C madmax.dl ${FILENAME}
| 160 | 22 | 111 | sh |
smartbugs | smartbugs-master/tools/madmax/scripts/do_runtime.sh | #!/bin/sh
FILENAME="$1"
TIMEOUT="$2"
OPT_TIMEOUT=""
if [ "$TIMEOUT" -ge 170 ]; then
# reserve 50s for MaxMax to finish after timeout
TO=$((TIMEOUT-50))
OPT_TIMEOUT="-T $TO"
fi
cd /MadMax
python3 gigahorse-toolchain/gigahorse.py --reuse_datalog_bin --rerun_clients --restart $OPT_TIMEOUT -C madmax.dl "${FI... | 329 | 21 | 126 | sh |
smartbugs | smartbugs-master/tools/maian/config.yaml | name: Maian
origin: https://github.com/smartbugs/MAIAN
info: Maian is a tool for the automated detection of buggy Ethereum smart contracts of type 'prodigal', 'suicidal', and 'greedy'.
image: smartbugs/maian:solc5.10
version: '#4bab09a'
bin: scripts
solidity:
entrypoint: "'$BIN/do_solidity.sh' '$FILENAME' '$BIN' '$... | 463 | 32.142857 | 129 | yaml |
smartbugs | smartbugs-master/tools/maian/findings.yaml | Destructible:
classification: SWC-106, DASP-2
Destructible (verified):
classification: SWC-106, DASP-2
Ether leak:
classification: SWC-105, DASP-2
Ether leak (verified):
classification: SWC-105, DASP-2
Ether lock:
classification: SWC-997, DASP-5
Ether lock (Ether accepted without send):
classifi... | 542 | 27.578947 | 41 | yaml |
smartbugs | smartbugs-master/tools/maian/parser.py | import sb.parse_utils
import re
VERSION = "2022/11/11"
FINDINGS = (
"No Ether leak (no send)",
"Ether leak",
"Ether leak (verified)",
# "Accepts Ether",
"No Ether lock (Ether refused)",
"Ether lock (Ether accepted without send)",
"Ether lock",
"Not destructible (no self-destruct)",
... | 5,852 | 36.76129 | 126 | py |
smartbugs | smartbugs-master/tools/maian/docker/scripts/printContractNames.py | import sys
import pprint
from solidity_parser import parser
sourceUnit = parser.parse_file(sys.argv[1])
#pprint.pprint(sourceUnit)
sourceUnitObject = parser.objectify(sourceUnit)
# access imports, contracts, functions, ... (see outline example in
# __main__.py)
sourceUnitObject.imports # []
sourceUnitObject.pragm... | 410 | 23.176471 | 68 | py |
smartbugs | smartbugs-master/tools/maian/docker/scripts/runMAIANall.sh | #!/bin/sh
FILENAME=$1
for c in `python3 printContractNames.py ${FILENAME} | grep -v "ANTLR runtime and generated code versions disagree:"`;
do
cd /MAIAN/tool;
python3 maian.py -c 0 -s ${FILENAME} ${c};
python3 maian.py -c 1 -s ${FILENAME} ${c};
python3 maian.py -c 2 -s ${FILENAME} $... | 329 | 26.5 | 118 | sh |
smartbugs | smartbugs-master/tools/maian/docker/scripts/run_maian_bytecode.sh | #!/bin/sh
FILENAME=$1
cd /MAIAN/tool
python3 maian.py -c 0 -b ${FILENAME}
python3 maian.py -c 1 -b ${FILENAME}
python3 maian.py -c 2 -b ${FILENAME}
| 150 | 15.777778 | 36 | sh |
smartbugs | smartbugs-master/tools/maian/docker/scripts/run_maian_solidity.sh | #!/bin/sh
FILENAME=$1
for c in `python3 printContractNames.py ${FILENAME} | grep -v "ANTLR runtime and generated code versions disagree:"`;
do
cd /MAIAN/tool;
python3 maian.py -c 0 -s ${FILENAME} ${c};
python3 maian.py -c 1 -s ${FILENAME} ${c};
python3 maian.py -c 2 -s ${FILENAME} $... | 329 | 26.5 | 118 | sh |
smartbugs | smartbugs-master/tools/maian/scripts/do_bytecode.sh | #!/bin/sh
