

SLITHER IO DOWNLOAD PATCH
slither-format: Automatic patch generation.slither-check-erc: Check the ERC's conformance.slither-prop: Automatic unit test and property generation.slither-check-upgradeability: Review delegatecall-based upgradeability.See the Printer documentation for the complete lists. To run a printer, use -print and a comma-separated list of printers. not-pausable: Print functions that do not use whenNotPaused modifier.vars-and-auth: Print the state variables written and the authorization of the functions.function-summary: Print a summary of the functions.call-graph: Export the call-graph of the contracts to a dot file.
SLITHER IO DOWNLOAD CODE

Reentrancy vulnerabilities leading to out-of-order Eventsĭetects functions with high (> 11) cyclomatic complexityĭetects using-for statement usage when no function from a given library matches a given typeĬonformity to Solidity naming conventions Local variables used prior their declaration Uninitialized function pointer calls in constructors Modifiers that can return the default value Reentrancy vulnerabilities (no theft of ethers) State variables shadowing from abstract contracts Signed storage integer array compiler bugĭetects ERC20 tokens that have a function whose signature collides with EIP-2612's DOMAIN_SEPARATOR()ĭeletion on mapping containing a structure Reentrancy vulnerabilities (theft of ethers) Payable functions using delegatecall inside a loop TransferFrom uses arbitrary from with permitįunctions that send Ether to arbitrary destinations Right-To-Left-Override control character is usedįunctions allowing anyone to destruct the contract The order of parameters in a shift instruction is incorrect. To generate a Markdown with GitHub source code highlighting, use slither -checklist -markdown-root (replace ORG, REPO, COMMIT).To generate a Markdown report, use slither -checklist.For GitHub action integration, use slither-action.Run Slither on a Hardhat/Foundry/Dapp/Brownie application:ĭocker run -it -v /home/share:/share trailofbits/eth-security-toolbox Integration Integrates with Github's code scanning in CI.Average execution time of less than 1 second per contract.Correctly parses 99.9% of all public Solidity code.Intermediate representation ( SlithIR) enables simple, high-precision analyses.Ability to analyze contracts written with Solidity >= 0.4.Detector API to write custom analyses in Python.Built-in 'printers' quickly report crucial contract information.Easily integrates into continuous integration and Hardhat/Foundry builds.Identifies where the error condition occurs in the source code.Detects vulnerable Solidity code with low false positives (see the list of trophies).Slither enables developers to find vulnerabilities, enhance their code comprehension, and quickly prototype custom analyses. It runs a suite of vulnerability detectors, prints visual information about contract details, and provides an API to easily write custom analyses. Slither is a Solidity static analysis framework written in Python3.
