Detectors Overview
Built-in Detectors
# | Detector | Severity | Category | Requires Soufflé | Enabled by default |
---|---|---|---|---|---|
1 | ArgCopyMutation | High | Security | ✔ | |
2 | AsmIsUsed | Info | Security | ||
3 | BranchDuplicate | High | Security | ✔ | |
4 | CellBounds | Critical | Security | ✔ | |
5 | ConstantAddress | Info | Security | ||
6 | DivideBeforeMultiply | High | Security | ✔ | ✔ |
7 | DumpIsUsed | Info | Security | ||
8 | DuplicatedCondition | High | Security | ✔ | |
9 | EnsurePrgSeed | Medium | Security | ✔ | |
10 | EtaLikeSimplifications | Low | Optimization | ✔ | |
11 | ExitCodeUsage | High | Security | ✔ | |
12 | FalseCondition | Medium | Security | ✔ | |
13 | FieldDoubleInit | Medium | Optimization | ✔ | |
14 | ImplicitOpcode | Info | Best Practices | ||
15 | InheritedStateMutation | Low | Best Practices | ||
16 | NeverAccessedVariables | Medium | Security | ✔ | |
17 | OptimalMathFunction | Low | Optimization | ✔ | |
18 | PreferAugmentedAssign | Info | Best Practices | ✔ | |
19 | PreferBinaryReceiver | Low | Optimization | ✔ | |
20 | PreferSenderFunction | Low | Optimization | ✔ | |
21 | PreferredStdlibApi | Info | Optimization, Security | ||
22 | ReadOnlyVariables | Medium | Security | ✔ | ✔ |
23 | SendInLoop | Medium | Security | ||
24 | ShortCircuitCondition | Low | Optimization | ✔ | |
25 | StateMutationInGetter | Info | Security | ||
26 | StringReceiversOverlap | High | Security | ✔ | |
27 | SuboptimalCellOperation | Medium | Optimization | ✔ | |
28 | SuboptimalSend | Medium | Optimization | ✔ | |
29 | SuspiciousLoop | Medium | Security | ✔ | |
30 | SuspiciousMessageMode | Low—Medium | Security | ✔ | |
31 | UnboundLoop | High | Security | ✔ | ✔ |
32 | UnboundMap | Low | Security | ||
33 | UnprotectedCall | High | Security | ✔ | |
34 | UnusedExpressionResult | Medium | Security | ✔ | |
35 | UnusedOptional | Low | Optimization | ✔ | |
36 | ZeroAddress | Low | Security | ✔ |
Some of the detectors require Soufflé to be installed. If no Soufflé installation is found, these detectors won't be executed.
A few detectors are optional and aimed at auditors to help uncover subtle issues in the source code. To enable all detectors, use the --all-detectors
option. You can find a full list of configuration options on the configuration page.
Each detector targets a specific type of problem in your code. Click on the detector name to learn more.
Detector Severities and Categories
Severity Levels
Findings are classified according to their impact severity:
Severity | Description |
---|---|
Info | Informational findings that highlight potential improvements |
Low | Minor issues with limited impact |
Medium | Significant issues that should be addressed |
High | Serious vulnerabilities requiring immediate attention |
Critical | Severe vulnerabilities with catastrophic potential impact |
Categories
Findings are organized into the following categories:
Category | Description |
---|---|
Security | Any possible unintended behavior leading to bugs or vulnerabilities |
Optimization | Code improvements for gas-optimizations |
Best Practices | General code quality advices |