FILENAME="$1"
cd /MAIAN/tool
python3 maian.py -c 0 -bs "$FILENAME"
python3 maian.py -c 1 -bs "$FILENAME"
python3 maian.py -c 2 -bs "$FILENAME"
| 155 | 16.333333 | 37 | sh |
smartbugs | smartbugs-master/tools/maian/scripts/do_runtime.sh | #!/bin/sh
FILENAME="$1"
cd /MAIAN/tool
python3 maian.py -c 0 -b "$FILENAME"
python3 maian.py -c 1 -b "$FILENAME"
python3 maian.py -c 2 -b "$FILENAME"
| 152 | 16 | 36 | sh |
smartbugs | smartbugs-master/tools/maian/scripts/do_solidity.sh | #!/bin/sh
FILENAME="$1"
BIN="$2"
MAIN="$3"
export PATH="$BIN:$PATH"
chmod +x $BIN/solc
CONTRACT="${FILENAME%.sol}"
CONTRACT="${CONTRACT##*/}"
CONTRACTS=$(python3 "$BIN"/printContractNames.py "$FILENAME")
if [ "$MAIN" -eq 1 ]; then
if (echo "$CONTRACTS" | grep -q "$CONTRACT"); then
CONTRACTS="$CONTRACT"
... | 561 | 18.37931 | 61 | sh |
smartbugs | smartbugs-master/tools/maian/scripts/printContractNames.py | import sys, json
from subprocess import PIPE, Popen
filename = sys.argv[1]
cmd = ["solc", "--standard-json", "--allow-paths", ".,/"]
settings = {
"optimizer": {"enabled": False},
"outputSelection": {
"*": {
"*": [ "evm.deployedBytecode" ],
}
},
}
input_json = json.dumps(
{
... | 915 | 25.941176 | 69 | py |
smartbugs | smartbugs-master/tools/manticore-0.3.7/config.yaml | name: Manticore
origin: https://github.com/trailofbits/manticore
version: 0.3.7
info: Manticore is a symbolic execution tool for analysis of smart contracts and binaries.
image: smartbugs/manticore:0.3.7
output: /results
solidity:
entrypoint: "'$BIN/do_solidity.sh' '$FILENAME' '$BIN'"
solc: yes
bin: scripts... | 321 | 28.272727 | 90 | yaml |
smartbugs | smartbugs-master/tools/manticore-0.3.7/parser.py | import io, tarfile, yaml
import sb.parse_utils
VERSION = "2022/11/17"
FINDINGS = set()
def parse_file(lines):
findings = []
snippet = False
for line in lines:
if snippet:
snippet = False
l = line.split()
finding["line"] = int(l[0])
finding["code"] =... | 2,383 | 31.216216 | 82 | py |
smartbugs | smartbugs-master/tools/manticore-0.3.7/scripts/do_solidity.sh | #!/bin/sh
FILENAME="$1"
BIN="$2"
export PATH="$BIN:$PATH"
chmod +x "$BIN/solc"
mkdir /results
for c in `python3 "$BIN/printContractNames.py" "${FILENAME}"`; do
manticore --no-colors --contract "${c}" "${FILENAME#/}"
mv /mcore_* /results
done
| 263 | 16.6 | 66 | sh |
smartbugs | smartbugs-master/tools/manticore-0.3.7/scripts/printContractNames.py | import sys, json
from subprocess import PIPE, Popen
filename = sys.argv[1]
cmd = ["solc", "--standard-json", "--allow-paths", ".,/"]
settings = {
"optimizer": {"enabled": False},
"outputSelection": {
"*": {
"*": [ "evm.deployedBytecode" ],
}
},
}
input_json = json.dumps(
{
... | 915 | 25.941176 | 69 | py |
smartbugs | smartbugs-master/tools/manticore/config.yaml | alias:
- manticore-0.3.7
| 29 | 9 | 21 | yaml |
smartbugs | smartbugs-master/tools/mythril-0.23.15/config.yaml | name: Mythril
version: 0.23.15
origin: https://github.com/ConsenSys/mythril
info: Mythril analyses EVM bytecode using symbolic analysis, taint analysis and control flow checking to detect a variety of security vulnerabilities.
