About ContractScan

Our Mission

Smart contract vulnerabilities have caused billions of dollars in losses across the DeFi ecosystem. Professional security audits cost $8,000–$50,000+ and take weeks — putting them out of reach for independent developers and small teams.

ContractScan exists to democratize smart contract security. We combine multiple industry-standard analysis engines with AI to deliver instant, actionable vulnerability reports — no setup, no CLI, no waiting.

Our goal: every Solidity developer should be able to check their code for known vulnerabilities before deployment, regardless of budget.

What We Do

How It Works

Three steps to a comprehensive vulnerability report.


3-Step Process

1

Upload

Upload your Solidity source code or paste it directly into the scanner.

2

Analyze

Static analysis engine and AI automatically scan your code for known vulnerability patterns.

3

Report

Review your vulnerability report instantly, complete with SWC classification and remediation guidance.

Key Features

Roadmap

Our ultimate goal: detect every vulnerability type ever exploited in production — using real-world case data, not just theoretical patterns.

✅ Shipped

🎯 Long-term Vision

Every vulnerability ever exploited in a production smart contract should be detectable — automatically, before deployment.

We are systematically collecting and indexing every documented DeFi exploit, professional audit finding, and vulnerability pattern to build the most comprehensive smart contract security intelligence database available. The goal is not just pattern matching — it is case-based detection: if a vulnerability caused a real loss, we track it, index it, and detect it.

Analysis Methodology

A transparent look at how ContractScan detects smart contract vulnerabilities.

Multi-Engine Scanning Architecture

ContractScan runs 5 analysis engines in parallel, each using a different detection technique. Enterprise plans add Foundry Fuzz as a 6th engine. Findings confirmed by multiple engines are marked "confirmed" for highest confidence.

EngineMethodPlanDetects
SlitherStatic analysis + data flowQuickScanReentrancy, access control, arithmetic, storage issues, 90+ core patterns
SemgrepPattern matchingQuickScanUnchecked ERC20 transfers, tx.origin, reentrancy, floating pragma, oracle spot price
MythrilSymbolic executionProInteger overflow, assertion violations, unprotected ether, SWC 37-category coverage
AderynAST analysisProCentralization risks, unsafe casting, unused returns, storage issues, Cyfrin-maintained rules
Foundry FuzzDynamic fuzz testingEnterpriseEdge-case arithmetic, state-dependent bugs, invariant violations via randomized inputs
AI (LLM)Code reasoningFull ScanFlash loan surfaces, oracle manipulation, MEV, governance attacks, proxy risks, ERC compliance

Cross-engine confidence scoring: verified = different methodologies agree · high confidence = 3+ engines · confirmed = 2 engines · likely = 1 static engine · potential = AI-only

Language & Engine Coverage

Engine availability depends on the smart contract language. Solidity contracts receive full multi-engine analysis, while Rust/Near contracts are currently analyzed by the AI engine only.

EngineSolidity (.sol)Rust/Near (.rs)
Slither✓ Supported— Not available
Semgrep✓ Supported— Not available
Mythril✓ Supported— Not available
Aderyn✓ Supported— Not available
Foundry Fuzz◎ Enterprise— Not available
AI (LLM)✓ Supported✓ Supported

Rust/Near support is AI-powered analysis — the AI engine reasons about code patterns, access control, storage safety, and Near-specific risks. Static analysis engine support for Rust is on our roadmap.

Vulnerability Coverage (250+ / 350+ patterns)

CategoryExamplesSWC Reference
ReentrancyState changes after external calls, ERC777/ERC1155 callbacks, cross-function reentrancySWC-107
Access ControlUnprotected functions, tx.origin misuse, missing modifiersSWC-105, SWC-115
ArithmeticOverflow/underflow, division before multiply, precision lossSWC-101
Flash Loans / DeFiAMM spot price as oracle, single-block price manipulation, MEV sandwich exposureDeFiHackLabs patterns
Denial of ServiceFailed call loops, msg.value in loops, block gas limitSWC-113, SWC-128
RandomnessPredictable PRNG sources (block.timestamp, blockhash)SWC-120, SWC-116
Upgrade / Proxy SafetyUnprotected upgrade functions, storage collision, uninitialized implementationSWC-118
Low-level CallsUnchecked return values, dangerous delegatecall, hardcoded gasSWC-104, SWC-112, SWC-134
Signature SecuritySignature malleability, replay attacks, missing nonce/chainIdSWC-117, SWC-121
State ManagementUninitialized storage, variable shadowing, incorrect inheritanceSWC-109, SWC-119, SWC-125
Code QualitySelf-destruct usage, deprecated functions, unused variables, hash collisionsSWC-106, SWC-111, SWC-131, SWC-133
PrivacyUnencrypted private data on-chainSWC-136

Live Threat Intelligence

● LIVE

Findings aggregated from public audit reports, competitive auditing platforms, and on-chain post-mortems. Updated daily.

ContractScan automatically collects and indexes real-world DeFi security incidents and professional audit findings from 7 public threat feeds to keep detection patterns current with emerging attack vectors.

🔍 Solodit Audit ReportsiCurated audit findings aggregator by Cyfrin — 16+ top securi…✓ Active
🔬 DeFiHackLabsiOn-chain exploit PoC replays (SunWeb3Sec); primary real-worl…✓ Active
📰 Rekt.newsiDeFi hack post-mortems and investigative analysis via RSS; n…✓ Active
🏆 Code4renaiPublic audit competition platform; high-signal findings from…✓ Active
🛡️ SherlockiAudit + insurance protocol; competitive review reports with …✓ Active
📋 SCV-ListiSmart Contract Vulnerability List — curated CVE-style SCV-ta…✓ Active
📋 SWC RegistryiSmart Contract Weakness Classification registry; authoritati…⏸ Stale
1485+
incidents indexed
7
threat sources
2026-05-03
last collected

Scope & Limitations

✓ ContractScan CAN detect:

  • 250+ vulnerability patterns (Free) / 350+ (Pro) across 5 analysis engines
  • Common Solidity anti-patterns and compiler version issues
  • DeFi-specific risks (flash loan surfaces, oracle issues, MEV)
  • Cross-engine confirmed findings (highest confidence)

✗ ContractScan CANNOT detect:

  • Protocol-specific business logic errors requiring domain knowledge
  • Cryptographic implementation flaws
  • Off-chain vulnerabilities (private key management, admin key security)
  • Governance attack scenarios
  • Cross-contract interaction exploits not visible in a single file
  • Economic/game-theoretic vulnerabilities
  • Zero-day vulnerabilities not yet catalogued

Contact Us

We'd love to hear from you — whether it's feedback, partnership inquiries, or support questions.

Email: contractscan.raccoonworld@gmail.com
Website: contract-scanner.raccoonworld.xyz
Feedback: Submit feedback →

⚠️ Important: ContractScan is a pre-audit screening tool. Results should be treated as a preliminary check only and do not constitute a professional security audit. Always obtain a professional security audit before deploying smart contracts that manage significant value.

Learn about our analysis methodology →