oyente icon indicating copy to clipboard operation
oyente copied to clipboard

Vulnerabilities Detected by Oyente

Open TlxTejaswi opened this issue 6 years ago • 3 comments

Hello Group,

I am researching on various tools for detecting smart contract vulnerabilities and came across Oyente. Through certain documents along with running some tests ran locally on my system, I got to know that besides ensuring good EVM code coverage Oyente catches the following vulnerabilities:

Re-entrancy Integer overflow/underflow Transaction order dependence Timestamp dependence Callstack Depth EVM Code Coverage Parity Multisig bug

I request the members to help me with the complete list of vulnerabilities as it would help us make an important decision regarding the smart contract security tool.

TlxTejaswi avatar Nov 05 '18 08:11 TlxTejaswi

@TlxTejaswi I think you can just refer to their paper (making smart contract smarter)?

yxliang01 avatar Nov 05 '18 13:11 yxliang01

Thanks for the response yxliang01. I have referred to the paper titled "Making Smart Contracts Smarter", and there the vulnerabilities listed are:

Transaction Ordering Dependence Timestamp Dependence Mishandled Exceptions Re-entrancy vulnerability

I have tested the tool against a sample contract and that could detect 8 critical vulnerabilities. So I just want to know whether the 8 is the final or whether the tool is capable of doing more.

TlxTejaswi avatar Nov 06 '18 04:11 TlxTejaswi

@TlxTejaswi Did you get any answer from the project members ? I'm considering using this tool but it seems to me documentation is not so clear and I'm not sure the project is maintained.

omarandres2803 avatar Jun 13 '21 23:06 omarandres2803