Search is not available for this dataset
repo
stringlengths
2
152
file
stringlengths
15
239
code
stringlengths
0
58.4M
file_length
int64
0
58.4M
avg_line_length
float64
0
1.81M
max_line_length
int64
0
12.7M
extension_type
stringclasses
364 values
smartbugs
smartbugs-master/tools/all/config.yaml
alias: - confuzzius - conkas - ethainter - ethor - honeybadger - maian - madmax - manticore - mythril - osiris - oyente - pakala - securify - sfuzz - slither - smartcheck - solhint - teether - vandal
276
12.190476
17
yaml
smartbugs
smartbugs-master/tools/confuzzius/config.yaml
name: ConFuzzius info: A data dependency-aware hybrid fuzzer for Ethereum smart contracts origin: https://github.com/christoftorres/ConFuzzius version: "#4315fb7 v0.0.1" image: smartbugs/confuzzius:4315fb7 solidity: command: "'$BIN/do_solidity.sh' '$FILENAME' '$TIMEOUT' '$BIN' '$MAIN'" output: /root/results.j...
355
28.666667
75
yaml
smartbugs
smartbugs-master/tools/confuzzius/findings.yaml
Arbitrary Memory Access: classification: SWC-124, DASP-2 Assertion Failure: classification: SWC-110, DASP-10 Block Dependency: classification: SWC-120, DASP-6 Integer Overflow: classification: SWC-101, DASP-3 Leaking Ether: classification: SWC-105, DASP-2 Locking Ether: classification: SWC-997, ...
618
25.913043
36
yaml
smartbugs
smartbugs-master/tools/confuzzius/parser.py
import io import json import tarfile import sb.parse_utils VERSION = "2022/12/31" FINDINGS = { "Arbitrary Memory Access", "Assertion Failure", "Block Dependency", "Integer Overflow", "Leaking Ether", "Locking Ether", "Reentrancy", "Transaction Order Dependency", "Unhandled Exceptio...
2,165
31.818182
126
py
smartbugs
smartbugs-master/tools/confuzzius/scripts/do_solidity.sh
#!/bin/sh FILENAME="$1" TIMEOUT="$2" BIN="$3" MAIN="$4" export PATH="$BIN:$PATH" chmod +x "$BIN/solc" CONTRACT="${FILENAME%.sol}" CONTRACT="${CONTRACT##*/}" CONTRACTS=$(python3 "$BIN"/printContractNames.py "$FILENAME") COUNT=$(echo $CONTRACTS | wc -w) [ "$COUNT" -gt 0 ] || COUNT=1 OPT_CONTRACT="" if [ "$MAIN" -eq 1...
865
22.405405
118
sh
smartbugs
smartbugs-master/tools/confuzzius/scripts/printContractNames.py
import sys, json from subprocess import PIPE, Popen filename = sys.argv[1] cmd = ["solc", "--standard-json", "--allow-paths", ".,/"] settings = { "optimizer": {"enabled": False}, "outputSelection": { "*": { "*": [ "evm.deployedBytecode" ], } }, } input_json = json.dumps( { ...
915
25.941176
69
py
smartbugs
smartbugs-master/tools/conkas/config.yaml
name: Conkas origin: https://github.com/smartbugs/conkas version: "#4e0f256" info: Conkas analyzes Ethereum smart contracts to find potential security issues. It uses Rattle to lift the bytecode to an intermediate representation and then applies symbolic execution. image: smartbugs/conkas:4e0f256 bin: scripts solidity:...
462
37.583333
188
yaml
smartbugs
smartbugs-master/tools/conkas/findings.yaml
Integer Overflow: classification: SWC-101, DASP-3 Integer Underflow: classification: SWC-101, DASP-3 Reentrancy: classification: SWC-107, DASP-1 Time Manipulation: classification: SWC-116, DASP-8 Transaction Ordering Dependence: classification: SWC-114, DASP-7 Unchecked Low Level Call: classific...
343
25.461538
35
yaml
smartbugs
smartbugs-master/tools/conkas/parser.py
import re import sb.parse_utils VERSION = "2022/11/11" FINDINGS = { "Integer Overflow", "Integer Underflow", "Reentrancy", "Time Manipulation", "Transaction Ordering Dependence", "Unchecked Low Level Call" } ERRORS = ( re.compile("([A-Z0-9]+ instruction needs return value)"), re.compi...
2,635
37.202899
118
py
smartbugs
smartbugs-master/tools/conkas/scripts/do_runtime.sh
#!/bin/sh FILENAME="$1" cd /conkas python3 conkas.py -fav "$FILENAME"
72
9.428571
34
sh
smartbugs
smartbugs-master/tools/conkas/scripts/do_solidity.sh
#!/bin/sh FILENAME="$1" BIN="$2" MAIN="$3" export PATH="$BIN:$PATH" chmod +x $BIN/solc CONTRACT="${FILENAME%.sol}" CONTRACT="${CONTRACT##*/}" CONTRACTS=$(python3 "$BIN"/printContractNames.py "$FILENAME") OPT_CONTRACT="" if [ "$MAIN" -eq 1 ]; then if (echo "$CONTRACTS" | grep -q "$CONTRACT"); then OPT_CO...
509
18.615385
61
sh
smartbugs
smartbugs-master/tools/conkas/scripts/printContractNames.py
import sys, json from subprocess import PIPE, Popen filename = sys.argv[1] cmd = ["solc", "--standard-json", "--allow-paths", ".,/"] settings = { "optimizer": {"enabled": False}, "outputSelection": { "*": { "*": [ "evm.deployedBytecode" ], } }, } input_json = json.dumps( { ...
