Bringing automated analysis to blockchain security.
Note that the X account ChainFoxHQ is no longer maintained. All the updates will be published in X account DieBX00
We are launching the new CFX token on **Bags**!
Developers will receive **100%** of the royalties
.Additionally, 5% of revenue will be distributed as staking rewards to existing CFX holders.
CA: Fo9wJVqWYXEgsG3UKekvK1R7YVewyUGodRfBrmjaBAGS
CA: RhFVq1Zt81VvcoSEMSyCGZZv5SwBdA8MV7w4HEMpump
Security is the biggest concern for blockchain and smart contract users and developers. But a manual audit is time-consuming and expensive. Thus we establish Chain-Fox, an all-in-one platform with automatic security detection ability, making the security capabilities of blockchain more democratic. We aim to make security affordable to every user and developer in the blockchain ecosystem.
Checkers can be divided by languages and detection methods.
For now we are supporting 14 cutting-edge checkers. Deploying them to your working CI is non-trivial. We also have other 8 checkers that are easily integrated into CI. For these 8 checkers, a sophisticated guide of deploying them is coming soon.
According to a recent survey, most blockchain-related projects are implemented in Rust, Go, Solidity, and C++. Thus we focus on these languages. Besides them, more recent languages (like Move) are to be added.
We are also planning to add more checkers see here.
Checker | Categories | Detected Bug Types |
---|---|---|
lockbud | rust, static | Memory & Concurrency bugs |
rudra | rust, static | Memory safety when panicked, Higher Order Invariant, Send Sync Variance, Lifetime Annotation Bugs |
RAPx | rust, static | Use-After-Free, Double-Free, Memory Leaks |
AtomVChecker | rust, static | Atomic concurrency bugs and performance loss due to memory ordering misuse |
Cocoon | rust, static | Secrecy Leaks |
MIRAI | rust, static | Panic, Security bugs, Correctness |
ERASan | rust, dynamic | Memory access bugs |
shuttle | rust, dynamic | Concurrency bugs |
kani | rust, verifier | Memory safety, User-specified assertions, Panics, Unexpected behavior (e.g., arithmetic overflows) |
GCatch | go, static | Concurrency bugs |
GFuzz | go, dynamic | Concurrency bugs |
cppcheck | C/C++, static | Common C/C++ bugs |
slither | solidity, static | Common Solidity bugs |
PeCatch | solidity, static | Gas-fee bugs |
200+ bugs are found, reported, and fixed by the checkers
See ./detection-results/'Github Bug Report.xlsx'
Audit Report:
See ./audit_reports
-
Redesign the current detection logic using the latest compiler public APIs.
-
Model the contracts / program and make the framework AI-friendly for verification.
-
Build a unified checking engine capable of handling multiple programming languages.
Beyond technology, we’ll also:
-
Reconnect with old partners we couldn’t engage with due to limited time.
-
Build new relationships by offering valuable checking support.
We welcome contributions from the community! Here's how you can help:
- Fork the repository
- Create your feature branch (
git checkout -b feature/amazing-feature
) - Commit your changes (
git commit -m 'Add some amazing feature'
) - Push to the branch (
git push origin feature/amazing-feature
) - Open a Pull Request
Please read our Contributing Guidelines for more details.
This project is licensed under the BSD 3-Clause License - see the LICENSE file for details.
For security-related issues, please refer to our Security Policy.