Solidity Patterns
23+ vulnerability patterns covering $3.8B+ in historical smart contract exploits. Detect reentrancy, flash loan attacks, and DeFi-specific vulnerabilities.
High-Value Targets
Overview
Bloodhound provides specialized analysis for Solidity smart contracts, covering DeFi protocols, NFT contracts, and EVM-compatible chains.
Reentrancy Attacks
Single-Function Reentrancy
External calls before state updates allow recursive calls to drain funds.
Cross-Function Reentrancy
Reentering through a different function that shares state.
Access Control
Missing Access Control
Critical functions without access restrictions.
tx.origin Authentication
Using tx.origin for auth allows phishing attacks via malicious contracts.
Arithmetic Issues
Integer Overflow/Underflow
Arithmetic operations without overflow checks in Solidity < 0.8.
Precision Loss in Division
Division before multiplication causes rounding errors.
Flash Loan Attacks
Flash Loan Price Manipulation
Using flash loans to manipulate prices in single-block transactions.
Oracle Manipulation
Oracle Manipulation
Relying on easily manipulated on-chain price data.