๐ฅ๏ธ
Best Viewed on Desktop
The technical documentation and app previews are optimized for desktop viewing.
โ Back to Home๐ ๏ธ
28 Tools
10 traditional analyzers + 6 LLM agents + 12 drain-focused modules. Each implements the AnalysisTool protocol and runs in parallel via Ray.
10 Traditional Tools (Table 1 + Table 3)
| Tool | Technique | Timeout | Mem | Config | Strengths | Weaknesses |
|---|---|---|---|---|---|---|
| Slither โ | Pattern matching | 120s | 2GB | All detectors | Fast, comprehensive | High FP rate |
| Mythril โ | Symbolic exec. | 300s | 4GB | Depth 22, tx 120s | Deep analysis | Slow, path explosion |
| Echidna โ | Fuzzing | 180s | 2GB | Limit 50K, seq 100 | Real exploits | Needs properties |
| Medusa โ | Parallel fuzzing | 180s | 2GB | Workers 8 | Multi-core speed | Property-based |
| Hevm โ | Symbolic exec. | 300s | 4GB | Symbolic, iter 1K | Formal guarantees | Limited scalability |
| Aderyn โ | AST analysis | 60s | 1GB | Default | Rust speed | Pattern-limited |
| Halmos โ | SMT solving | 300s | 4GB | Default solver | Math proofs | Complex setup |
| Manticore โ | Symbolic exec. | 600s | 8GB | Reentrancy, overflow | Multi-tx analysis | Very slow |
| Heimdall โ | Decompilation | 120s | 2GB | Decompile+analyze | Bytecode reverse | Accuracy varies |
| Panoramix โ | Decompilation | 60s | 1GB | To pseudocode | Bytecode analysis | Accuracy varies |
12 Drain-Focused Modules (Table 2)
Custom-built modules targeting high-value DeFi attack vectors, informed by documented attack patterns including MEV extraction, blockchain extractable value, and liquidation cascades.
โถcircom
ZKCircom circuit vulnerabilities, constraint issues
โถzk-verifier
ZKZK verifier contract weaknesses
โถbridge
Cross-chainBridge protocol attacks, message replay
โถoracle
DeFiPrice oracle manipulation, TWAP
โถgovernance
ProtocolTimelock bypass, voting attacks
โถproxy
UpgradeUUPS/EIP-1967 proxy vulnerabilities
โถbytecode
Reverse Eng.Decompiled bytecode analysis
โถai-fuzzing
HybridLLM-guided fuzzing campaigns
โถsymbolic
HybridLLM-enhanced path exploration
โถdefi
DeFiFlash loans, AMM manipulation
โถrollup
L2Layer 2 specific vulnerabilities
โถDAG
Cross-ctrDependency graph attack chains
Zentinel-audit Output Visualizations
Two analysis modes: Inside Contract shows per-contract findings with severity, tool source, and detail panel. Cross-Contract builds a dependency graph revealing multi-hop attack chains invisible to individual tools.
๐ Inside Contract
Per-contract findings analysis
๐ Cross-Contract
Dependency graph & attack chains
Finding Distribution by Source (Table 8)
Slither60%
Mythril9%
Other traditional (8)8%
LLM agents13.3%
Drain modules9.7%
Total: 669 findings. LLM agents + drain modules = 154 additional findings (23%) including business logic flaws and cross-contract vulns.