Symbolic execution tool and vulnerability scanner for the Ethereum Virtual Machine
Switch branches/tags
Nothing to show
Clone or download

README.md

Pakala

PyPI Build States

"ilo Pakala li pakala e mani sona"

  • Pakala is a tool to search for exploitable bugs in Ethereum smart contracts.
  • Pakala is a symbolic execution engine for the Ethereum Virtual Machine.

The intended public for the tool are security researchers interested by Ethereum / the EVM.

Installation

pip3 install pakala

It works only with python 3.

Usage

Let's look at 0x612f1BDbe93523b7f5036EfA87493B76341726E3: the constructor doesn't have the same name as the contract. Anybody can call HT() and become owner, then call withdraw.

Let's scan it:

./pakala.py 0x612f1BDbe93523b7f5036EfA87493B76341726E3 --force-balance="1 ether"

The contract balance being 0, we won't be able to have it send us some ethers. So we override the balance to be 1 ETH: then it has some "virtual" money to send us.

The tool with tell you a bug was found, and dump you a path of "states". Each state corresponds to a transaction, with constraints that needs to be respected for that code path to be taken, storage that has been read/written...

Advice: look at calldata[0] in the constraints to see the function signature for each transaction.

See ./pakala.py help for more complete usage information.

How does it works? What does it do?

See the introductory article for more information and a demo.