915
25.941176
69
py
smartbugs
smartbugs-master/tools/ethainter/config.yaml
name: Ethainter origin: https://zenodo.org/record/3760403 info: "Ethainter is a smart contract security analyzer for composite vulnerabilities. See the paper (Brent et al.: Ethainter: A Smart Contract Security Analyzer for Composite Vulnerabilities; In 41st ACM SIGPLAN Conference on Programming Language Design and Impl...
528
57.777778
281
yaml
smartbugs
smartbugs-master/tools/ethainter/findings.yaml
AccessibleSelfdestruct: classification: SWC-106, DASP-2 TaintedDelegatecall: classification: SWC-112, DASP-10 TaintedOwnerVariable: classification: SWC-124, DASP-2 TaintedSelfdestruct: classification: SWC-105, DASP-2 TaintedStoreIndex: classification: SWC-124, DASP-2 TaintedValueSend: classifica...
405
26.066667
36
yaml
smartbugs
smartbugs-master/tools/ethainter/parser.py
import tools.gigahorse.parser as gigahorse VERSION = gigahorse.VERSION FINDINGS = { "TaintedStoreIndex", "TaintedSelfdestruct", "TaintedValueSend", "UncheckedTaintedStaticcall", "AccessibleSelfdestruct", "TaintedDelegatecall", "TaintedOwnerVariable" } def parse(exit_code, log, output): ...
379
21.352941
60
py
smartbugs
smartbugs-master/tools/ethainter/docker/scripts/run.sh
#!/bin/sh FILENAME="$1" ./analyze.py --reuse_datalog_bin --restart --rerun_clients -d /data -C ../../ethainter-inlined.dl
124
19.833333
97
sh
smartbugs
smartbugs-master/tools/ethainter/scripts/do_runtime.sh
#!/bin/sh FILENAME="$1" TIMEOUT="$2" SB=$(dirname "$FILENAME") OPT_TIMEOUT="" if [ "$TIMEOUT" -ge 170 ]; then # reserve 50s for Ethainter to finish after timeout TO=$((TIMEOUT-50)) OPT_TIMEOUT="-T $TO" fi cd /home/reviewer/gigahorse-toolchain/logic ./analyze.py --reuse_datalog_bin --restart --rerun_clien...
375
22.5
110
sh
smartbugs
smartbugs-master/tools/ethor/config.yaml
name: eThor origin: https://secpriv.wien/ethor version: "2021 (CCS 2020)" info: eThor is a sound static analyzer for EVM smart contracts based on HoRSt. runtime: image: smartbugs/ethor:rmvi20q command: "ethor-with-reconstruction '$FILENAME' --prune-strategy=aggressive --predicate-inlining-strategy=linear --prea...
329
40.25
131
yaml
smartbugs
smartbugs-master/tools/ethor/findings.yaml
insecure: classification: SWC-107, DASP-1 secure: classification: SWC-0, DASP-10
89
17
35
yaml
smartbugs
smartbugs-master/tools/ethor/parser.py
import re import sb.parse_utils VERSION = "2022/11/11" FINDINGS = ("secure", "insecure") UNKNOWN_BYTECODE = "Encountered an unknown bytecode" FAILS = ( re.compile("OpenJDK.* failed; error='([^']+)'"), re.compile("(Floating-point arithmetic exception) signal in rule"), re.compile(".*(Undefined relation [...
1,864
31.155172
87
py
smartbugs
smartbugs-master/tools/ethor/docker/README.md
The docker container created by these files bundles the version of eThor used for the experiments published in CCS. ## Build ``` nix-build dockertools.nix ``` (if you know how to use docker but don't have nix-build installed, the easiest way _might be_ to get a NixOS docker image and call `nix-build` within) After ...
2,598
38.378788
264
md
smartbugs
smartbugs-master/tools/gigahorse/parser.py
import io, json, tarfile import sb.parse_utils VERSION = "2022/11/17" def parse(exit_code, log, output, FINDINGS): findings, infos = [], set() errors, fails = sb.parse_utils.errors_fails(exit_code, log) if "Writing results to results.json" not in log: infos.add("analysis incomplete") if n...
1,926
32.807018
80
py
smartbugs
smartbugs-master/tools/honeybadger/config.yaml
name: HoneyBadger version: "#ff30c9a" info: An analysis tool to detect honeypots in Ethereum smart contracts origin: https://github.com/christoftorres/HoneyBadger image: smartbugs/honeybadger:ff30c9a bin: scripts solidity: entrypoint: "'$BIN/do_solidity.sh' '$FILENAME' '$TIMEOUT' '$BIN' '$MAIN'" solc: yes runti...
386
31.25
77
yaml
smartbugs
smartbugs-master/tools/honeybadger/findings.yaml
Balance disorder: classification: SWC-0, DASP-10 Hidden state update: classification: SWC-0, DASP-10 Hidden transfer: classification: SWC-0, DASP-10 Inheritance disorder: classification: SWC-0, DASP-10 Money flow: classification: SWC-0, DASP-10 Skip empty string: classification: SWC-0, DASP-10 S...
481
24.368421
34
yaml
smartbugs
smartbugs-master/tools/honeybadger/parser.py
import tools.oyente.parser as oyente VERSION = oyente.VERSION FINDINGS = { "Money flow", "Balance disorder", "Hidden transfer", "Inheritance disorder", "Uninitialised struct", "Type overflow", "Skip empty string", "Hidden state update", "Straw ma...
