L3X detects vulnerabilities in Rust and Solidity code based on patterns and AI code analysis. Various LLMs act as validators for vulnerabilities detected by patterns and validate each other's results in AI code analysis. Vulnerabilities are confirmed when they receive confirmation from a majority of validators. As a result, a report with validated vulnerabilities and detected safe patterns is generated.
- General Rust code
- Rust-based Solana smart contracts
- Solidity-based Ethereum smart contracts
- Vulnerability Patterns Code Analysis: Check the rules:
- AI Code Analysis: Analysis of smart contract code for vulnerabilities using Language Model validators (LLMs).
- LLM Validators: Potential vulnerabilities detected are passed on to multiple LLM validators for confirmation. Three different models are utilized: GPT-4, Gemini, and Claude 2.
- Validation Process: Each validator independently assesses potential vulnerabilities. Detected vulnerabilities undergo a validation check.
- Decision Making:
- Valid: A vulnerability is confirmed as valid when at least two LLM validators agree.
- False Positive: A finding is marked as a false positive when identified as such by at least two validators.
- Cross-Validation: Each LLM performs a cross-validation check during the AI Code Analysis phase.
- Report Generation: A report is generated that compiles all confirmed vulnerabilities, with duplicates removed.
Currently it's MVP
- Vulnerabilities detects only based on vuln patterns
- GPT-3.5/4 act as validators for vulnerabilities detected by patterns
- GPT-3.5
- GPT-4
- Claude (Soon)
- Gemini (Planned)
Set the openai api key as an environment variable OPENAI_KEY in your operating system
Linux/Mac
export OPENAI_KEY=sk-ApiKeyExample
Windows
set OPENAI_KEY=sk-ApiKeyExample
If you want to specify particular OpenAI org or project, set up OPENAI_ORG_ID
and OPENAI_PROJECT_ID
environment variables.
- Build
cargo build
- Compile
cargo run
- Run
- By default, only critical and high severity findings are validated. To validate all findings, use the
--all-severities
flag. - To skip vulnerability validation and generate the report without validation, use the
--no-validation
flag. - To specify the OpenAI model to use for vulnerability validation (default is gpt-3.5-turbo), use the
--model
flag followed by the model name (e.g., --model=gpt-4).
l3x smart-contracts-folder-to-analyse [--all-severities] [--no-validation] [--model=MODEL]
DesignMVP conceptRust supportSolana supportSolidity supportGPT-4 Integration- Claude Integration 🔜
- Gemini Integration
- AI Code Analysis
- AI Code Analysis - Cross-Validation
- Refactor
- Accuracy Comparison
All suggestions write to contact [email protected] or [email protected]