image: smartbugs/mythril:0.23.15
bin: scripts
solidity:
entrypoint: "'$BIN/do_solidity.sh... | 519 | 36.142857 | 150 | yaml |
smartbugs | smartbugs-master/tools/mythril-0.23.15/findings.yaml | Delegatecall to user-supplied address (SWC 112):
classification: SWC-112, DASP-10
method: Check for invocations of delegatecall to a user-supplied address.
descr_short: The contract delegates execution to another contract with a user-supplied address.
descr_long: The smart contract delegates execution t... | 9,095 | 91.816327 | 485 | yaml |
smartbugs | smartbugs-master/tools/mythril-0.23.15/parser.py | import json
import sb.parse_utils
VERSION = "2023/01/20"
FINDINGS = {
"Jump to an arbitrary instruction (SWC 127)",
"Write to an arbitrary storage location (SWC 124)",
"Delegatecall to user-supplied address (SWC 112)",
"Dependence on tx.origin (SWC 115)",
"Dependence on predictable environment var... | 2,829 | 39.428571 | 113 | py |
smartbugs | smartbugs-master/tools/mythril-0.23.15/scripts/do_bytecode.sh | #!/bin/sh
FILENAME="$1"
TIMEOUT="$2"
OPT_TIMEOUT=""
if [ "$TIMEOUT" -gt 0 ]; then
# TO = TIMEOUT * 80%
# the remaining 20% are for mythril to finish
TO=$(( (TIMEOUT*8+9)/10 ))
OPT_TIMEOUT="--execution-timeout $TO"
fi
/usr/local/bin/myth analyze $OPT_TIMEOUT -o json -f "$FILENAME"
| 300 | 19.066667 | 63 | sh |
smartbugs | smartbugs-master/tools/mythril-0.23.15/scripts/do_runtime.sh | #!/bin/sh
FILENAME="$1"
TIMEOUT="$2"
OPT_TIMEOUT=""
if [ "$TIMEOUT" -gt 0 ]; then
# TO = TIMEOUT * 80%
# the remaining 20% are for mythril to finish
TO=$(( (TIMEOUT*8+9)/10 ))
OPT_TIMEOUT="--execution-timeout $TO"
fi
/usr/local/bin/myth analyze $OPT_TIMEOUT -o json --bin-runtime -f "$FILENAME"
| 314 | 20 | 77 | sh |
smartbugs | smartbugs-master/tools/mythril-0.23.15/scripts/do_solidity.sh | #!/bin/sh
FILENAME="$1"
TIMEOUT="$2"
BIN="$3"
MAIN="$4"
export PATH="$BIN:$PATH"
chmod +x "$BIN/solc"
CONTRACT="${FILENAME%.sol}"
CONTRACT="${CONTRACT##*/}"
CONTRACTS=$(python3 "$BIN"/printContractNames.py "$FILENAME")
OPT_CONTRACT=""
if [ "$MAIN" -eq 1 ]; then
if (echo "$CONTRACTS" | grep -q "$CONTRACT"); then... | 722 | 20.264706 | 73 | sh |
smartbugs | smartbugs-master/tools/mythril-0.23.15/scripts/printContractNames.py | import sys, json
from subprocess import PIPE, Popen
filename = sys.argv[1]
cmd = ["solc", "--standard-json", "--allow-paths", ".,/"]
settings = {
"optimizer": {"enabled": False},
"outputSelection": {
"*": {
"*": [ "evm.deployedBytecode" ],
}
},
}
input_json = json.dumps(
{
... | 915 | 25.941176 | 69 | py |
smartbugs | smartbugs-master/tools/mythril-0.23.5/config.yaml | name: Mythril
version: 0.23.5
origin: https://github.com/ConsenSys/mythril
info: Mythril analyses EVM bytecode using symbolic analysis, taint analysis and control flow checking to detect a variety of security vulnerabilities.
image: smartbugs/mythril:0.23.5
bin: scripts
solidity:
entrypoint: "'$BIN/do_solidity.sh' ... | 517 | 36 | 150 | yaml |
smartbugs | smartbugs-master/tools/mythril-0.23.5/findings.yaml | Delegatecall to user-supplied address (SWC 112):
classification: SWC-112, DASP-10
method: Check for invocations of delegatecall to a user-supplied address.
descr_short: The contract delegates execution to another contract with a user-supplied address.
