GuardRails

GuardRails

  • Documentation
  • Blog
  • Languages iconEnglish
    • 中文

›Solidity

Overview

  • Introduction
  • What is GuardRails
  • Getting started
  • Configuration
  • False Positives
  • FAQ
  • Glossary
  • Build Status on Pull Requests
  • Tools & Licenses
  • Terms and Conditions
  • Privacy Policy
  • Security at GuardRails
  • Changelog

Vulnerabilities

  • Introduction
  • C/C++

    • Overview

    Elixir

    • Overview

    Go

    • Overview
    • Insecure File Management
    • Insecure Network Communication
    • Insecure Processing of Data
    • Insecure Use of Cryptography
    • Insecure Use of Dangerous Function
    • Insecure Use of SQL Queries

    Java

    • Overview
    • Using Vulnerable Libraries
    • Insecure Use of SQL Queries
    • Insecure Use of Dangerous Function
    • Insecure Use of Regular Expressions
    • Insecure Insecure Authentication
    • Insecure Configuration
    • Insecure File Management
    • Insecure Use of Cryptography
    • Insecure Use of Language/Framework API
    • Insecure Processing of Data
    • Insecure Network Communication

    Javascript

    • Overview
    • Insecure Use of SQL Queries
    • Insecure Use of Regular Expressions
    • Insecure Use of Language/Framework API
    • Insecure Use of Dangerous Function
    • Using Vulnerable Libraries

    PHP

    • Overview
    • Insecure Configuration
    • Insecure File Management
    • Insecure Network Communication
    • Insecure Processing of Data
    • Insecure Use of Dangerous Function
    • Insecure Use of Language/Framework API
    • Insecure Use of Regular Expressions
    • Insecure Use of SQL Queries
    • Using Vulnerable Libraries

    Python

    • Overview
    • Insecure Configuration
    • Insecure Use of Cryptography
    • Insecure Network Communication
    • Insecure Use of Dangerous Function
    • Insecure Use of SQL Queries
    • Using Vulnerable Libraries

    Ruby

    • Overview
    • Insecure Access Control
    • Insecure Configuration
    • Insecure File Management
    • Insecure Network Communication
    • Insecure Processing of Data
    • Insecure Use of Dangerous Function
    • Insecure Use of Language/Framework API
    • Insecure Use of Regular Expressions
    • Insecure Use of SQL Queries
    • Using Vulnerable Libraries

    Solidity

    • Overview
    • Insecure Integer Arithmetic
    • Insecure Use of Low-Level Call
    • Reliance on Insecure Random Numbers
    • State Change After External Call
    • Transaction Order Dependence
    • Unprotected Critical Function
    • Use of Insecure Function
    • Dependence on Predictable Environment Variables
    • Write to Arbitrary Storage Location
    • Call to Untrusted Contract

    General

    • Overview
    • Hard-Coded Secrets

Overview

This is the documentation for Solidity vulnerabilities that are detected by GuardRails. The documentation is grouped based on vulnerability category.

See the child pages for more information:

  • Insecure Integer Arithmetic
  • Insecure Use of Low-Level Call
  • Reliance on Insecure Random Numbers
  • Stage Change After External Call
  • Transaction Order Dependence
  • Unprotected Critical Function
  • Use of Insecure Function
  • Dependence on Predictable Environment Variable
  • Write to Arbitrary Storage
  • Call to Untrusted Contract
← Using Vulnerable LibrariesInsecure Integer Arithmetic →
Our Contact
hello@guardrails.io
531A Upper Cross Street
Singapore 051531
GuardRails

Thousands of repositories are now secured by GuardRails. We've created the solution that will help your developers get better security results.

What are you waiting for?

Try GuardRails now!

  • Status
  • Help
  • Security
  • Terms
  • Privacy

© 2019 GuardRails