smart-contract-vulnerabilities

Smart contract vulnerability playbook. Use when auditing Solidity/EVM contracts for reentrancy, integer overflow, access control, delegatecall, flash loan, signature replay, and MEV-related attack patterns.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "smart-contract-vulnerabilities" with this command: npx skills add yaklang/hack-skills/yaklang-hack-skills-smart-contract-vulnerabilities

SKILL: Smart Contract Vulnerabilities — Expert Attack Playbook

AI LOAD INSTRUCTION: Expert smart contract audit techniques. Covers reentrancy (single, cross-function, cross-contract, read-only), integer overflow, access control, delegatecall, randomness manipulation, flash loans, signature replay, front-running/MEV, and CREATE2 exploitation. Base models miss subtle cross-contract reentrancy and storage layout collisions in proxy patterns.

0. RELATED ROUTING

  • defi-attack-patterns when the vulnerability is part of a DeFi protocol exploit (flash loans, oracle manipulation, governance attacks)
  • deserialization-insecure when the target is off-chain infrastructure deserializing blockchain data

Advanced Reference

Also load SOLIDITY_VULN_PATTERNS.md when you need:

  • Side-by-side vulnerable vs fixed code patterns for each vulnerability class
  • Gas optimization traps that introduce vulnerabilities
  • Proxy pattern storage collision examples with slot calculations

1. REENTRANCY

The most iconic smart contract vulnerability. External calls transfer execution control; if state is not updated before the call, the callee can re-enter.

1.1 Classic Reentrancy (Single-Function)

Victim.withdraw()
  ├── checks balance[msg.sender] > 0          ✓
  ├── msg.sender.call{value: balance}("")     ← external call
  │   └── Attacker.receive()
  │       └── Victim.withdraw()               ← re-enters before state update
  │           ├── checks balance[msg.sender]   ← still > 0!
  │           └── sends ETH again
  └── balance[msg.sender] = 0                 ← too late

1.2 Cross-Function Reentrancy

Two functions share state; attacker re-enters a different function during callback:

StepExecutionState
1Call withdraw() → external callbalance still positive
2Attacker fallback calls transfer(attacker2)balance used before reset
3transfer reads stale balance → moves fundsattacker2 receives tokens
4Original withdraw completes, zeroes balancedamage done

1.3 Cross-Contract Reentrancy

Contract A calls Contract B, which calls back into Contract A (or Contract C that reads A's stale state). Especially dangerous in DeFi protocols where multiple contracts share state.

1.4 Read-Only Reentrancy

The re-entered function is a view function used by a third-party contract for price calculation. No state modification in the victim, but the stale intermediate state misleads the reader.

Real-world: Curve pool get_virtual_price() read during remove_liquidity() callback → inflated price → profit on dependent lending protocol.

Mitigations

PatternProtection Level
Checks-Effects-Interactions (CEI)Core defense; update state before external call
ReentrancyGuard (OpenZeppelin)Mutex lock; prevents same-tx re-entry
Pull payment patternEliminate external calls in state-changing functions
CEI + guard on all public functionsDefense-in-depth against cross-function

2. INTEGER OVERFLOW / UNDERFLOW

Pre-Solidity 0.8

Arithmetic silently wraps: uint8(255) + 1 == 0, uint8(0) - 1 == 255.

AttackExample
Balance underflowbalances[attacker] -= amount when amount > balance → huge balance
Supply overflowtotalSupply + mintAmount wraps → bypass cap checks
Timelock bypasslockTime[msg.sender] + extend wraps to past → early unlock

Post-Solidity 0.8

Default checked arithmetic reverts on overflow. But unchecked{} blocks reintroduce risk:

unchecked {
    // "gas optimization" — but if i can be influenced by user input, overflow returns
    for (uint i = start; i < end; i++) { ... }
}

SafeMath Bypass Scenarios

  • Casting: uint256uint128 truncation before SafeMath check
  • Assembly blocks: mstore / add bypass Solidity-level checks
  • Intermediate multiplication overflow before division: (a * b) / c where a * b overflows

3. ACCESS CONTROL

tx.origin vs msg.sender

Propertymsg.sendertx.origin
ValueImmediate callerEOA that initiated the tx
Safe for authYesNo — phishing contract can inherit tx.origin

Attack: trick owner into calling attacker contract → attacker contract calls victim with owner's tx.origin.

Common Patterns

IssueImpact
Missing onlyOwner on critical functionsAnyone can call admin functions
Unprotected selfdestructAnyone can destroy the contract, force-send ETH
Unprotected delegatecallAttacker executes arbitrary code in victim's context
Default visibility (pre-0.6.0)Functions default to public
Missing zero-address checksOwnership transferred to address(0)

4. RANDOMNESS MANIPULATION

On-chain randomness sources are predictable to miners/validators:

SourcePredictability
block.timestampMiner has ~15s window to manipulate
blockhash(block.number - 1)Known to all at execution time
blockhash(block.number)Always returns 0 (current block hash unknown)
block.difficulty / block.prevrandaoPost-merge: known beacon chain value

Commit-reveal bypass: If reveal phase doesn't enforce timeout or bond, attacker can choose not to reveal unfavorable outcomes (selective abort attack).


5. DELEGATECALL VULNERABILITIES

delegatecall executes callee's code in caller's storage context. Storage slot layout must match exactly.

Storage Layout Collision

Proxy (storage):         Implementation (code):
slot 0: owner            slot 0: someVariable
slot 1: implementation   slot 1: anotherVariable

Implementation writes to someVariable (slot 0) → overwrites proxy's owner. Attacker calls implementation function that writes slot 0 → becomes proxy owner.

Function Selector Collision

4-byte function selectors can collide. If proxy's admin() selector collides with implementation's transfer(), calling admin() on the proxy executes transfer() logic.

