Table 1 Mapping of Four Vulnerability Types.
From: Deep learning-based solution for smart contract vulnerabilities detection
Vulnerability | Slither | Smartcheck | Mythril |
---|---|---|---|
Re-entrancy | Reentrancy-benign reentrancy-eth reentrancy-unlimited-gas reentrancy-no-eth | SOLIDITY_ETRNANCY | External call to user-supplied address external call to fixed address state change after external call |
Timestamp-dependency | Timestamp | SOLIDITY_EXACT_TIME VYPER_TIMESTAMP_DEPENDENCE | Dependence on predictable environment variable |
Unhandled-exceptions | Unchecked-send unchecked-lowlevel | SOLIDITY_UNCHECKED_CALL | Unchecked call return value |
tx.origin | tx-origin | SOLIDITY_TX_ORIGIN | Use of tx.origin |