| SWC-136 |
Unencrypted Private Data On-Chain |
CWE-767: Access to Critical Private Variable via Public Method |
| SWC-135 |
Code With No Effects |
CWE-1164: Irrelevant Code |
| SWC-134 |
Message call with hardcoded gas amount |
CWE-655: Improper Initialization |
| SWC-133 |
Hash Collisions With Multiple Variable Length Arguments |
CWE-294: Authentication Bypass by Capture-replay |
| SWC-132 |
Unexpected Ether balance |
CWE-667: Improper Locking |
| SWC-131 |
Presence of unused variables |
CWE-1164: Irrelevant Code |
| SWC-130 |
Right-To-Left-Override control character (U+202E) |
CWE-451: User Interface (UI) Misrepresentation of Critical Information |
| SWC-129 |
Typographical Error |
CWE-480: Use of Incorrect Operator |
| SWC-128 |
DoS With Block Gas Limit |
CWE-400: Uncontrolled Resource Consumption |
| SWC-127 |
Arbitrary Jump with Function Type Variable |
CWE-695: Use of Low-Level Functionality |
| SWC-126 |
Insufficient Gas Griefing |
CWE-691: Insufficient Control Flow Management |
| SWC-125 |
Incorrect Inheritance Order |
CWE-696: Incorrect Behavior Order |
| SWC-124 |
Write to Arbitrary Storage Location |
CWE-123: Write-what-where Condition |
| SWC-123 |
Requirement Violation |
CWE-573: Improper Following of Specification by Caller |
| SWC-122 |
Lack of Proper Signature Verification |
CWE-345: Insufficient Verification of Data Authenticity |
| SWC-121 |
Missing Protection against Signature Replay Attacks |
CWE-347: Improper Verification of Cryptographic Signature |
| SWC-120 |
Weak Sources of Randomness from Chain Attributes |
CWE-330: Use of Insufficiently Random Values |
| SWC-119 |
Shadowing State Variables |
CWE-710: Improper Adherence to Coding Standards |
| SWC-118 |
Incorrect Constructor Name |
CWE-665: Improper Initialization |
| SWC-117 |
Signature Malleability |
CWE-347: Improper Verification of Cryptographic Signature |
| SWC-116 |
Block values as a proxy for time |
CWE-829: Inclusion of Functionality from Untrusted Control Sphere |
| SWC-115 |
Authorization through tx.origin |
CWE-477: Use of Obsolete Function |
| SWC-114 |
Transaction Order Dependence |
CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') |
| SWC-113 |
DoS with Failed Call |
CWE-703: Improper Check or Handling of Exceptional Conditions |
| SWC-112 |
Delegatecall to Untrusted Callee |
CWE-829: Inclusion of Functionality from Untrusted Control Sphere |
| SWC-111 |
Use of Deprecated Solidity Functions |
CWE-477: Use of Obsolete Function |
| SWC-110 |
Assert Violation |
CWE-670: Always-Incorrect Control Flow Implementation |
| SWC-109 |
Uninitialized Storage Pointer |
CWE-824: Access of Uninitialized Pointer |
| SWC-108 |
State Variable Default Visibility |
CWE-710: Improper Adherence to Coding Standards |
| SWC-107 |
Reentrancy |
CWE-841: Improper Enforcement of Behavioral Workflow |
| SWC-106 |
Unprotected SELFDESTRUCT Instruction |
CWE-284: Improper Access Control |
| SWC-105 |
Unprotected Ether Withdrawal |
CWE-284: Improper Access Control |
| SWC-104 |
Unchecked Call Return Value |
CWE-252: Unchecked Return Value |
| SWC-103 |
Floating Pragma |
CWE-664: Improper Control of a Resource Through its Lifetime |
| SWC-102 |
Outdated Compiler Version |
CWE-937: Using Components with Known Vulnerabilities |
| SWC-101 |
Integer Overflow and Underflow |
CWE-682: Incorrect Calculation |
| SWC-100 |
Function Default Visibility |
CWE-710: Improper Adherence to Coding Standards |