descr_long: The smart contract delegates execution t... | 9,095 | 91.816327 | 485 | yaml |
smartbugs | smartbugs-master/tools/mythril-0.23.5/parser.py | import json
import sb.parse_utils
VERSION = "2023/01/20"
FINDINGS = {
"Jump to an arbitrary instruction (SWC 127)",
"Write to an arbitrary storage location (SWC 124)",
"Delegatecall to user-supplied address (SWC 112)",
"Dependence on tx.origin (SWC 115)",
"Dependence on predictable environment var... | 2,829 | 39.428571 | 113 | py |
smartbugs | smartbugs-master/tools/mythril-0.23.5/scripts/do_bytecode.sh | #!/bin/sh
FILENAME="$1"
TIMEOUT="$2"
OPT_TIMEOUT=""
if [ "$TIMEOUT" -gt 0 ]; then
# TO = TIMEOUT * 80%
# the remaining 20% are for mythril to finish
TO=$(( (TIMEOUT*8+9)/10 ))
OPT_TIMEOUT="--execution-timeout $TO"
fi
/usr/local/bin/myth analyze $OPT_TIMEOUT -o json -f "$FILENAME"
| 300 | 19.066667 | 63 | sh |
smartbugs | smartbugs-master/tools/mythril-0.23.5/scripts/do_runtime.sh | #!/bin/sh
FILENAME="$1"
TIMEOUT="$2"
OPT_TIMEOUT=""
if [ "$TIMEOUT" -gt 0 ]; then
# TO = TIMEOUT * 80%
# the remaining 20% are for mythril to finish
TO=$(( (TIMEOUT*8+9)/10 ))
OPT_TIMEOUT="--execution-timeout $TO"
fi
/usr/local/bin/myth analyze $OPT_TIMEOUT -o json --bin-runtime -f "$FILENAME"
| 314 | 20 | 77 | sh |
smartbugs | smartbugs-master/tools/mythril-0.23.5/scripts/do_solidity.sh | #!/bin/sh
FILENAME="$1"
TIMEOUT="$2"
BIN="$3"
MAIN="$4"
export PATH="$BIN:$PATH"
chmod +x "$BIN/solc"
CONTRACT="${FILENAME%.sol}"
CONTRACT="${CONTRACT##*/}"
CONTRACTS=$(python3 "$BIN"/printContractNames.py "$FILENAME")
OPT_CONTRACT=""
if [ "$MAIN" -eq 1 ]; then
if (echo "$CONTRACTS" | grep -q "$CONTRACT"); then... | 722 | 20.264706 | 73 | sh |
smartbugs | smartbugs-master/tools/mythril-0.23.5/scripts/printContractNames.py | import sys, json
from subprocess import PIPE, Popen
filename = sys.argv[1]
cmd = ["solc", "--standard-json", "--allow-paths", ".,/"]
settings = {
"optimizer": {"enabled": False},
"outputSelection": {
"*": {
"*": [ "evm.deployedBytecode" ],
}
},
}
input_json = json.dumps(
{
... | 915 | 25.941176 | 69 | py |
smartbugs | smartbugs-master/tools/mythril/config.yaml | alias:
- mythril-0.23.15
| 29 | 9 | 21 | yaml |
smartbugs | smartbugs-master/tools/osiris/config.yaml | name: Osiris
version: "#d1ecc37"
info: Osiris is an analysis tool to detect integer bugs in Ethereum smart contracts. Osiris is based on Oyente.
