./BACK_TO_PROJECTS
Offensive Security2025

Smart Contract Vulnerability Scanner

Automated detection pipeline identifying 15+ critical vulnerability patterns (Reentrancy, Overflow) with zero false negatives.

Detection Pipeline

01. Multi-Engine Scan

Source code is ingested by Slither for dataflow analysis, while Mythril performs symbolic execution on bytecode.

INPUT: SOLIDITY● PARSING
Contract.sol → AST & Bytecode
PATTERN MATCHINGACTIVE
Detectors: [Reentrancy, Tx.Origin, Overflow]

02. Vulnerability Matching

Custom detector rules filter false positives by cross-referencing findings from both static engines.

03. Automated Reporting

Generates a PDF audit report with severity classification, line numbers, and specific remediation steps.

OUTPUTCRITICAL FOUND
Report_v1.pdf (High Severity)

Custom Detection Logic

A custom Slither detector written in Python to identify Reentrancy vulnerabilities by checking for state writes after external calls.

Python
detectors/reentrancy_check.py
class ReentrancyDetector(AbstractDetector):
    ARGUMENT = 'reentrancy-custom'
    HELP = 'Detects reentrancy patterns in external calls'
    
    def _detect(self):
        results = []
        for contract in self.contracts:
            for function in contract.functions:
                # Check for low-level call
                if function.contains_call():
                    # Check if state variable is written AFTER call
                    if self._check_state_write_after_call(function):
                        info = [function, " contains potential reentrancy."]
                        results.append(self.generate_result(info))
        return results

Security Stack

Analysis Engines

SlitherMythrilManticore

Core Framework

Python 3.10Solidity 0.8+

Targets

Smart ContractsDeFi Protocols

Impact Metrics

15+
Vuln Patterns
40%
Time Saved
0
False Negatives
100%
Bytecode Coverage

Ready to test your smart contracts?