Our Analysis Methodology

A transparent look at how ContractScan detects smart contract vulnerabilities.

Static Analysis Layer

ContractScan uses Slither, an industry-leading open-source static analysis framework for Solidity, as its foundation. Slither is developed by Trail of Bits and is trusted by major DeFi protocols.

AI Enhancement Layer

Analysis results are enriched by large language models that provide:

Vulnerability Coverage (23+ patterns)

Category Examples SWC Reference
ReentrancyState changes after external callsSWC-107
Access ControlUnprotected functions, tx.origin misuseSWC-105, SWC-115
ArithmeticOverflow/underflow, division before multiplySWC-101
Denial of ServiceFailed call loops, msg.value in loopsSWC-113
RandomnessPredictable PRNG sourcesSWC-120
Upgrade SafetyUnprotected upgrade functionsSWC-118
Low-level CallsUnchecked return values, dangerous delegatecallSWC-104, SWC-112
State ManagementUninitialized storage, variable shadowingSWC-109, SWC-119
Self-destructUnprotected selfdestruct callsSWC-106

What We Reference

Scope & Limitations

✓ ContractScan CAN detect:

  • Known static vulnerability patterns listed above
  • Common Solidity anti-patterns
  • Basic access control issues
  • Standard reentrancy patterns

✗ ContractScan CANNOT detect:

  • Business logic errors specific to your protocol
  • Flash loan attack vectors
  • Price oracle manipulation
  • Governance attack scenarios
  • Cross-contract interaction exploits not visible in a single file
  • Economic/game-theoretic vulnerabilities
  • Zero-day vulnerabilities not yet catalogued