418
21.052632
47
py
smartbugs
smartbugs-master/tools/honeybadger/scripts/do_runtime.sh
#!/bin/sh FILENAME="$1" TIMEOUT="$2" OPT_TIMEOUT="" if [ "$TIMEOUT" -gt 0 ]; then # TO = TIMEOUT * 80% # the remaining 20% are for honeybadger to finish TO=$(( (TIMEOUT*8+9)/10 )) OPT_TIMEOUT="-glt $TO" fi python honeybadger/honeybadger.py $OPT_TIMEOUT -b -s "$FILENAME"
290
18.4
64
sh
smartbugs
smartbugs-master/tools/honeybadger/scripts/do_solidity.sh
#!/bin/sh FILENAME="$1" TIMEOUT="$2" BIN="$3" MAIN="$4" export PATH="$BIN:$PATH" chmod +x "$BIN/solc" CONTRACT="${FILENAME%.sol}" CONTRACT="${CONTRACT##*/}" CONTRACTS=$(python3 "$BIN"/printContractNames.py "$FILENAME") OPT_CONTRACT="" if [ "$MAIN" -eq 1 ]; then if (echo "$CONTRACTS" | grep -q "$CONTRACT"); then...
723
20.294118
75
sh
smartbugs
smartbugs-master/tools/honeybadger/scripts/printContractNames.py
import sys, json from subprocess import PIPE, Popen filename = sys.argv[1] cmd = ["solc", "--standard-json", "--allow-paths", ".,/"] settings = { "optimizer": {"enabled": False}, "outputSelection": { "*": { "*": [ "evm.deployedBytecode" ], } }, } input_json = json.dumps( { ...
915
25.941176
69
py
smartbugs
smartbugs-master/tools/madmax/config.yaml
name: MadMax origin: https://github.com/nevillegrech/MadMax version: "#6e9a6e9" info: Madmax consists of a series of analyses and queries that find gas-focused vulnerabilities in Ethereum smart contracts. image: smartbugs/madmax:6e9a6e9 runtime: entrypoint: "'$BIN/do_runtime.sh' '$FILENAME' '$TIMEOUT'" bin: scr...
358
34.9
124
yaml
smartbugs
smartbugs-master/tools/madmax/findings.yaml
OverflowLoopIterator: classification: SWC-101, DASP-3 UnboundedMassOp: classification: SWC-128, DASP-5 WalletGriefing: classification: SWC-113, DASP-5
163
22.428571
35
yaml
smartbugs
smartbugs-master/tools/madmax/parser.py
import tools.gigahorse.parser as gigahorse VERSION = gigahorse.VERSION FINDINGS = { "OverflowLoopIterator", "UnboundedMassOp", "WalletGriefing" } def parse(exit_code, log, output): return gigahorse.parse(exit_code, log, output, FINDINGS)
257
18.846154
60
py
smartbugs
smartbugs-master/tools/madmax/docker/scripts/run.sh
#!/bin/sh FILENAME=$1 CODE=$(cat ${FILENAME}) python3 gigahorse-toolchain/gigahorse.py --reuse_datalog_bin --rerun_clients --restart -C madmax.dl ${FILENAME}
160
22
111
sh
smartbugs
smartbugs-master/tools/madmax/scripts/do_runtime.sh
#!/bin/sh FILENAME="$1" TIMEOUT="$2" OPT_TIMEOUT="" if [ "$TIMEOUT" -ge 170 ]; then # reserve 50s for MaxMax to finish after timeout TO=$((TIMEOUT-50)) OPT_TIMEOUT="-T $TO" fi cd /MadMax python3 gigahorse-toolchain/gigahorse.py --reuse_datalog_bin --rerun_clients --restart $OPT_TIMEOUT -C madmax.dl "${FI...
329
21
126
sh
smartbugs
smartbugs-master/tools/maian/config.yaml
name: Maian origin: https://github.com/smartbugs/MAIAN info: Maian is a tool for the automated detection of buggy Ethereum smart contracts of type 'prodigal', 'suicidal', and 'greedy'. image: smartbugs/maian:solc5.10 version: '#4bab09a' bin: scripts solidity: entrypoint: "'$BIN/do_solidity.sh' '$FILENAME' '$BIN' '$...
463
32.142857
129
yaml
smartbugs
smartbugs-master/tools/maian/findings.yaml
Destructible: classification: SWC-106, DASP-2 Destructible (verified): classification: SWC-106, DASP-2 Ether leak: classification: SWC-105, DASP-2 Ether leak (verified): classification: SWC-105, DASP-2 Ether lock: classification: SWC-997, DASP-5 Ether lock (Ether accepted without send): classifi...
542
27.578947
41
yaml
smartbugs
smartbugs-master/tools/maian/parser.py
import sb.parse_utils import re VERSION = "2022/11/11" FINDINGS = ( "No Ether leak (no send)", "Ether leak", "Ether leak (verified)", # "Accepts Ether", "No Ether lock (Ether refused)", "Ether lock (Ether accepted without send)", "Ether lock", "Not destructible (no self-destruct)", ...
5,852
36.76129
126
py
smartbugs
smartbugs-master/tools/maian/docker/scripts/printContractNames.py
import sys import pprint from solidity_parser import parser sourceUnit = parser.parse_file(sys.argv[1]) #pprint.pprint(sourceUnit) sourceUnitObject = parser.objectify(sourceUnit) # access imports, contracts, functions, ... (see outline example in # __main__.py) sourceUnitObject.imports # [] sourceUnitObject.pragm...
410
23.176471
68
py
smartbugs
smartbugs-master/tools/maian/docker/scripts/runMAIANall.sh
#!/bin/sh FILENAME=$1 for c in `python3 printContractNames.py ${FILENAME} | grep -v "ANTLR runtime and generated code versions disagree:"`; do cd /MAIAN/tool; python3 maian.py -c 0 -s ${FILENAME} ${c}; python3 maian.py -c 1 -s ${FILENAME} ${c}; python3 maian.py -c 2 -s ${FILENAME} $...
