Scan Report
22 /100
Auto Bug Finder
Iterative LLM-inspired Solidity smart contract security scanner that runs multi-tool analysis (Slither, Hardhat) in sprints to find and fix bugs
Legitimate Solidity security scanner that runs standard development tools (Hardhat, Slither) with undocumented auto-fix patching capability.
Safe to install
Add explicit declaration of shell execution (exec) and filesystem write access for patch application to SKILL.md. Consider restricting auto-fix to a dry-run mode.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Medium | Shell execution not declared in documentation Doc Mismatch | auto-bug-finder.js:36 |
| Medium | Auto-fix patch application modifies source files without clear warning Doc Mismatch | auto-bug-finder.js:460 |
| Low | Hardcoded project directory assumptions Sensitive Access | auto-bug-finder.js:34 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | READ | ✓ Aligned | auto-bug-finder.js:55 reads CONTRACT_PATH via fs.readFileSync |
| Filesystem | NONE | WRITE | ✗ Violation | auto-bug-finder.js:460-462 writes contract source and .bak backups |
| Shell | NONE | WRITE | ✗ Violation | auto-bug-finder.js:36-48 uses exec/execSync for npx hardhat, slither commands |
| Network | NONE | NONE | — | No network calls observed |
| Environment | NONE | NONE | — | process.env spread only, no harvesting |
| credential_access | NONE | NONE | — | No sensitive path or credential access |
File Tree
2 files · 44.2 KB · 1226 lines JavaScript 1f · 1141L
Markdown 1f · 85L
├─
auto-bug-finder.js
JavaScript
└─
SKILL.md
Markdown
Security Positives
✓ No credential harvesting or sensitive file access
✓ No obfuscation, base64 execution, or anti-analysis techniques
✓ Uses standard, legitimate security tools (Hardhat, Slither)
✓ Creates backups before patching (.bak files)
✓ Has a max sprint limit (10) as a safety mechanism
✓ Will revert changes if new test failures are introduced
✓ False positive detection built in (checkSlitherFalsePositive)
✓ No network exfiltration or C2 communication
✓ No reverse shell, RCE, or malicious code execution