5.4 KiB
Mythril
Mythril is a reverse engineering and bug hunting framework for the Ethereum blockchain.
Installation and setup
Install from Pypi:
$ pip install mythril
Or, clone the GitHub repo to install the newest master branch:
$ git clone https://github.com/b-mueller/mythril/
$ cd mythril
$ python setup.py install
Note that Mythril requires Python 3.5 to work.
You also need a go-ethereum node that is synced with the network (note that Mythril uses non-standard RPC APIs only supported by go-ethereum, so other clients likely won't work). Start the node as follows:
$ geth --rpc --rpcapi eth,debug --syncmode fast
Database initialization
Mythril builds its own contract database to enable fast search operations. This is to enable operations like those described in the legendary "Mitch Brenner" blog post in seconds minutes instead of days. Unfortunately, the initial sync process is slow. You don't need to sync the whole blockchain right away though: If you abort the syncing process with ctrl+c
, it will be auto-resumed the next time you run the --init-db
command.
$ myth --init-db
Starting synchronization from latest block: 4323706
Processing block 4323000, 3 individual contracts in database
(...)
Mythril retrieves contract data over RPC by default. You can switch to IPC using the --ipc
flag.
The default behavior is to only sync contracts with a non-zero balance. You can disable this behavior with the --sync-all
flag, but be aware that this will result in a huge (as in: dozens of GB) database.
Command line usage
The Mythril command line tool (aptly named myth
) allows you to conveniently access some of Mythril's functionality.
Searching the database
The search feature allows you to find contract instances that contain specific function calls and opcode sequences. It supports simple boolean expressions, such as:
$ myth --search "func#changeMultisig(address)#"
$ myth --search "code#PUSH1 0x50,POP#"
$ myth --search "func#changeMultisig(address)# and code#PUSH1 0x50#"
Disassembler
Use the -d
flag to disassemble code. The disassembler accepts a bytecode string or a contract address as its input.
$ myth -d -c "$ ./myth -d -c "5060"
0 PUSH1 0x60
Specifying an address via -a ADDRESS
will download the contract code from your node. Mythril will try to resolve function names using the signatures in database/signature.json
:
$ myth -d -a "0x2a0c0dbecc7e4d658f48e01e3fa353f44050c208"
0 PUSH1 0x60
2 PUSH1 0x40
4 MSTORE
(...)
1135 - FUNCTION safeAdd(uint256,uint256) -
1136 CALLVALUE
1137 ISZERO
Finding cross-references
It is often useful to find other contracts referenced by a particular contract. E.g.:
$ myth --search "code#DELEGATECALL#"
Matched contract with code hash 07459966443977122e639cbf7804c446
Address: 0x76799f77587738bfeef09452df215b63d2cfb08a, balance: 1000000000000000
$ myth --xrefs 07459966443977122e639cbf7804c446
5b9e8728e316bbeb692d22daaab74f6cbf2c4691
Symbolic execution
Mythril integrates the LASER symbolic virtual machine. Right now, this is mainly used for CFG generation. The -g FILENAME
option generates an interactive jsViz graph:
$ myth -g ./graph.html -a "0xFa52274DD61E1643d2205169732f29114BC240b3"
The "bounce" effect, while awesome (and thus enabled by default), sometimes messes up the graph layout. If that happens, disable the effect with the --disable-physics
flag.
Custom scripts
By combining Mythril and PyEthereum modules, you can automate more complex static and dynamic analysis tasks. Here is an example.
Issues
The database sync is currently not very efficient.
- Using PyEthereum: I encountered issues syncing PyEthereum with Homestead. Also, PyEthApp only supports Python 2.7, which causes issues with other important packages.
- Accessing the Go-Ethereum LevelDB: This would be a great option. However, PyEthereum database code seems unable to deal with Go-Ethereum's LevelDB. It would take quite a bit of effort to figure this out.
I'm writing this in my spare time, so contributors would be highly welcome!
Credit
-
JSON RPC library is adapted from ethjsonrpc (it doesn't seem to be maintained anymore, and I needed to make some changes to it).
-
The signature data in
signatures.json
has been obtained from the Ethereum Function Signature Database.
Disclaimer: Act responsibly!
The purpose of project is to aid discovery of vulnerable smart contracts on the Ethereum mainnet and support research for novel security flaws. If you do find an exploitable issue or vulnerable contract instances, please do the right thing. Also, note that vulnerability branding ("etherbleed", "chainshock",...) is highly discouraged as it will annoy the author and others in the security community.