329
26.5
118
sh
smartbugs
smartbugs-master/tools/maian/docker/scripts/run_maian_bytecode.sh
#!/bin/sh FILENAME=$1 cd /MAIAN/tool python3 maian.py -c 0 -b ${FILENAME} python3 maian.py -c 1 -b ${FILENAME} python3 maian.py -c 2 -b ${FILENAME}
150
15.777778
36
sh
smartbugs
smartbugs-master/tools/maian/docker/scripts/run_maian_solidity.sh
#!/bin/sh FILENAME=$1 for c in `python3 printContractNames.py ${FILENAME} | grep -v "ANTLR runtime and generated code versions disagree:"`; do cd /MAIAN/tool; python3 maian.py -c 0 -s ${FILENAME} ${c}; python3 maian.py -c 1 -s ${FILENAME} ${c}; python3 maian.py -c 2 -s ${FILENAME} $...
329
26.5
118
sh
smartbugs
smartbugs-master/tools/maian/scripts/do_bytecode.sh
#!/bin/sh FILENAME="$1" cd /MAIAN/tool python3 maian.py -c 0 -bs "$FILENAME" python3 maian.py -c 1 -bs "$FILENAME" python3 maian.py -c 2 -bs "$FILENAME"
155
16.333333
37
sh
smartbugs
smartbugs-master/tools/maian/scripts/do_runtime.sh
#!/bin/sh FILENAME="$1" cd /MAIAN/tool python3 maian.py -c 0 -b "$FILENAME" python3 maian.py -c 1 -b "$FILENAME" python3 maian.py -c 2 -b "$FILENAME"
152
16
36
sh
smartbugs
smartbugs-master/tools/maian/scripts/do_solidity.sh
#!/bin/sh FILENAME="$1" BIN="$2" MAIN="$3" export PATH="$BIN:$PATH" chmod +x $BIN/solc CONTRACT="${FILENAME%.sol}" CONTRACT="${CONTRACT##*/}" CONTRACTS=$(python3 "$BIN"/printContractNames.py "$FILENAME") if [ "$MAIN" -eq 1 ]; then if (echo "$CONTRACTS" | grep -q "$CONTRACT"); then CONTRACTS="$CONTRACT" ...
561
18.37931
61
sh
smartbugs
smartbugs-master/tools/maian/scripts/printContractNames.py
import sys, json from subprocess import PIPE, Popen filename = sys.argv[1] cmd = ["solc", "--standard-json", "--allow-paths", ".,/"] settings = { "optimizer": {"enabled": False}, "outputSelection": { "*": { "*": [ "evm.deployedBytecode" ], } }, } input_json = json.dumps( { ...
915
25.941176
69
py
smartbugs
smartbugs-master/tools/manticore-0.3.7/config.yaml
name: Manticore origin: https://github.com/trailofbits/manticore version: 0.3.7 info: Manticore is a symbolic execution tool for analysis of smart contracts and binaries. image: smartbugs/manticore:0.3.7 output: /results solidity: entrypoint: "'$BIN/do_solidity.sh' '$FILENAME' '$BIN'" solc: yes bin: scripts...
321
28.272727
90
yaml
smartbugs
smartbugs-master/tools/manticore-0.3.7/parser.py
import io, tarfile, yaml import sb.parse_utils VERSION = "2022/11/17" FINDINGS = set() def parse_file(lines): findings = [] snippet = False for line in lines: if snippet: snippet = False l = line.split() finding["line"] = int(l[0]) finding["code"] =...
2,383
31.216216
82
py
smartbugs
smartbugs-master/tools/manticore-0.3.7/scripts/do_solidity.sh
#!/bin/sh FILENAME="$1" BIN="$2" export PATH="$BIN:$PATH" chmod +x "$BIN/solc" mkdir /results for c in `python3 "$BIN/printContractNames.py" "${FILENAME}"`; do manticore --no-colors --contract "${c}" "${FILENAME#/}" mv /mcore_* /results done
263
16.6
66
sh
smartbugs
smartbugs-master/tools/manticore-0.3.7/scripts/printContractNames.py
import sys, json from subprocess import PIPE, Popen filename = sys.argv[1] cmd = ["solc", "--standard-json", "--allow-paths", ".,/"] settings = { "optimizer": {"enabled": False}, "outputSelection": { "*": { "*": [ "evm.deployedBytecode" ], } }, } input_json = json.dumps( { ...
915
25.941176
69
py
smartbugs
smartbugs-master/tools/manticore/config.yaml
alias: - manticore-0.3.7
29
9
21
yaml
smartbugs
smartbugs-master/tools/mythril-0.23.15/config.yaml
name: Mythril version: 0.23.15 origin: https://github.com/ConsenSys/mythril info: Mythril analyses EVM bytecode using symbolic analysis, taint analysis and control flow checking to detect a variety of security vulnerabilities. image: smartbugs/mythril:0.23.15 bin: scripts solidity: entrypoint: "'$BIN/do_solidity.sh...
519
36.142857
150
yaml
smartbugs
smartbugs-master/tools/mythril-0.23.15/findings.yaml
Delegatecall to user-supplied address (SWC 112): classification: SWC-112, DASP-10 method: Check for invocations of delegatecall to a user-supplied address. descr_short: The contract delegates execution to another contract with a user-supplied address. descr_long: The smart contract delegates execution t...
9,095
91.816327
485
yaml
smartbugs
smartbugs-master/tools/mythril-0.23.15/parser.py
import json import sb.parse_utils VERSION = "2023/01/20" FINDINGS = { "Jump to an arbitrary instruction (SWC 127)", "Write to an arbitrary storage location (SWC 124)", "Delegatecall to user-supplied address (SWC 112)", "Dependence on tx.origin (SWC 115)", "Dependence on predictable environment var...