origin: https://github.com/christoftorres/Osiris
image: smartbugs/osiris:d1ecc37
bin: scripts
solidity:
entrypoint: "'$BIN/do_solidity.sh' '$FILENAME' '$TIMEOUT' '$BIN' '$... | 412 | 33.416667 | 111 | yaml |
smartbugs | smartbugs-master/tools/osiris/findings.yaml | Callstack bug:
classification: SWC-998, DASP-5
Concurrency bug:
classification: SWC-114, DASP-7
Division bugs:
classification: SWC-999, DASP-3
Modulo bugs:
classification: SWC-999, DASP-3
Overflow bugs:
classification: SWC-101, DASP-3
Reentrancy bug:
classification: SWC-107, DASP-1
Signedness bu... | 578 | 24.173913 | 35 | yaml |
smartbugs | smartbugs-master/tools/osiris/parser.py | import tools.oyente.parser as oyente
VERSION = oyente.VERSION
FINDINGS = {
# "Arithmetic bugs", # redundant, a sub-category will be reported anyway
"Overflow bugs",
"Underflow bugs",
"Division bugs",
"Modulo bugs",
"Truncation bugs",
"Signedness bugs",
"Callstack bug",
"Concurrency ... | 487 | 21.181818 | 75 | py |
smartbugs | smartbugs-master/tools/osiris/scripts/do_runtime.sh | #!/bin/sh
FILENAME="$1"
TIMEOUT="$2"
OPT_TIMEOUT=""
if [ "$TIMEOUT" -gt 0 ]; then
# TO = TIMEOUT * 80%
# the remaining 20% are for osiris to finish
TO=$(( (TIMEOUT*8+9)/10 ))
OPT_TIMEOUT="-glt $TO"
fi
python osiris/osiris.py $OPT_TIMEOUT -b -s "$FILENAME"
| 275 | 17.4 | 54 | sh |
smartbugs | smartbugs-master/tools/osiris/scripts/do_solidity.sh | #!/bin/sh
FILENAME="$1"
TIMEOUT="$2"
BIN="$3"
MAIN="$4"
export PATH="$BIN:$PATH"
chmod +x "$BIN/solc"
CONTRACT="${FILENAME%.sol}"
CONTRACT="${CONTRACT##*/}"
CONTRACTS=$(python3 "$BIN"/printContractNames.py "$FILENAME")
OPT_CONTRACT=""
if [ "$MAIN" -eq 1 ]; then
if (echo "$CONTRACTS" | grep -q "$CONTRACT"); then... | 709 | 19.882353 | 66 | sh |
smartbugs | smartbugs-master/tools/osiris/scripts/printContractNames.py | import sys, json
from subprocess import PIPE, Popen
filename = sys.argv[1]
cmd = ["solc", "--standard-json", "--allow-paths", ".,/"]
settings = {
"optimizer": {"enabled": False},
"outputSelection": {
"*": {
"*": [ "evm.deployedBytecode" ],
}
},
}
input_json = json.dumps(
{
... | 915 | 25.941176 | 69 | py |
smartbugs | smartbugs-master/tools/oyente/config.yaml | name: Oyente
version: "#480e725"
origin: https://github.com/smartbugs/oyente
info: Oyente runs on symbolic execution, determines which inputs cause which program branches to execute, to find potential security vulnerabilities. Oyente works directly with EVM bytecode without access high level representation and does not... | 575 | 47 | 279 | yaml |
smartbugs | smartbugs-master/tools/oyente/findings.yaml | Callstack Depth Attack Vulnerability:
classification: SWC-998, DASP-5
Integer Overflow:
classification: SWC-101, DASP-3
Integer Underflow:
classification: SWC-101, DASP-3
Parity Multisig Bug 2: {}
Re-Entrancy Vulnerability:
classification: SWC-107, DASP-1
Timestamp Dependency:
classification: SWC-11... | 405 | 28 | 38 | yaml |
smartbugs | smartbugs-master/tools/oyente/parser.py | import re
import sb.parse_utils
VERSION = "2023/02/27"
FINDINGS = {
"Callstack Depth Attack Vulnerability",
"Transaction-Ordering Dependence (TOD)",
"Timestamp Dependency",
"Re-Entrancy Vulnerability",
"Integer Overflow",
"Integer Underflow",
"Parity Multisig Bug 2"
}
INFOS = (
re.com... | 4,378 | 33.480315 | 95 | py |
