Table 1 Mapping of Four Vulnerability Types.

From: Deep learning-based solution for smart contract vulnerabilities detection

Vulnerability

Slither

Smartcheck

Mythril

Re-entrancy

Reentrancy-benign reentrancy-eth reentrancy-unlimited-gas reentrancy-no-eth

SOLIDITY_ETRNANCY

External call to user-supplied address external call to fixed address state change after external call

Timestamp-dependency

Timestamp

SOLIDITY_EXACT_TIME VYPER_TIMESTAMP_DEPENDENCE

Dependence on predictable environment variable

Unhandled-exceptions

Unchecked-send unchecked-lowlevel

SOLIDITY_UNCHECKED_CALL

Unchecked call return value

tx.origin

tx-origin

SOLIDITY_TX_ORIGIN

Use of tx.origin