2,829
39.428571
113
py
smartbugs
smartbugs-master/tools/mythril-0.23.15/scripts/do_bytecode.sh
#!/bin/sh FILENAME="$1" TIMEOUT="$2" OPT_TIMEOUT="" if [ "$TIMEOUT" -gt 0 ]; then # TO = TIMEOUT * 80% # the remaining 20% are for mythril to finish TO=$(( (TIMEOUT*8+9)/10 )) OPT_TIMEOUT="--execution-timeout $TO" fi /usr/local/bin/myth analyze $OPT_TIMEOUT -o json -f "$FILENAME"
300
19.066667
63
sh
smartbugs
smartbugs-master/tools/mythril-0.23.15/scripts/do_runtime.sh
#!/bin/sh FILENAME="$1" TIMEOUT="$2" OPT_TIMEOUT="" if [ "$TIMEOUT" -gt 0 ]; then # TO = TIMEOUT * 80% # the remaining 20% are for mythril to finish TO=$(( (TIMEOUT*8+9)/10 )) OPT_TIMEOUT="--execution-timeout $TO" fi /usr/local/bin/myth analyze $OPT_TIMEOUT -o json --bin-runtime -f "$FILENAME"
314
20
77
sh
smartbugs
smartbugs-master/tools/mythril-0.23.15/scripts/do_solidity.sh
#!/bin/sh FILENAME="$1" TIMEOUT="$2" BIN="$3" MAIN="$4" export PATH="$BIN:$PATH" chmod +x "$BIN/solc" CONTRACT="${FILENAME%.sol}" CONTRACT="${CONTRACT##*/}" CONTRACTS=$(python3 "$BIN"/printContractNames.py "$FILENAME") OPT_CONTRACT="" if [ "$MAIN" -eq 1 ]; then if (echo "$CONTRACTS" | grep -q "$CONTRACT"); then...
722
20.264706
73
sh
smartbugs
smartbugs-master/tools/mythril-0.23.15/scripts/printContractNames.py
import sys, json from subprocess import PIPE, Popen filename = sys.argv[1] cmd = ["solc", "--standard-json", "--allow-paths", ".,/"] settings = { "optimizer": {"enabled": False}, "outputSelection": { "*": { "*": [ "evm.deployedBytecode" ], } }, } input_json = json.dumps( { ...
915
25.941176
69
py
smartbugs
smartbugs-master/tools/mythril-0.23.5/config.yaml
name: Mythril version: 0.23.5 origin: https://github.com/ConsenSys/mythril info: Mythril analyses EVM bytecode using symbolic analysis, taint analysis and control flow checking to detect a variety of security vulnerabilities. image: smartbugs/mythril:0.23.5 bin: scripts solidity: entrypoint: "'$BIN/do_solidity.sh' ...
517
36
150
yaml
smartbugs
smartbugs-master/tools/mythril-0.23.5/findings.yaml
Delegatecall to user-supplied address (SWC 112): classification: SWC-112, DASP-10 method: Check for invocations of delegatecall to a user-supplied address. descr_short: The contract delegates execution to another contract with a user-supplied address. descr_long: The smart contract delegates execution t...
9,095
91.816327
485
yaml
smartbugs
smartbugs-master/tools/mythril-0.23.5/parser.py
import json import sb.parse_utils VERSION = "2023/01/20" FINDINGS = { "Jump to an arbitrary instruction (SWC 127)", "Write to an arbitrary storage location (SWC 124)", "Delegatecall to user-supplied address (SWC 112)", "Dependence on tx.origin (SWC 115)", "Dependence on predictable environment var...
2,829
39.428571
113
py
smartbugs
smartbugs-master/tools/mythril-0.23.5/scripts/do_bytecode.sh
#!/bin/sh FILENAME="$1" TIMEOUT="$2" OPT_TIMEOUT="" if [ "$TIMEOUT" -gt 0 ]; then # TO = TIMEOUT * 80% # the remaining 20% are for mythril to finish TO=$(( (TIMEOUT*8+9)/10 )) OPT_TIMEOUT="--execution-timeout $TO" fi /usr/local/bin/myth analyze $OPT_TIMEOUT -o json -f "$FILENAME"
300
19.066667
63
sh
smartbugs
smartbugs-master/tools/mythril-0.23.5/scripts/do_runtime.sh
#!/bin/sh FILENAME="$1" TIMEOUT="$2" OPT_TIMEOUT="" if [ "$TIMEOUT" -gt 0 ]; then # TO = TIMEOUT * 80% # the remaining 20% are for mythril to finish TO=$(( (TIMEOUT*8+9)/10 )) OPT_TIMEOUT="--execution-timeout $TO" fi /usr/local/bin/myth analyze $OPT_TIMEOUT -o json --bin-runtime -f "$FILENAME"
314
20
77
sh
smartbugs
smartbugs-master/tools/mythril-0.23.5/scripts/do_solidity.sh
#!/bin/sh FILENAME="$1" TIMEOUT="$2" BIN="$3" MAIN="$4" export PATH="$BIN:$PATH" chmod +x "$BIN/solc" CONTRACT="${FILENAME%.sol}" CONTRACT="${CONTRACT##*/}" CONTRACTS=$(python3 "$BIN"/printContractNames.py "$FILENAME") OPT_CONTRACT="" if [ "$MAIN" -eq 1 ]; then if (echo "$CONTRACTS" | grep -q "$CONTRACT"); then...
