pda-integrity
PDA Integrity
Forked from Trail of Bits Solana security skills. Original category alignment: improper PDA validation. Modified by Sealevel Guard and distributed as skill text under CC BY-SA 4.0.
Program-derived address integrity review skill.
Purpose
Detect whether a program's PDA design allows spoofing, role confusion, or weak authority derivation.
Focus
This skill is responsible for:
- insecure seed design,
- improper PDA validation,
- bump and derivation assumptions,
- account-role confusion through PDA reuse,
- and authority spoof paths based on derived accounts.
What To Look For
- PDAs derived from attacker-influenced or weakly-bound seeds
- derivation logic that does not tie authority to stable state
- code that trusts a PDA-shaped account without validating the intended role
- reuse of the same PDA pattern across incompatible trust boundaries
- assumptions that a PDA is safe merely because it is derived
Anchor-Specific Heuristics
- account constraints that imply PDA safety without proving it
- handlers that accept accounts whose seeds or bumps are not validated tightly
- config or vault authorities whose derivation is too permissive
Output Shape
For each finding, explain:
- the expected role of the PDA,
- how the derivation or validation is weak,
- the likely exploit path,
- and the impact on trust decisions.
Example Finding Themes
- attacker-controlled seed component
- PDA role confusion between config and vault authority
- unverified bump or derivation assumption
- derived authority not bound to immutable configuration
More from newmanxbt/sealevel-guard
cpi-risk
Detects whether the program can invoke the wrong program, propagate too much privilege, or trust unsafe callback behavior. Internal specialist module for CPI risk review.
1token-invariants
Detects whether token and vault logic can violate economic or accounting assumptions another agent would rely on. Internal specialist module for token invariant review.
1access-control
Detects whether privileged behavior is exposed to the wrong signer, authority, or account path. Internal specialist module for Solana access-control review.
1account-constraints
Detects whether the program trusts the wrong accounts, owners, or mutability assumptions. Internal specialist module for Anchor account validation review.
1sealevel-guard-review
Orchestrates parallelized Solana trust-gate review to determine whether a codebase or program is safe enough to ship, integrate, or allocate capital through. Use when asked to review, audit, or assess risk of a Solana program.
1governance-upgrade-risk
Detects whether governance or upgrade control is concentrated, weakly separated, or capable of undermining user or integrator trust. Internal specialist module for governance risk review.
1