smartbugs | smartbugs-master/tools/oyente/scripts/do_runtime.sh | #!/bin/sh
FILENAME="$1"
TIMEOUT="$2"
OPT_TIMEOUT=""
if [ "$TIMEOUT" -gt 0 ]; then
# TO = TIMEOUT * 80%
# the remaining 20% are for Oyente to finish
TO=$(( (TIMEOUT*8+9)/10 ))
OPT_TIMEOUT="-glt $TO"
fi
cd /oyente
/oyente/oyente/oyente.py $OPT_TIMEOUT -b -s "$FILENAME"
| 287 | 17 | 55 | sh |
smartbugs | smartbugs-master/tools/oyente/scripts/do_solidity.sh | #!/bin/sh
FILENAME="$1"
TIMEOUT="$2"
BIN="$3"
MAIN="$4"
export PATH="$BIN:$PATH"
chmod +x "$BIN/solc"
CONTRACT="${FILENAME%.sol}"
CONTRACT="${CONTRACT##*/}"
CONTRACTS=$(python3 "$BIN"/printContractNames.py "$FILENAME")
OPT_CONTRACT=""
if [ "$MAIN" -eq 1 ]; then
if (echo "$CONTRACTS" | grep -q "$CONTRACT"); then... | 728 | 19.828571 | 66 | sh |
smartbugs | smartbugs-master/tools/oyente/scripts/printContractNames.py | import sys, json
from subprocess import PIPE, Popen
filename = sys.argv[1]
cmd = ["solc", "--standard-json", "--allow-paths", ".,/"]
settings = {
"optimizer": {"enabled": False},
"outputSelection": {
"*": {
"*": [ "evm.deployedBytecode" ],
}
},
}
input_json = json.dumps(
{
... | 915 | 25.941176 | 69 | py |
smartbugs | smartbugs-master/tools/pakala/config.yaml | name: Pakala
origin: https://github.com/palkeo/pakala
version: "#c84ef38 v1.1.10"
info: Pakala is a tool to search for exploitable bugs in Ethereum smart contracts and a symbolic execution engine for the Ethereum Virtual Machine.
image: smartbugs/pakala:1.1.10
runtime:
entrypoint: "'$BIN/do_runtime.sh' '$FILENAME' ... | 349 | 37.888889 | 147 | yaml |
smartbugs | smartbugs-master/tools/pakala/findings.yaml | call bug:
classification: SWC-105, DASP-2
delegatecall bug:
classification: SWC-112, DASP-10
selfdestruct bug:
classification: SWC-105, DASP-2
| 155 | 21.285714 | 36 | yaml |
smartbugs | smartbugs-master/tools/pakala/parser.py | import re, ast
import sb.parse_utils
VERSION = "2023/02/27"
FINDINGS = {
"delegatecall bug",
"selfdestruct bug",
"call bug"
}
FINDING = re.compile(".*pakala\.analyzer\[.*\] INFO Found (.* bug)\.")
COVERAGE = re.compile("Symbolic execution finished with coverage (.*).")
FINISHED = re.compile("Nothing ... | 1,993 | 28.761194 | 92 | py |
smartbugs | smartbugs-master/tools/pakala/docker/scripts/runPakala.sh | #!/bin/sh
FILENAME="$1"
geth --dev --http --http.api eth,web3,personal,net &
sleep 2
export WEB3_PROVIDER_URI="http://127.0.0.1:8545"
cat "$FILENAME" | pakala - --exec-timeout 1500 --analysis-timeout 300
| 207 | 19.8 | 69 | sh |
smartbugs | smartbugs-master/tools/pakala/scripts/do_runtime.sh | #!/bin/sh
FILENAME="$1"
TIMEOUT="$2"
geth --dev --http --http.api eth,web3,personal,net &
sleep 2
export WEB3_PROVIDER_URI="http://127.0.0.1:8545"
if [ "$TIMEOUT" -eq 0 ]; then
cat "$FILENAME" | pakala -
else
# TO1 = TIMEOUT * 80%
# TO2 = TIMEOUT * 17%
TO1=$(( TIMEOUT*8/10 ))
TO2=$(( TIMEOUT*17/1... | 408 | 20.526316 | 78 | sh |
smartbugs | smartbugs-master/tools/securify/config.yaml | name: Securify
origin: https://github.com/eth-sri/securify
info: Securify uses formal verification, also relying on static analysis checks. Securify's analysis consists of two steps. First, it symbolically analyzes the contract's dependency graph to extract precise semantic information from the code. Then, it checks co... | 764 | 57.846154 | 367 | yaml |