722
20.264706
73
sh
smartbugs
smartbugs-master/tools/mythril-0.23.5/scripts/printContractNames.py
import sys, json from subprocess import PIPE, Popen filename = sys.argv[1] cmd = ["solc", "--standard-json", "--allow-paths", ".,/"] settings = { "optimizer": {"enabled": False}, "outputSelection": { "*": { "*": [ "evm.deployedBytecode" ], } }, } input_json = json.dumps( { ...
915
25.941176
69
py
smartbugs
smartbugs-master/tools/mythril/config.yaml
alias: - mythril-0.23.15
29
9
21
yaml
smartbugs
smartbugs-master/tools/osiris/config.yaml
name: Osiris version: "#d1ecc37" info: Osiris is an analysis tool to detect integer bugs in Ethereum smart contracts. Osiris is based on Oyente. origin: https://github.com/christoftorres/Osiris image: smartbugs/osiris:d1ecc37 bin: scripts solidity: entrypoint: "'$BIN/do_solidity.sh' '$FILENAME' '$TIMEOUT' '$BIN' '$...
412
33.416667
111
yaml
smartbugs
smartbugs-master/tools/osiris/findings.yaml
Callstack bug: classification: SWC-998, DASP-5 Concurrency bug: classification: SWC-114, DASP-7 Division bugs: classification: SWC-999, DASP-3 Modulo bugs: classification: SWC-999, DASP-3 Overflow bugs: classification: SWC-101, DASP-3 Reentrancy bug: classification: SWC-107, DASP-1 Signedness bu...
578
24.173913
35
yaml
smartbugs
smartbugs-master/tools/osiris/parser.py
import tools.oyente.parser as oyente VERSION = oyente.VERSION FINDINGS = { # "Arithmetic bugs", # redundant, a sub-category will be reported anyway "Overflow bugs", "Underflow bugs", "Division bugs", "Modulo bugs", "Truncation bugs", "Signedness bugs", "Callstack bug", "Concurrency ...
487
21.181818
75
py
smartbugs
smartbugs-master/tools/osiris/scripts/do_runtime.sh
#!/bin/sh FILENAME="$1" TIMEOUT="$2" OPT_TIMEOUT="" if [ "$TIMEOUT" -gt 0 ]; then # TO = TIMEOUT * 80% # the remaining 20% are for osiris to finish TO=$(( (TIMEOUT*8+9)/10 )) OPT_TIMEOUT="-glt $TO" fi python osiris/osiris.py $OPT_TIMEOUT -b -s "$FILENAME"
275
17.4
54
sh
smartbugs
smartbugs-master/tools/osiris/scripts/do_solidity.sh
#!/bin/sh FILENAME="$1" TIMEOUT="$2" BIN="$3" MAIN="$4" export PATH="$BIN:$PATH" chmod +x "$BIN/solc" CONTRACT="${FILENAME%.sol}" CONTRACT="${CONTRACT##*/}" CONTRACTS=$(python3 "$BIN"/printContractNames.py "$FILENAME") OPT_CONTRACT="" if [ "$MAIN" -eq 1 ]; then if (echo "$CONTRACTS" | grep -q "$CONTRACT"); then...
709
19.882353
66
sh
smartbugs
smartbugs-master/tools/osiris/scripts/printContractNames.py
import sys, json from subprocess import PIPE, Popen filename = sys.argv[1] cmd = ["solc", "--standard-json", "--allow-paths", ".,/"] settings = { "optimizer": {"enabled": False}, "outputSelection": { "*": { "*": [ "evm.deployedBytecode" ], } }, } input_json = json.dumps( { ...
915
25.941176
69
py
smartbugs
smartbugs-master/tools/oyente/config.yaml
name: Oyente version: "#480e725" origin: https://github.com/smartbugs/oyente info: Oyente runs on symbolic execution, determines which inputs cause which program branches to execute, to find potential security vulnerabilities. Oyente works directly with EVM bytecode without access high level representation and does not...
575
47
279
yaml
smartbugs
smartbugs-master/tools/oyente/findings.yaml
Callstack Depth Attack Vulnerability: classification: SWC-998, DASP-5 Integer Overflow: classification: SWC-101, DASP-3 Integer Underflow: classification: SWC-101, DASP-3 Parity Multisig Bug 2: {} Re-Entrancy Vulnerability: classification: SWC-107, DASP-1 Timestamp Dependency: classification: SWC-11...
405
28
38
yaml
smartbugs
smartbugs-master/tools/oyente/parser.py
import re import sb.parse_utils VERSION = "2023/02/27" FINDINGS = { "Callstack Depth Attack Vulnerability", "Transaction-Ordering Dependence (TOD)", "Timestamp Dependency", "Re-Entrancy Vulnerability", "Integer Overflow", "Integer Underflow", "Parity Multisig Bug 2" } INFOS = ( re.com...
4,378
33.480315
95
py
smartbugs
smartbugs-master/tools/oyente/scripts/do_runtime.sh
#!/bin/sh FILENAME="$1" TIMEOUT="$2" OPT_TIMEOUT="" if [ "$TIMEOUT" -gt 0 ]; then # TO = TIMEOUT * 80% # the remaining 20% are for Oyente to finish TO=$(( (TIMEOUT*8+9)/10 )) OPT_TIMEOUT="-glt $TO" fi cd /oyente /oyente/oyente/oyente.py $OPT_TIMEOUT -b -s "$FILENAME"
287
17
55
sh
smartbugs
smartbugs-master/tools/oyente/scripts/do_solidity.sh
#!/bin/sh FILENAME="$1" TIMEOUT="$2" BIN="$3" MAIN="$4" export PATH="$BIN:$PATH" chmod +x "$BIN/solc" CONTRACT="${FILENAME%.sol}" CONTRACT="${CONTRACT##*/}" CONTRACTS=$(python3 "$BIN"/printContractNames.py "$FILENAME") OPT_CONTRACT="" if [ "$MAIN" -eq 1 ]; then if (echo "$CONTRACTS" | grep -q "$CONTRACT"); then...
