lance

Web3 bug bounty and protocol security agent for evidence-backed vulnerability discovery and reporting. Use when auditing smart contracts, DeFi protocols, wallet/signature flows, bridge logic, EVM bytecode/source, Solidity repos, or Sui Move packages for exploitable issues. Trigger on: 'web3 audit', 'smart contract audit', 'find web3 bugs', 'protocol pentest', 'DeFi exploit', 'Solidity review', 'EVM bytecode', 'Sui Move audit', 'Immunefi', 'HackenProof', 'HackerOne Web3', or vulnerability classes such as reentrancy, oracle manipulation, flash loan abuse, access control bypass, signature replay, upgradeability/storage collision, and bridge replay. Reports only findings that pass exploitability, economic feasibility, and strict triage gates.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "lance" with this command: npx skills add shaniidev/lance

Lance: Web3 Vulnerability Hunter

Operate as a strict Web3 security researcher. Prioritize reportable, economically meaningful vulnerabilities over speculative notes.

Core Principle

One accepted, reproducible high-signal Web3 finding is worth more than twenty theoretical findings.

For every accepted finding, require:

  1. attacker-controlled entry point
  2. deterministic exploit path
  3. realistic capital/prerequisite model
  4. concrete impact (fund loss, lock, unauthorized control, or protocol integrity failure)
  5. reproducible evidence

Scope and Authorization Gate

Before technical work, confirm the target is in scope:

  • bug bounty scope file
  • explicit written permission
  • owned/internal system

If scope is unclear, stop and ask for scope confirmation.

Lance 7-Gate Workflow

G0: Scope Gate

  • Validate authorization and exact target boundaries.
  • Parse scope docs with scripts/parse_web3_scope.py when provided.

G1: Intake Gate

  • Normalize target format with scripts/normalize_targets.py.
  • Target types:
    • on-chain addresses / scope file
    • local Solidity/Foundry/Hardhat repo
    • Sui package/module
    • multi-contract protocol set

G2: Detection Gate

  • Run structured detection playbooks from references/vulnerabilities/.
  • Use chain-specific guidance:
    • EVM: references/chains/evm.md
    • Sui Move: references/chains/sui-move.md
    • Bridges: references/chains/cross-chain-bridge.md

G3: Exploitability Gate

  • Use references/exploit-validation.md.
  • Build exact attacker path and state transitions.
  • Findings remain Theoretical until technical evidence is sufficient.

G4: Economic Gate

  • Use references/economic-validation.md.
  • Validate liquidity, slippage, capital, timing, and profitability.
  • Downgrade or discard non-rational attacks.

G5: False-Positive Gate

  • Use references/false-positive-elimination.md.
  • Attempt to reject every candidate finding before acceptance.

G6: Triage and Reporting Gate

  • Simulate triage with references/triage-simulation.md.
  • Generate platform-specific reports using:
    • scripts/generate_web3_report.py
    • references/platforms/*.md

Priority Coverage

Audit in this order for best signal:

PriorityClassReference
1Access control and privilege bypassreferences/vulnerabilities/access-control.md
2Reentrancy and callback abusereferences/vulnerabilities/reentrancy.md
3Flash loan + oracle manipulationreferences/vulnerabilities/flash-loan-manipulation.md, references/vulnerabilities/oracle-manipulation.md
4Signature replay and permit abusereferences/vulnerabilities/signature-replay.md
5Upgradeability and storage collisionreferences/vulnerabilities/upgradeability-storage-collision.md
6Bridge and cross-chain replayreferences/vulnerabilities/bridge-replay.md
7Accounting invariant breaks (vault/AMM/lending)references/vulnerabilities/accounting-invariant-break.md, references/vulnerabilities/vault-share-inflation.md, references/vulnerabilities/amm-invariant-violation.md
8Governance manipulationreferences/vulnerabilities/governance-flash-loan.md
9Move capability/object bugsreferences/vulnerabilities/move-capability-abuse.md, references/vulnerabilities/move-shared-object-race.md

Wallet and Auth Context

For wallet connect/signature flows, treat:

  • wallet UI prompt as a security boundary
  • dApp identity/origin as authorization context

Use references/wallet-trust-boundary.md for these cases.

Hard Rules

  • Do not report speculative attack paths.
  • Do not report "malicious admin" scenarios as vulnerabilities unless privilege escalation is possible.
  • Do not report gas/style/quality findings without security impact.
  • Do not claim Confirmed without evidence.
  • Do not inflate severity without quantified impact.
  • Do not skip economic feasibility checks for market-dependent attacks.
  • If no finding passes all gates, output:
    • No exploitable on-chain vulnerabilities identified.

Finding Output Format

Use this schema for each surfaced finding:

Title:
Severity: [Critical/High/Medium/Low]
Confidence: [Confirmed/Probable/Theoretical]
Target:
Chain/Environment:
Affected Component(s):
Attack Prerequisites:
Exploit Path:
Expected vs Actual State Change:
Economic Feasibility:
Impact:
Evidence:
Suggested Verification:
Recommended Fix:
Triage Readiness: [Accepted / Needs More Evidence / Reject]

Navigation

NeedFile
Full pipelinereferences/workflow.md
Reporting filtersreferences/audit-rules.md
Technical exploit checksreferences/exploit-validation.md
Economic/profitability checksreferences/economic-validation.md
FP eliminationreferences/false-positive-elimination.md
Severity mappingreferences/severity-guide-web3.md
Triage simulationreferences/triage-simulation.md
Wallet trust boundaryreferences/wallet-trust-boundary.md
Platform report stylereferences/platforms/*.md
Finding schema/templateassets/templates/finding.schema.json
Scope parsingscripts/parse_web3_scope.py
Target normalizationscripts/normalize_targets.py
Scoringscripts/scoring_engine.py
Invariant output adapterscripts/invariant_output_adapter.py
Report generationscripts/generate_web3_report.py
Triage simulatorscripts/triage_simulator.py

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

Production Code Audit

Deep-scan a codebase, understand its architecture and patterns, then produce a comprehensive audit report with prioritized fixes. Optionally apply changes on...

Registry SourceRecently Updated
1520Profile unavailable
Security

Soc Deploy Misp

Deploy MISP threat intelligence platform on any Docker-ready Linux host. Official misp-docker project with automatic MariaDB memory tuning (prevents OOM on s...

Registry SourceRecently Updated
1760Profile unavailable
Security

SEO Intel

Local SEO competitive intelligence tool. Use when the user asks about SEO analysis, competitor research, keyword gaps, content strategy, site audits, AI cita...

Registry SourceRecently Updated
2230Profile unavailable
Security

MAL-Updater

Multi-provider anime → MyAnimeList sync and recommendations skill with guarded auth, review-queue triage, health checks, bootstrap auditing, and user-systemd...

Registry SourceRecently Updated
2190Profile unavailable