首页/区块链与 Web3/substrate-vulnerability-scanner
S

substrate-vulnerability-scanner

by @trailofbitsv1.0.0
0.0(0)

系统性扫描Substrate运行时模块(pallets)中与平台相关的安全漏洞。

SubstratePolkadotBlockchain SecuritySmart Contract SecurityVulnerability ScanningWeb3 SecurityGitHub
安装方式
npx skills add trailofbits/skills --skill substrate-vulnerability-scanner
compare_arrows

Before / After 效果对比

1
使用前

手动审计Substrate运行时模块(pallets)以发现平台特有的安全漏洞,如节点崩溃、DoS攻击或未经授权的访问,需要深入理解Substrate/FRAME架构,耗时且容易遗漏。

使用后

通过Substrate漏洞扫描器,可以系统地扫描Substrate运行时模块,自动检测7种关键的Substrate/FRAME平台特有漏洞模式,从而高效地发现潜在的链级风险和安全问题。

扫描时间0%
使用前
0
使用后
0
Substrate特有漏洞检测率0%
使用前
0
使用后
0
节点稳定性风险0%
使用前
0
使用后
0

扫描时间

0%

00

Substrate特有漏洞检测率

0%

00

节点稳定性风险

0%

00

description SKILL.md

substrate-vulnerability-scanner

Substrate Vulnerability Scanner 1. Purpose Systematically scan Substrate runtime modules (pallets) for platform-specific security vulnerabilities that can cause node crashes, DoS attacks, or unauthorized access. This skill encodes 7 critical vulnerability patterns unique to Substrate/FRAME-based chains. 2. When to Use This Skill Auditing custom Substrate pallets Reviewing FRAME runtime code Pre-launch security assessment of Substrate chains (Polkadot parachains, standalone chains) Validating dispatchable extrinsic functions Reviewing weight calculation functions Assessing unsigned transaction validation logic 3. Platform Detection File Extensions & Indicators Rust files: .rs Language/Framework Markers // Substrate/FRAME indicators #[pallet] pub mod pallet { use frame_support::pallet_prelude::; use frame_system::pallet_prelude::; #[pallet::config] pub trait Config: frame_system::Config { } #[pallet::call] impl<T: Config> Pallet { #[pallet::weight(10_000)] pub fn example_function(origin: OriginFor) -> DispatchResult { } } } // Common patterns DispatchResult, DispatchError ensure!, ensure_signed, ensure_root StorageValue, StorageMap, StorageDoubleMap #[pallet::storage] #[pallet::call] #[pallet::weight] #[pallet::validate_unsigned] Project Structure pallets//lib.rs - Pallet implementations runtime/lib.rs - Runtime configuration benchmarking.rs - Weight benchmarks Cargo.toml with frame- dependencies Tool Support cargo-fuzz: Fuzz testing for Rust test-fuzz: Property-based testing framework benchmarking framework: Built-in weight calculation try-runtime: Runtime migration testing 4. How This Skill Works When invoked, I will: Search your codebase for Substrate pallets Analyze each pallet for the 7 vulnerability patterns Report findings with file references and severity Provide fixes for each identified issue Check weight calculations and origin validation 5. Vulnerability Patterns (7 Critical Patterns) I check for 7 critical vulnerability patterns unique to Substrate/FRAME. For detailed detection patterns, code examples, mitigations, and testing strategies, see VULNERABILITY_PATTERNS.md. Pattern Summary: Arithmetic Overflow ⚠️ CRITICAL Direct +, -, , / operators wrap in release mode Must use checked_ or saturating_* methods Affects balance/token calculations, reward/fee math Don't Panic ⚠️ CRITICAL - DoS Panics cause node to stop processing blocks No unwrap(), expect(), array indexing without bounds check All user input must be validated with ensure! Weights and Fees ⚠️ CRITICAL - DoS Incorrect weights allow spam attacks Fixed weights for variable-cost operations enable DoS Must use benchmarking framework, bound all input parameters Verify First, Write Last ⚠️ HIGH (Pre-v0.9.25) Storage writes before validation persist on error (pre-v0.9.25) Pattern: validate → write → emit event Upgrade to v0.9.25+ or use manual #[transactional] Unsigned Transaction Validation ⚠️ HIGH Insufficient validation allows spam/replay attacks Prefer signed transactions If unsigned: validate parameters, replay protection, authenticate source Bad Randomness ⚠️ MEDIUM pallet_randomness_collective_flip vulnerable to collusion Must use BABE randomness (pallet_babe::RandomnessFromOneEpochAgo) Use random(subject) not random_seed() Bad Origin ⚠️ CRITICAL ensure_signed allows any user for privileged operations Must use ensure_root or custom origins (ForceOrigin, AdminOrigin) Origin types must be properly configured in runtime For complete vulnerability patterns with code examples, see VULNERABILITY_PATTERNS.md. 6. Scanning Workflow Step 1: Platform Identification Verify Substrate/FRAME framework usage Check Substrate version (v0.9.25+ has transactional storage) Locate pallet implementations (pallets//lib.rs) Identify runtime configuration (runtime/lib.rs) Step 2: Dispatchable Analysis For each #[pallet::call] function: Arithmetic: Uses checked/saturating