728
19.828571
66
sh
smartbugs
smartbugs-master/tools/oyente/scripts/printContractNames.py
import sys, json from subprocess import PIPE, Popen filename = sys.argv[1] cmd = ["solc", "--standard-json", "--allow-paths", ".,/"] settings = { "optimizer": {"enabled": False}, "outputSelection": { "*": { "*": [ "evm.deployedBytecode" ], } }, } input_json = json.dumps( { ...
915
25.941176
69
py
smartbugs
smartbugs-master/tools/pakala/config.yaml
name: Pakala origin: https://github.com/palkeo/pakala version: "#c84ef38 v1.1.10" info: Pakala is a tool to search for exploitable bugs in Ethereum smart contracts and a symbolic execution engine for the Ethereum Virtual Machine. image: smartbugs/pakala:1.1.10 runtime: entrypoint: "'$BIN/do_runtime.sh' '$FILENAME' ...
349
37.888889
147
yaml
smartbugs
smartbugs-master/tools/pakala/findings.yaml
call bug: classification: SWC-105, DASP-2 delegatecall bug: classification: SWC-112, DASP-10 selfdestruct bug: classification: SWC-105, DASP-2
155
21.285714
36
yaml
smartbugs
smartbugs-master/tools/pakala/parser.py
import re, ast import sb.parse_utils VERSION = "2023/02/27" FINDINGS = { "delegatecall bug", "selfdestruct bug", "call bug" } FINDING = re.compile(".*pakala\.analyzer\[.*\] INFO Found (.* bug)\.") COVERAGE = re.compile("Symbolic execution finished with coverage (.*).") FINISHED = re.compile("Nothing ...
1,993
28.761194
92
py
smartbugs
smartbugs-master/tools/pakala/docker/scripts/runPakala.sh
#!/bin/sh FILENAME="$1" geth --dev --http --http.api eth,web3,personal,net & sleep 2 export WEB3_PROVIDER_URI="http://127.0.0.1:8545" cat "$FILENAME" | pakala - --exec-timeout 1500 --analysis-timeout 300
207
19.8
69
sh
smartbugs
smartbugs-master/tools/pakala/scripts/do_runtime.sh
#!/bin/sh FILENAME="$1" TIMEOUT="$2" geth --dev --http --http.api eth,web3,personal,net & sleep 2 export WEB3_PROVIDER_URI="http://127.0.0.1:8545" if [ "$TIMEOUT" -eq 0 ]; then cat "$FILENAME" | pakala - else # TO1 = TIMEOUT * 80% # TO2 = TIMEOUT * 17% TO1=$(( TIMEOUT*8/10 )) TO2=$(( TIMEOUT*17/1...
408
20.526316
78
sh
smartbugs
smartbugs-master/tools/securify/config.yaml
name: Securify origin: https://github.com/eth-sri/securify info: Securify uses formal verification, also relying on static analysis checks. Securify's analysis consists of two steps. First, it symbolically analyzes the contract's dependency graph to extract precise semantic information from the code. Then, it checks co...
764
57.846154
367
yaml
smartbugs
smartbugs-master/tools/securify/findings.yaml
DAO: classification: SWC-107, DASP-1 DAOConstantGas: classification: SWC-107, DASP-1 MissingInputValidation: classification: SWC-0, DASP-3 TODAmount: classification: SWC-114, DASP-7 TODReceiver: classification: SWC-114, DASP-7 TODTransfer: classification: SWC-114, DASP-7 UnhandledException: ...
411
23.235294
35
yaml
smartbugs
smartbugs-master/tools/securify/parser.py
import json, io, tarfile import sb.parse_utils VERSION = "2022/11/17" FINDINGS = { "DAO", "DAOConstantGas", "MissingInputValidation", "TODAmount", "TODReceiver", "TODTransfer", "UnhandledException", "UnrestrictedEtherFlow" } def parse(exit_code, log, output): findings, infos = set...
2,086
30.621212
83
py
smartbugs
smartbugs-master/tools/securify/scripts/do_runtime.sh
#!/bin/sh FILENAME="$1" BIN="$2" mkdir /results java -Xmx16G -jar /securify_jar/securify.jar --livestatusfile /results/live.json --output /results/results.json -fh "$FILENAME"
178
21.375
127
sh
smartbugs
smartbugs-master/tools/securify/scripts/do_solidity.sh
#!/bin/sh FILENAME="$1" BIN="$2" export PATH="$BIN:$PATH" chmod +x "$BIN/solc" mkdir /results java -Xmx16G -jar /securify_jar/securify.jar --livestatusfile /results/live.json --output /results/results.json -fs "$FILENAME"
225
19.545455
127
sh
smartbugs
smartbugs-master/tools/sfuzz/config.yaml
name: sFuzz version: #48934c0 (2019-03-01) info: An Efficient Adaptive Fuzzer for Solidity Smart Contracts origin: https://github.com/duytai/sFuzz image: smartbugs/sfuzz:48934c0 solidity: command: "'$BIN/do_solidity.sh' '$FILENAME' '$TIMEOUT' '$BIN' '$MAIN'" output: /home/contracts bin: scripts solc: y...
323
26
74
yaml
smartbugs
smartbugs-master/tools/sfuzz/findings.yaml
Block Number Dependency: classification: SWC-120, DASP-6 severity: Low Dangerous Delegate Call: classification: SWC-106, DASP-2 Exception Disorder: classification: SWC-104, DASP-4 Freezing Ether: classification: SWC-997, DASP-5 Gasless Send: classification: SWC-134, DASP-10 Integer Overflow...
