audit-reports
SKILL.md
Audit Reports
Generate properly formatted security vulnerability reports for major Web3 audit contest platforms. Each platform has specific formatting requirements and judging criteria.
Supported Platforms
| Platform | Format | Severity Levels |
|---|---|---|
| Sherlock | GitHub Issues | HIGH, MEDIUM |
| Code4rena | Submission Form | High (3), Medium (2), QA (1) |
| Cantina | LightChaser | High, Medium, Low, Info |
Quick Start
When user requests to generate a finding report:
- Ask which platform (default: Code4rena format)
- Collect vulnerability details: title, severity, description, affected code, PoC, remediation
- Generate formatted report using the appropriate platform template
- Output the complete markdown ready for submission
Platform Resources
Sherlock
guides/sherlock/- Official judging guidelines and severity criteriaexamples/sherlock.md- Complete finding exampleplatforms/sherlock/template.md- Report template with invalid issues checklist
Code4rena
guides/code4rena/- Risk ratings, PoC rules, QA report formatexamples/code4rena.md- Complete finding exampleplatforms/code4rena/template.md- Submission format
Cantina
guides/cantina/- Severity matrix, duplication rules, PoC requirementsexamples/cantina.md- Complete finding exampleplatforms/cantina/template.md- Detailed submission template
Severity Quick Reference
Sherlock
| Severity | Criteria |
|---|---|
| HIGH | >1% AND >$10 loss, direct without extensive conditions |
| MEDIUM | >0.01% AND >$10 loss, with constraints OR breaks core functionality |
| DOS | >1 week locked = Medium; + time-sensitive = High |
Code4rena
| Risk Rating | Criteria |
|---|---|
| 3 - High | Assets stolen/lost/compromised (directly or via valid attack path) |
| 2 - Medium | Assets not at direct risk, but protocol function/availability impacted |
| 1 - QA | No assets at risk; includes Low + Governance/Centralization |
Cantina
| Severity | Impact | Likelihood |
|---|---|---|
| High | Loss of funds / Breaks core functionality | High |
| Medium | DOS / Minor fund loss / Breaks non-core | Medium |
| Low | No assets at risk | Any |
Common Invalid Issues (All Platforms)
- Gas optimizations
- Incorrect event values (no broader impact)
- Zero address checks
- User input validation only
- Admin mistakes (common sense)
- Approve/safeApprove front-running (Code4rena: explicitly invalid)
- Weird/non-standard tokens (unless explicitly in scope)
- View function errors (unused within protocol)
Best Practices
- Clear Title - Concise, describes vulnerability type
- Impact First - Judges need to quickly understand risk
- Root Cause - Explain WHY, not just WHAT
- Code References - Include
file:lineformat (e.g.,src/Vault.sol:142) - Working PoC - Executable test demonstrating the issue
- Clear Remediation - Specific code-level fix suggestions
Workflow Checklist
- Identify target platform
- Verify severity matches platform guidelines
- Ensure PoC is executable
- Include specific code references
- Provide actionable remediation
- Review against platform's judging criteria
Resources
examples/- Complete finding examples for each platformguides/- Official judging criteria and severity guidesplatforms/- Report templates and checklists
Weekly Installs
3
Repository
fethallaheth/au…ts-skillGitHub Stars
2
First Seen
Jan 28, 2026
Security Audits
Installed on
mcpjam3
kiro-cli3
kilo3
claude-code3
gemini-cli3
windsurf3