Focuses on common vulnerability patterns:
Reentrancy attacks
Integer overflow/underflow
Access control issues
Specialized analysis for token contracts:
ERC-20 Detector:
Missing return values in transfer functions
Approval race conditions
Interface compliance verification
Standard-specific security patterns
ERC-721 Detector:
NFT-specific vulnerabilities
Metadata handling issues
Transfer mechanism validation
Comprehensive deep-logic evaluation:
Function call tree analysis (internal/external calls)
State variable interaction mapping
Privilege escalation risk assessment
Complex contract interaction patterns
Centralized control risk identification
Last updated 8 months ago