Tool: cast selectors <bytecode> (Foundry) to enumerate selectors.


6. FRONT-RUNNING / MEV

Transaction Ordering Manipulation

Victim submits DEX swap tx (visible in mempool)
├── Front-runner: buy token before victim (raise price)
├── Victim tx executes at worse price
└── Back-runner: sell token after victim (profit from spread)
= Sandwich attack

Protection Patterns

DefenseMechanism
Commit-revealHide transaction intent until reveal
Flashbots / private mempoolSubmit tx directly to block builder
Slippage protectionSet minAmountOut to limit MEV extraction
Time-lockDelay execution to reduce predictability

7. SIGNATURE REPLAY

Missing Nonce

Reuse a valid signature to repeat the action (e.g., transfer) multiple times.

Cross-Chain Replay

Same contract deployed on multiple chains with same address → signature valid on all chains. Must include block.chainid in signed message.

EIP-712 Implementation Errors

ErrorConsequence
Missing DOMAIN_SEPARATOR with chainIdCross-chain replay
Domain separator cached at deployBreaks after hard fork changing chainId
Missing nonce in struct hashSignature replay
ecrecover returns address(0) on invalid sigPasses == address(0) owner check

8. SELF-DESTRUCT & FORCE-SEND ETH

selfdestruct(recipient) force-sends all contract ETH to recipient — bypasses receive() and fallback(), cannot be rejected.

Breaks contracts that rely on address(this).balance for logic (e.g., require(balance == expected)).

Post-EIP-6780 (Dencun): selfdestruct only sends ETH; code/storage deletion only if called in same tx as creation.


9. CREATE2 & DETERMINISTIC ADDRESS EXPLOITATION

CREATE2 address = keccak256(0xff ++ deployer ++ salt ++ keccak256(initCode)).

AttackMethod
Pre-fund exploitationPredict address → send tokens/ETH before deployment → selfdestruct → redeploy different code at same address
Pre-approve exploitationPredicted address gets token approvals → deploy malicious contract → drain approved tokens
Metamorphic contractsCREATE2selfdestructCREATE2 with same salt but different initCode (pre-EIP-6780)

10. FLASH LOAN ATTACK PATTERNS

Single transaction:
├── Borrow large amount (no collateral)
├── Manipulate state (price oracle, governance, etc.)
├── Extract profit from manipulated state
├── Repay loan + fee
└── Keep profit

Key: entire sequence must succeed atomically or the whole tx reverts.


11. SHORT ADDRESS ATTACK

EVM pads missing bytes in ABI-encoded calldata with zeros. If transfer(address, uint256) is called with a 19-byte address, the uint256 amount shifts left by 8 bits → multiplied by 256.

Mitigation: validate calldata length; modern Solidity compilers add checks.


12. TOOLS

ToolPurposeUsage
SlitherStatic analysis, vulnerability detectionslither . in project root
MythrilSymbolic execution, path explorationmyth analyze contract.sol
EchidnaProperty-based fuzzingDefine invariants, fuzz for violations
Foundry (Forge)Test framework, fuzzing, gas analysisforge test --fuzz-runs 10000
HardhatDevelopment, testing, deploymentnpx hardhat test
CertoraFormal verificationWrite specs, prove/disprove properties
4naly3erAutomated gas optimization + vuln reportCI integration

13. DECISION TREE

Auditing a smart contract?
├── Is it a proxy pattern?
│   ├── Yes → Check storage layout collision (Section 5)
│   │   ├── Compare slot assignments between proxy and implementation
│   │   ├── Check for function selector collision
│   │   └── Verify initializer cannot be called twice
│   └── No → Continue
├── Does it make external calls?
│   ├── Yes → Check reentrancy (Section 1)
│   │   ├── State updated before call? → CEI pattern OK
│   │   ├── ReentrancyGuard present? → Check all entry points
│   │   ├── Cross-function state sharing? → Cross-function reentrancy risk
│   │   └── View functions read during callback? → Read-only reentrancy
│   └── No → Continue
├── Does it handle tokens/ETH?
│   ├── Yes → Check integer overflow (Section 2)
│   │   ├── Solidity < 0.8? → All arithmetic suspect
│   │   ├── unchecked{} blocks? → Verify no user-influenced values
│   │   └── Casting between uint sizes? → Truncation risk
│   └── Also check self-destruct force-send (Section 8)
├── Does it use signatures?
│   ├── Yes → Check replay (Section 7)
│   │   ├── Nonce included? → Verify incremented
│   │   ├── ChainId included? → Cross-chain safe
│   │   └── ecrecover result checked for address(0)? → OK
│   └── No → Continue
├── Does it use on-chain randomness?
│   ├── Yes → Predictable (Section 4)
│   │   └── Recommend Chainlink VRF or commit-reveal with bond
│   └── No → Continue
├── Does it interact with DeFi protocols?
│   ├── Yes → Load [defi-attack-patterns](../defi-attack-patterns/SKILL.md)
│   │   ├── Flash loan vectors
│   │   ├── Oracle manipulation
│   │   └── MEV exposure
│   └── No → Continue
├── Does it use CREATE2?
│   ├── Yes → Check deterministic address exploitation (Section 9)
│   └── No → Continue
└── Run automated tools (Section 12)
    ├── Slither for static analysis
    ├── Mythril for symbolic execution
    └── Echidna for fuzzing invariants

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

websocket-security

No summary provided by upstream source.

Repository SourceNeeds Review
Security

ai-ml-security

No summary provided by upstream source.

Repository SourceNeeds Review
Security

linux-security-bypass

No summary provided by upstream source.

Repository SourceNeeds Review
Security

macos-security-bypass

No summary provided by upstream source.

Repository SourceNeeds Review