mirror of https://github.com/ConsenSys/mythril
blockchainethereumsmart-contractssoliditysecurityprogram-analysissecurity-analysissymbolic-execution
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
4.4 KiB
4.4 KiB
Mythril Detection Capabilities
Detection modules, ideas collection and wish list. Contributions are welcome!
Issue | Description | Mythril Detection Module(s) | References |
---|---|---|---|
Unprotected functions | Critical functions such as sends with non-zero value or suicide() calls are callable by anyone, or msg.sender is compared against an address in storage that can be written to. E.g. Parity wallet bugs. | unchecked_suicide, ether_send | |
Missing check on CALL return value | unchecked_retval | Handle errors in external calls | |
Re-entrancy | State changes after external calls should be avoided. Atm there's only basic detection of external calls, this can be improved (see #74) | external call to untrusted contract | Call external functions last Avoid state changes after external calls |
Multiple sends in a single transaction | External calls can fail accidentally or deliberately. Avoid combining multiple send() calls in a single transaction. | Favor pull over push for external calls | |
External call to untrusted contract | external call to untrusted contract | ||
Delegatecall or callcode to untrusted contract | delegatecall_forward, delegatecall_to_dynamic.py | ||
Integer overflow/underflow | integer_underflow | Validate arithmetic | |
Timestamp dependence | Miner time manipulation | ||
Payable transaction does not revert in case of failure | |||
Use of tx.origin |
tx_origin | Solidity documentation, Avoid using tx.origin | |
Type confusion | |||
Predictable RNG | Dependence on predictable variables | ||
Transaction order dependence | Front Running | ||
Information exposure | |||
Complex fallback function (uses more than 2,300 gas) | A too complex fallback function will cause send() and transfer() from other contracts to fail. To implement this we first need to fully implement gas simulation. | ||
Call depth attack | Deprecated! | EIP 150 Hard Fork | |
Use require() instead of assert() | Use assert() only to check against states which should be completely unreachable. |
Exceptions | Solidity docs |
Use of depreciated functions | Use revert() instead of throw() , selfdestruct() instead of suicide() , keccak256() instead of sha3() |
||
Detect tautologies | Detect comparisons that always evaluate to 'true', see also #54 |