Security analysis tool for EVM bytecode. Supports smart contracts built for Ethereum, Hedera, Quorum, Vechain, Roostock, Tron and other EVM-compatible blockchains.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Nikhil Parasaram 07347e28ff
Remove truffle support (#1218)
5 years ago
.circleci Merge branch 'develop' into edelweiss/2.0 5 years ago
.github/ISSUE_TEMPLATE swc_id -> swc-id 6 years ago
docs Add user supplied assertions module to documentation 5 years ago
mypy-stubs/z3 Add BaseSolver class and restructure Solver and Optimize as children to get more precise type information. Tighten typing of BaseSolver.add and BaseSolver.append; Fix PEP8 nits 6 years ago
mythril Remove truffle support (#1218) 5 years ago
solidity_examples Fix merge conflicts 6 years ago
static Rename logo file 6 years ago
tests Remove truffle support (#1218) 5 years ago
.editorconfig An extra newline was being added by the editor 7 years ago
.gitattributes Add highlight for solidity files (#732) 6 years ago
.gitignore Mock leveldb and fire_lasers tests 6 years ago
CONTRIBUTING.md Fix some minor typos (#1003) 6 years ago
Dockerfile Fix Dockerfile 6 years ago
LICENSE Update LICENSE 7 years ago
MANIFEST.in Move signatures.db to assets and also copy signatures to .mythril home directory 6 years ago
README.md Update wiki links to Read the Docs links 5 years ago
all_tests.sh Remove solc version check in tests 5 years ago
coverage_report.sh Use xml coverage report 6 years ago
docker_build_and_deploy.sh Another fix of the docker build & release script 6 years ago
myth Grammar fix 5 years ago
requirements.txt Added support for solidity 0.5.x (#1219) 5 years ago
setup.py Added support for solidity 0.5.x (#1219) 5 years ago
tox.ini Added support for solidity 0.5.x (#1219) 5 years ago

README.md

Mythril

Discord PyPI Read the Docs Master Build Status Sonarcloud - Maintainability Pypi Installs DockerHub Pulls

Mythril is a security analysis tool for EVM bytecode. It detects security vulnerabilities in smart contracts built for Ethereum, Quorum, Vechain, Roostock, Tron and other EVM-compatible blockchains. It uses symbolic execution, SMT solving and taint analysis detect a variety of security vulnerabilities. It's also used (in combination with other tools and techniques) in the MythX security analysis platform.

If you are a smart contract developer, we recommend using MythX tools which are optimized for usability and cover a wider range of security issues.

Whether you want to contribute, need support, or want to learn what we have cooking for the future, our Discord server will serve your needs.

Installation and setup

Get it with Docker:

$ docker pull mythril/myth

Install from Pypi:

$ pip3 install mythril

See the docs for more detailed instructions.

Usage

Run:

$ myth analyze <solidity-file>

Or:

$ myth analyze -a <contract-address>

Specify the maximum number of transaction to explore with -t <number>. You can also set a timeout with --execution-timeout <seconds>. Example (source code):

==== Unprotected Selfdestruct ====
SWC ID: 106
Severity: High
Contract: KillBilly
Function name: commencekilling()
PC address: 354
Estimated Gas Usage: 574 - 999
The contract can be killed by anyone.
Anyone can kill this contract and withdraw its balance to an arbitrary address.
--------------------
In file: killbilly.sol:22

selfdestruct(msg.sender)

--------------------
Transaction Sequence:

Caller: [CREATOR], data: [CONTRACT CREATION], value: 0x0
Caller: [ATTACKER], function: killerize(address), txdata: 0x9fa299ccbebebebebebebebebebebebedeadbeefdeadbeefdeadbeefdeadbeefdeadbeef, value: 0x0
Caller: [ATTACKER], function: activatekillability(), txdata: 0x84057065, value: 0x0
Caller: [ATTACKER], function: commencekilling(), txdata: 0x7c11da20, value: 0x0

Instructions for using Mythril are found on the docs.

For support or general discussions please join the Mythril community on Discord.

Bulding the Documentation

Mythril's documentation is contained in the docs folder and is published to Read the Docs. It is based on Sphinx and can be built using the Makefile contained in the subdirectory:

cd docs
make html

This will create a build output directory containing the HTML output. Alternatively, PDF documentation can be built with make latexpdf. The available output format options can be seen with make help.

Vulnerability Remediation

Visit the Smart Contract Vulnerability Classification Registry to find detailed information and remediation guidance for the vulnerabilities reported.