Skip to content

anajuliabit/web3-bug-contests-analyze-2023

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

36 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Web 3 Bugs Contests Analyze 2023

This repository includes a dataset of high vulnerabilities recorded on the platforms Code 4 Arena and Sherlock between January and September 2023. The dataset comprises 145 vulnerabilities, which have been manually categorized into the classifications described here.

A paper has been prepared to present the findings of this analysis.

Contests

The contests analyzed were the following:

PLATFORMCATEGORYCONTESTBOUNTYHRFnSLOCPARTICIPANTSDATE
Code4renaDAOArbitrum security council election system9050012184392023-09
Code4renaDAOLlama6050022096502023-07
Code4renaStablecoinLybra finance60500817621362023-08
Code4renaDexesMaia DAO ecosystem3005003510997852023-05
Code4renaYieldPoolTogether121650933241172023-07
Code4renaYieldPoolTogether v5: part deux4200021001452023-08
SherlockLendingAjna update85600656591552023-06
SherlockYield AgreggatorBlueberry72500102842023-02
SherlockYield AgreggatorBlueberry Update #323600536331832023-08
SherlockOptionsBond options2360028851532023-07
SherlockLendingCooler update1700045121702023-08
SherlockDexesGFX labs2040027161062023-07
SherlockDerivativesGMX2000005105712202023-04
SherlockLendingIron bank67400122412712023-05
SherlockDerivativesPerennial122000140632202023-05
SherlockDerivativesPerennial v2125200624942522023-07
SherlockDerivativesSymmetrical91000835532332023-06
SherlockDerivativesSymmetrical Update2760023921522023-08
SherlockLaunchpadTokensoft2140017692212023-07
SherlockStablecoinUnitas protocol36400114332082023-06
Code4renaRWAOndo finance6050014365742023-01
SherlockIndexesIndex coop130600243832832023-05
SherlockStablecoinUSSD1820034022242023-05
SherlockRWADinari1600015751762023-07
SherlockDexesRealWagmi33200510802032023-06
Code4renaDAONouns DAO10000019098362023-07
SherlockDexesDODO v357800520791512023-06
SherlockDerivativesHubble Exchange60000319451482023-06
Code4renaStablecoinAngle Protocol525003227652023-07
Code4renaLiquidity managerArrakis81400228012472023-06
SherlockDexesUnstoppable36400820351302023-06
TOTALS22559501453095.1157.32258

Labels

  • HRF: High Risk Findings
  • nSLOC: Source lines of code number

Data analyze

  • Identifying vulnerabilities in smart contract systems is a crucial task that requires a high level of expertise. In this regard, auditors face certain challenges in uncovering specific types of vulnerabilities. Of the various types of vulnerabilities, those related to contract implementation-specific bugs (C8), followed by C02 and C10, are particularly difficult to spot. Conversely, C05, C14, and C01 are the easiest to identify.
  • Erroneous state updates (C03), privilege escalation and access control issues (C05), and wrong math (C06) are the dominant classes of vulnerabilities across multiple categories. This suggests that these vulnerability types are common in general. Specifically, erroneous state updates are found in eight categories, while privilege escalation and access control issues (C05) and wrong math (C06) appear in seven categories.
  • Certain classes of vulnerabilities appear less frequently, indicating that they may be specific to certain protocol types or more challenging to find. For example, classes such as lack of signature replay protection (C09), missing check (C10), and contract implementation-specific bugs (C08) are sparse.
  • Different protocol categories have different vulnerability profiles. Dexes protocols had the highest number of identified bugs, with 47 classified, followed by Derivatives with 25 and Aggregator and Stablecoin with 15 each.
  • Wrong math (C06) is the most frequent classification across all categories, with 36 bugs classified as such. Broken business logic (C07) is the second most frequent classification, with 31 identified bugs. Erroneous state updates (C03) and missing check (C10) follow with 19 and 11 bugs classified, respectively. Finally, 10 bugs were classified as Mempool Manipulation / Front-Running Vulnerabilities (C01).
  • The relationship between vulnerability categories and different protocol types is complex. Wrong math (C06) is the most frequent classification found in Derivatives, Yield Aggregator, and Stablecoins, while Broken business logic (C07) is the most frequent classification found in Dexes and Yield. Additionally, arrays (C14) and wrong math (C06) are the second most common type of bugs found in Dexes.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published