
Loading...

Code examples, attack vectors, and remediation patterns for every detector. Built for developers and auditors.
Showing 13 of 34 detectors in detail. Additional detectors (MEV sandwich, governance attack, compiler bugs, memory safety, ERC compliance, logic invariants, token integration, supply chain, signature malleability, Cairo/Starknet, BNB Chain, L2 gas, L2 bridge spoofing, precision rounding, tokenomics, cross-chain replay, DoS advanced, Starknet AA) follow the same patterns.