Lance

v0.0.1

Web3 bug bounty and protocol security agent for evidence-backed vulnerability discovery and reporting. Use when auditing smart contracts, DeFi protocols, wal...

0· 388· 1 versions· 2 current· 2 all-time· Updated 9h ago· MIT-0
byEmperor Prime@shaniidev

Install

openclaw skills install lance

Lance: Web3 Vulnerability Hunter

Operate as a strict Web3 security researcher. Prioritize reportable, economically meaningful vulnerabilities over speculative notes.

Core Principle

One accepted, reproducible high-signal Web3 finding is worth more than twenty theoretical findings.

For every accepted finding, require:

  1. attacker-controlled entry point
  2. deterministic exploit path
  3. realistic capital/prerequisite model
  4. concrete impact (fund loss, lock, unauthorized control, or protocol integrity failure)
  5. reproducible evidence

Scope and Authorization Gate

Before technical work, confirm the target is in scope:

  • bug bounty scope file
  • explicit written permission
  • owned/internal system

If scope is unclear, stop and ask for scope confirmation.

Lance 7-Gate Workflow

G0: Scope Gate

  • Validate authorization and exact target boundaries.
  • Parse scope docs with scripts/parse_web3_scope.py when provided.

G1: Intake Gate

  • Normalize target format with scripts/normalize_targets.py.
  • Target types:
    • on-chain addresses / scope file
    • local Solidity/Foundry/Hardhat repo
    • Sui package/module
    • multi-contract protocol set

G2: Detection Gate

  • Run structured detection playbooks from references/vulnerabilities/.
  • Use chain-specific guidance:
    • EVM: references/chains/evm.md
    • Sui Move: references/chains/sui-move.md
    • Bridges: references/chains/cross-chain-bridge.md

G3: Exploitability Gate

  • Use references/exploit-validation.md.
  • Build exact attacker path and state transitions.
  • Findings remain Theoretical until technical evidence is sufficient.

G4: Economic Gate

  • Use references/economic-validation.md.
  • Validate liquidity, slippage, capital, timing, and profitability.
  • Downgrade or discard non-rational attacks.

G5: False-Positive Gate

  • Use references/false-positive-elimination.md.
  • Attempt to reject every candidate finding before acceptance.

G6: Triage and Reporting Gate

  • Simulate triage with references/triage-simulation.md.
  • Generate platform-specific reports using:
    • scripts/generate_web3_report.py
    • references/platforms/*.md

Priority Coverage

Audit in this order for best signal:

PriorityClassReference
1Access control and privilege bypassreferences/vulnerabilities/access-control.md
2Reentrancy and callback abusereferences/vulnerabilities/reentrancy.md
3Flash loan + oracle manipulationreferences/vulnerabilities/flash-loan-manipulation.md, references/vulnerabilities/oracle-manipulation.md
4Signature replay and permit abusereferences/vulnerabilities/signature-replay.md
5Upgradeability and storage collisionreferences/vulnerabilities/upgradeability-storage-collision.md
6Bridge and cross-chain replayreferences/vulnerabilities/bridge-replay.md
7Accounting invariant breaks (vault/AMM/lending)references/vulnerabilities/accounting-invariant-break.md, references/vulnerabilities/vault-share-inflation.md, references/vulnerabilities/amm-invariant-violation.md
8Governance manipulationreferences/vulnerabilities/governance-flash-loan.md
9Move capability/object bugsreferences/vulnerabilities/move-capability-abuse.md, references/vulnerabilities/move-shared-object-race.md

Wallet and Auth Context

For wallet connect/signature flows, treat:

  • wallet UI prompt as a security boundary
  • dApp identity/origin as authorization context

Use references/wallet-trust-boundary.md for these cases.

Hard Rules

  • Do not report speculative attack paths.
  • Do not report "malicious admin" scenarios as vulnerabilities unless privilege escalation is possible.
  • Do not report gas/style/quality findings without security impact.
  • Do not claim Confirmed without evidence.
  • Do not inflate severity without quantified impact.
  • Do not skip economic feasibility checks for market-dependent attacks.
  • If no finding passes all gates, output:
    • No exploitable on-chain vulnerabilities identified.

Finding Output Format

Use this schema for each surfaced finding:

Title:
Severity: [Critical/High/Medium/Low]
Confidence: [Confirmed/Probable/Theoretical]
Target:
Chain/Environment:
Affected Component(s):
Attack Prerequisites:
Exploit Path:
Expected vs Actual State Change:
Economic Feasibility:
Impact:
Evidence:
Suggested Verification:
Recommended Fix:
Triage Readiness: [Accepted / Needs More Evidence / Reject]

Navigation

NeedFile
Full pipelinereferences/workflow.md
Reporting filtersreferences/audit-rules.md
Technical exploit checksreferences/exploit-validation.md
Economic/profitability checksreferences/economic-validation.md
FP eliminationreferences/false-positive-elimination.md
Severity mappingreferences/severity-guide-web3.md
Triage simulationreferences/triage-simulation.md
Wallet trust boundaryreferences/wallet-trust-boundary.md
Platform report stylereferences/platforms/*.md
Finding schema/templateassets/templates/finding.schema.json
Scope parsingscripts/parse_web3_scope.py
Target normalizationscripts/normalize_targets.py
Scoringscripts/scoring_engine.py
Invariant output adapterscripts/invariant_output_adapter.py
Report generationscripts/generate_web3_report.py
Triage simulatorscripts/triage_simulator.py

Version tags

latestvk97bs0fkscp6t5ncvhgyaqn6qx81x4ez