Expand description
§Vulnerability Heuristic Scanner
Scans smart contract source code and bytecode for common vulnerability patterns using heuristic analysis. This is NOT a formal verification tool — it identifies patterns that are often associated with vulnerabilities.
§Detected Vulnerability Categories
- Reentrancy - State changes after external calls
- Unchecked external calls - Missing return value checks on call/send
- Selfdestruct - Contracts that can be destroyed
- Delegatecall - Unprotected delegatecall to user-supplied address
- tx.origin - Authorization via tx.origin
- Integer overflow - Pre-Solidity 0.8 without SafeMath
- Uninitialized storage - Storage variables without initialization
- Timestamp dependence - Block timestamp manipulation
- Front-running - Susceptible to MEV/front-running
Structs§
- Vulnerability
Finding - A vulnerability finding from heuristic analysis.
Enums§
- Severity
- Severity level for a vulnerability finding.
- Vuln
Category - Vulnerability category.
Functions§
- scan_
bytecode_ only - Scan bytecode only (unverified contracts) for basic patterns.
- scan_
vulnerabilities - Scan verified source code for vulnerability heuristics.