operations? Panics: No unwrap/expect/indexing? Weights: Proportional to cost, bounded inputs? Origin: Appropriate validation level? Validation: All checks before storage writes? Step 3: Panic Sweep # Search for panic-prone patterns rg "unwrap()" pallets/ rg "expect(" pallets/ rg "[.]" pallets/ # Array indexing rg " as u\d+" pallets/ # Type casts rg ".unwrap_or" pallets/ Step 4: Arithmetic Safety Check # Find direct arithmetic rg " + |+=| - |-=| * |*=| / |/=" pallets/ # Should find checked/saturating alternatives instead rg "checked_add|checked_sub|checked_mul|checked_div" pallets/ rg "saturating_add|saturating_sub|saturating_mul" pallets/ Step 5: Weight Analysis Run benchmarking: cargo test --features runtime-benchmarks Verify weights match computational cost Check for bounded input parameters Review weight calculation functions Step 6: Origin & Privilege Review # Find privileged operations rg "ensure_signed" pallets/ | grep -E "pause|emergency|admin|force|sudo" # Should use ensure_root or custom origins rg "ensure_root|ForceOrigin|AdminOrigin" pallets/ Step 7: Testing Review Unit tests cover all dispatchables Fuzz tests for panic conditions Benchmarks for weight calculation try-runtime tests for migrations 7. Priority Guidelines Critical (Immediate Fix Required) Arithmetic overflow (token creation, balance manipulation) Panic DoS (node crash risk) Bad origin (unauthorized privileged operations) High (Fix Before Launch) Incorrect weights (DoS via spam) Verify-first violations (state corruption, pre-v0.9.25) Unsigned validation issues (spam, replay attacks) Medium (Address in Audit) Bad randomness (manipulation possible but limited impact) 8. Testing Recommendations Fuzz Testing // Use test-fuzz for property-based testing #[cfg(test)] mod tests { use test_fuzz::test_fuzz; #[test_fuzz] fn fuzz_transfer(from: AccountId, to: AccountId, amount: u128) { // Should never panic let _ = Pallet::transfer(from, to, amount); } #[test_fuzz] fn fuzz_no_panics(call: Call) { // No dispatchable should panic let _ = call.dispatch(origin); } } Benchmarking # Run benchmarks to generate weights cargo build --release --features runtime-benchmarks ./target/release/node benchmark pallet \ --chain dev \ --pallet pallet_example \ --extrinsic "" \ --steps 50 \ --repeat 20 try-runtime # Test runtime upgrades cargo build --release --features try-runtime try-runtime --runtime ./target/release/wbuild/runtime.wasm \ on-runtime-upgrade live --uri wss://rpc.polkadot.io 9. Additional Resources Building Secure Contracts: building-secure-contracts/not-so-smart-contracts/substrate/ Substrate Documentation: https://docs.substrate.io/ FRAME Documentation: https://paritytech.github.io/substrate/master/frame_support/ test-fuzz: https://github.com/trailofbits/test-fuzz Substrate StackExchange: https://substrate.stackexchange.com/ 10. Quick Reference Checklist Before completing Substrate pallet audit: Arithmetic Safety (CRITICAL): No direct +, -, , / operators in dispatchables All arithmetic uses checked_ or saturating_ Type conversions use try_into() with error handling Panic Prevention (CRITICAL): No unwrap() or expect() in dispatchables No direct array/slice indexing without bounds check All user inputs validated with ensure! Division operations check for zero divisor Weights & DoS (CRITICAL): Weights proportional to computational cost Input parameters have maximum bounds Benchmarking used to determine weights No free (zero-weight) expensive operations Access Control (CRITICAL): Privileged operations use ensure_root or custom origins ensure_signed only for user-level operations Origin types properly configured in runtime Sudo pallet removed before production Storage Safety (HIGH): Using Substrate v0.9.25+ OR manual #[transactional] Validation before storage writes Events emitted after successful operations Other (MEDIUM): Unsigned transactions use signed alternative if possible If unsigned: proper validation, replay protection, authentication BABE randomness used (not RandomnessCollectiveFlip) Randomness uses random(subject) not random_seed() Testing: Unit tests for all dispatchables Fuzz tests to find panics Benchmarks generated and verified try-runtime tests for migrations Weekly Installs793Repositorytrailofbits/skillsGitHub Stars3.6KFirst SeenJan 19, 2026Security AuditsGen Agent Trust HubPassSocketPassSnykPassInstalled onclaude-code720opencode663gemini-cli649codex643cursor620github-copilot591

forum用户评价 (0)

发表评价

效果
易用性
文档
兼容性

暂无评价,来写第一条吧

统计数据

安装量0
评分0.0 / 5.0
版本1.0.0
更新日期2026年3月17日
对比案例1 组

用户评分

0.0(0)
5
0%
4
0%
3
0%
2
0%
1
0%

为此 Skill 评分

0.0

兼容平台

🔧Claude Code

时间线

创建2026年3月17日
最后更新2026年3月17日