Skip to main content

Module vulnerability

Module vulnerability 

Source
Expand description

§Vulnerability Heuristic Scanner

Scans smart contract source code and bytecode for common vulnerability patterns using heuristic analysis. This is NOT a formal verification tool — it identifies patterns that are often associated with vulnerabilities.

§Detected Vulnerability Categories

  • Reentrancy - State changes after external calls
  • Unchecked external calls - Missing return value checks on call/send
  • Selfdestruct - Contracts that can be destroyed
  • Delegatecall - Unprotected delegatecall to user-supplied address
  • tx.origin - Authorization via tx.origin
  • Integer overflow - Pre-Solidity 0.8 without SafeMath
  • Uninitialized storage - Storage variables without initialization
  • Timestamp dependence - Block timestamp manipulation
  • Front-running - Susceptible to MEV/front-running

Structs§

VulnerabilityFinding
A vulnerability finding from heuristic analysis.

Enums§

Severity
Severity level for a vulnerability finding.
VulnCategory
Vulnerability category.

Functions§

scan_bytecode_only
Scan bytecode only (unverified contracts) for basic patterns.
scan_vulnerabilities
Scan verified source code for vulnerability heuristics.