smartbugs | smartbugs-master/tools/securify/findings.yaml | DAO:
classification: SWC-107, DASP-1
DAOConstantGas:
classification: SWC-107, DASP-1
MissingInputValidation:
classification: SWC-0, DASP-3
TODAmount:
classification: SWC-114, DASP-7
TODReceiver:
classification: SWC-114, DASP-7
TODTransfer:
classification: SWC-114, DASP-7
UnhandledException:
... | 411 | 23.235294 | 35 | yaml |
smartbugs | smartbugs-master/tools/securify/parser.py | import json, io, tarfile
import sb.parse_utils
VERSION = "2022/11/17"
FINDINGS = {
"DAO",
"DAOConstantGas",
"MissingInputValidation",
"TODAmount",
"TODReceiver",
"TODTransfer",
"UnhandledException",
"UnrestrictedEtherFlow"
}
def parse(exit_code, log, output):
findings, infos = set... | 2,086 | 30.621212 | 83 | py |
smartbugs | smartbugs-master/tools/securify/scripts/do_runtime.sh | #!/bin/sh
FILENAME="$1"
BIN="$2"
mkdir /results
java -Xmx16G -jar /securify_jar/securify.jar --livestatusfile /results/live.json --output /results/results.json -fh "$FILENAME"
| 178 | 21.375 | 127 | sh |
smartbugs | smartbugs-master/tools/securify/scripts/do_solidity.sh | #!/bin/sh
FILENAME="$1"
BIN="$2"
export PATH="$BIN:$PATH"
chmod +x "$BIN/solc"
mkdir /results
java -Xmx16G -jar /securify_jar/securify.jar --livestatusfile /results/live.json --output /results/results.json -fs "$FILENAME"
| 225 | 19.545455 | 127 | sh |
smartbugs | smartbugs-master/tools/sfuzz/config.yaml | name: sFuzz
version: #48934c0 (2019-03-01)
info: An Efficient Adaptive Fuzzer for Solidity Smart Contracts
origin: https://github.com/duytai/sFuzz
image: smartbugs/sfuzz:48934c0
solidity:
command: "'$BIN/do_solidity.sh' '$FILENAME' '$TIMEOUT' '$BIN' '$MAIN'"
output: /home/contracts
bin: scripts
solc: y... | 323 | 26 | 74 | yaml |
smartbugs | smartbugs-master/tools/sfuzz/findings.yaml | Block Number Dependency:
classification: SWC-120, DASP-6
severity: Low
Dangerous Delegate Call:
classification: SWC-106, DASP-2
Exception Disorder:
classification: SWC-104, DASP-4
Freezing Ether:
classification: SWC-997, DASP-5
Gasless Send:
classification: SWC-134, DASP-10
Integer Overflow... | 587 | 17.967742 | 36 | yaml |
smartbugs | smartbugs-master/tools/sfuzz/parser.py | import io
import json
import os
import re
import tarfile
import sb.parse_utils
VERSION = "2023/03/02"
FINDINGS = {
"Block Number Dependency",
"Dangerous Delegate Call",
"Exception Disorder",
"Freezing Ether",
"Gasless Send",
"Integer Overflow",
"Integer Underflow",
"Reentrancy",
"... | 2,940 | 30.623656 | 99 | py |
smartbugs | smartbugs-master/tools/sfuzz/scripts/do_solidity.sh | #!/bin/bash
FILENAME="$1"
TIMEOUT="$2"
BIN="$3"
MAIN="$4"
export PATH="$BIN:$PATH"
chmod +x "$BIN/solc"
CONTRACT="${FILENAME%.sol}"
CONTRACT="${CONTRACT##*/}"
CONTRACTS=$(python3 "$BIN"/printContractNames.py "$FILENAME")
COUNT=$(echo $CONTRACTS | wc -w)
[ "$COUNT" -gt 0 ] || COUNT=1
if [ "$MAIN" -eq 1 ]; then
i... | 938 | 20.837209 | 67 | sh |
smartbugs | smartbugs-master/tools/sfuzz/scripts/printContractNames.py | import sys, json
from subprocess import PIPE, Popen
filename = sys.argv[1]
cmd = ["solc", "--standard-json", "--allow-paths", ".,/"]
settings = {
"optimizer": {"enabled": False},
"outputSelection": {
"*": {
"*": [ "evm.deployedBytecode" ],
}
},