587
17.967742
36
yaml
smartbugs
smartbugs-master/tools/sfuzz/parser.py
import io import json import os import re import tarfile import sb.parse_utils VERSION = "2023/03/02" FINDINGS = { "Block Number Dependency", "Dangerous Delegate Call", "Exception Disorder", "Freezing Ether", "Gasless Send", "Integer Overflow", "Integer Underflow", "Reentrancy", "...
2,940
30.623656
99
py
smartbugs
smartbugs-master/tools/sfuzz/scripts/do_solidity.sh
#!/bin/bash FILENAME="$1" TIMEOUT="$2" BIN="$3" MAIN="$4" export PATH="$BIN:$PATH" chmod +x "$BIN/solc" CONTRACT="${FILENAME%.sol}" CONTRACT="${CONTRACT##*/}" CONTRACTS=$(python3 "$BIN"/printContractNames.py "$FILENAME") COUNT=$(echo $CONTRACTS | wc -w) [ "$COUNT" -gt 0 ] || COUNT=1 if [ "$MAIN" -eq 1 ]; then i...
938
20.837209
67
sh
smartbugs
smartbugs-master/tools/sfuzz/scripts/printContractNames.py
import sys, json from subprocess import PIPE, Popen filename = sys.argv[1] cmd = ["solc", "--standard-json", "--allow-paths", ".,/"] settings = { "optimizer": {"enabled": False}, "outputSelection": { "*": { "*": [ "evm.deployedBytecode" ], } }, } input_json = json.dumps( { ...
915
25.941176
69
py
smartbugs
smartbugs-master/tools/slither/config.yaml
name: Slither origin: https://github.com/crytic/slither info: Slither is a Solidity static analysis framework written in Python 3. It runs a suite of vulnerability detectors and prints visual information about contract details. Slither enables developers to find vulnerabilities, enhance their code comphrehension, and q...
507
49.8
297
yaml
smartbugs
smartbugs-master/tools/slither/findings.yaml
abiencoderv2-array: {} arbitrary-send: classification: SWC-105, DASP-2 arbitrary-send-erc20: {} arbitrary-send-erc20-permit: {} arbitrary-send-eth: {} array-by-reference: {} assembly: classification: SWC-0, DASP-10 assert-state-change: {} backdoor: {} boolean-cst: {} boolean-equal: {} calls-loop: classifica...
2,790
22.854701
36
yaml
smartbugs
smartbugs-master/tools/slither/parser.py
import io, tarfile, json, re import sb.parse_utils VERSION = "2022/11/14" FINDINGS = { "abiencoderv2-array", "arbitrary-send", "arbitrary-send-erc20", "arbitrary-send-erc20-permit", "arbitrary-send-eth", "array-by-reference", "assembly", "assert-state-change", "backdoor", "bool...
3,971
26.776224
70
py
smartbugs
smartbugs-master/tools/slither/scripts/do_solidity.sh
#!/bin/sh FILENAME="$1" TIMEOUT="$2" BIN="$3" export PATH="$BIN:$PATH" chmod +x "$BIN/solc" slither "$FILENAME" --json /output.json
135
11.363636
39
sh
smartbugs
smartbugs-master/tools/smartcheck/config.yaml
name: Smartcheck origin: https://github.com/smartdec/smartcheck info: Securify automatically checks for vulnerabilities and bad coding practices. It runs lexical and syntactical analysis on Solidity source code. solidity: image: smartbugs/smartcheck entrypoint: "'$BIN/do_solidity.sh' '$FILENAME' '$BIN'" sol...
344
37.333333
147
yaml
smartbugs
smartbugs-master/tools/smartcheck/findings.yaml
SOLIDITY_ADDRESS_HARDCODED: classification: SWC-0, DASP-10 SOLIDITY_ARRAY_LENGTH_MANIPULATION: classification: SWC-0, DASP-10 SOLIDITY_BALANCE_EQUALITY: classification: SWC-132, DASP-10 SOLIDITY_BYTE_ARRAY_INSTEAD_BYTES: {} SOLIDITY_CALL_WITHOUT_DATA: classification: SWC-0, DASP-10 SOLIDITY_CONSTRUCTOR_...
2,671
31.192771
48
yaml
smartbugs
smartbugs-master/tools/smartcheck/parser.py
import sb.parse_utils VERSION = "2022/11/14" FINDINGS = { "SOLIDITY_ADDRESS_HARDCODED", "SOLIDITY_ARRAY_LENGTH_MANIPULATION", "SOLIDITY_BALANCE_EQUALITY", "SOLIDITY_BYTE_ARRAY_INSTEAD_BYTES", "SOLIDITY_CONSTRUCTOR_RETURN", "SOLIDITY_CALL_WITHOUT_DATA", "SOLIDITY_DELETE_ON_DYNAMIC_ARRAYS", ...
2,274
30.597222
63
py
smartbugs
smartbugs-master/tools/smartcheck/scripts/do_solidity.sh
#!/bin/sh FILENAME="$1" BIN="$2" export PATH="$BIN:$PATH" chmod +x "$BIN/solc" smartcheck -p "$FILENAME"
108
9.9
25
sh
smartbugs
smartbugs-master/tools/solhint-2.1.0/config.yaml
name: Solhint version: "2.1.0" origin: https://github.com/protofire/solhint info: Open source project for linting solidity code. This project provide both security and style guide validations. image: smartbugs/solhint solidity: entrypoint: "'$BIN/do_solidity.sh' '$FILENAME' '$TIMEOUT' '$BIN'" solc: yes bin:...
329
32
116
yaml