}
input_json = json.dumps(
{
... | 915 | 25.941176 | 69 | py |
smartbugs | smartbugs-master/tools/slither/config.yaml | name: Slither
origin: https://github.com/crytic/slither
info: Slither is a Solidity static analysis framework written in Python 3. It runs a suite of vulnerability detectors and prints visual information about contract details. Slither enables developers to find vulnerabilities, enhance their code comphrehension, and q... | 507 | 49.8 | 297 | yaml |
smartbugs | smartbugs-master/tools/slither/findings.yaml | abiencoderv2-array: {}
arbitrary-send:
classification: SWC-105, DASP-2
arbitrary-send-erc20: {}
arbitrary-send-erc20-permit: {}
arbitrary-send-eth: {}
array-by-reference: {}
assembly:
classification: SWC-0, DASP-10
assert-state-change: {}
backdoor: {}
boolean-cst: {}
boolean-equal: {}
calls-loop:
classifica... | 2,790 | 22.854701 | 36 | yaml |
smartbugs | smartbugs-master/tools/slither/parser.py | import io, tarfile, json, re
import sb.parse_utils
VERSION = "2022/11/14"
FINDINGS = {
"abiencoderv2-array",
"arbitrary-send",
"arbitrary-send-erc20",
"arbitrary-send-erc20-permit",
"arbitrary-send-eth",
"array-by-reference",
"assembly",
"assert-state-change",
"backdoor",
"bool... | 3,971 | 26.776224 | 70 | py |
smartbugs | smartbugs-master/tools/slither/scripts/do_solidity.sh | #!/bin/sh
FILENAME="$1"
TIMEOUT="$2"
BIN="$3"
export PATH="$BIN:$PATH"
chmod +x "$BIN/solc"
slither "$FILENAME" --json /output.json
| 135 | 11.363636 | 39 | sh |
smartbugs | smartbugs-master/tools/smartcheck/config.yaml | name: Smartcheck
origin: https://github.com/smartdec/smartcheck
info: Securify automatically checks for vulnerabilities and bad coding practices. It runs lexical and syntactical analysis on Solidity source code.
solidity:
image: smartbugs/smartcheck
entrypoint: "'$BIN/do_solidity.sh' '$FILENAME' '$BIN'"
sol... | 344 | 37.333333 | 147 | yaml |
smartbugs | smartbugs-master/tools/smartcheck/findings.yaml | SOLIDITY_ADDRESS_HARDCODED:
classification: SWC-0, DASP-10
SOLIDITY_ARRAY_LENGTH_MANIPULATION:
classification: SWC-0, DASP-10
SOLIDITY_BALANCE_EQUALITY:
classification: SWC-132, DASP-10
SOLIDITY_BYTE_ARRAY_INSTEAD_BYTES: {}
SOLIDITY_CALL_WITHOUT_DATA:
classification: SWC-0, DASP-10
SOLIDITY_CONSTRUCTOR_... | 2,671 | 31.192771 | 48 | yaml |
smartbugs | smartbugs-master/tools/smartcheck/parser.py | import sb.parse_utils
VERSION = "2022/11/14"
FINDINGS = {
"SOLIDITY_ADDRESS_HARDCODED",
"SOLIDITY_ARRAY_LENGTH_MANIPULATION",
"SOLIDITY_BALANCE_EQUALITY",
"SOLIDITY_BYTE_ARRAY_INSTEAD_BYTES",
"SOLIDITY_CONSTRUCTOR_RETURN",
"SOLIDITY_CALL_WITHOUT_DATA",
"SOLIDITY_DELETE_ON_DYNAMIC_ARRAYS",
... | 2,274 | 30.597222 | 63 | py |
smartbugs | smartbugs-master/tools/smartcheck/scripts/do_solidity.sh | #!/bin/sh
FILENAME="$1"
BIN="$2"
export PATH="$BIN:$PATH"
chmod +x "$BIN/solc"
smartcheck -p "$FILENAME"
| 108 | 9.9 | 25 | sh |
smartbugs | smartbugs-master/tools/solhint-2.1.0/config.yaml | name: Solhint
version: "2.1.0"
origin: https://github.com/protofire/solhint
info: Open source project for linting solidity code. This project provide both security and style guide validations.
image: smartbugs/solhint
solidity:
entrypoint: "'$BIN/do_solidity.sh' '$FILENAME' '$TIMEOUT' '$BIN'"
solc: yes
bin:... | 329 | 32 | 116 | yaml |