Skip to content

Latest commit

 

History

History
111 lines (78 loc) · 3.62 KB

README.md

File metadata and controls

111 lines (78 loc) · 3.62 KB

L3X - AI-driven Static Analyzer

L3X detects vulnerabilities in Rust and Solidity code based on patterns and AI code analysis. Various LLMs act as validators for vulnerabilities detected by patterns and validate each other's results in AI code analysis. Vulnerabilities are confirmed when they receive confirmation from a majority of validators. As a result, a report with validated vulnerabilities and detected safe patterns is generated.

Supported Languages and Smart Contracts:

  • General Rust code
  • Rust-based Solana smart contracts
  • Solidity-based Ethereum smart contracts

Design

design

How It Works

  • Vulnerability Patterns Code Analysis: Check the rules:
  • AI Code Analysis: Analysis of smart contract code for vulnerabilities using Language Model validators (LLMs).
  • LLM Validators: Potential vulnerabilities detected are passed on to multiple LLM validators for confirmation. Three different models are utilized: GPT-4, Gemini, and Claude 2.
  • Validation Process: Each validator independently assesses potential vulnerabilities. Detected vulnerabilities undergo a validation check.
  • Decision Making:
    • Valid: A vulnerability is confirmed as valid when at least two LLM validators agree.
    • False Positive: A finding is marked as a false positive when identified as such by at least two validators.
  • Cross-Validation: Each LLM performs a cross-validation check during the AI Code Analysis phase.
  • Report Generation: A report is generated that compiles all confirmed vulnerabilities, with duplicates removed.

Current limitations

Currently it's MVP

  1. Vulnerabilities detects only based on vuln patterns
  2. GPT-3.5/4 act as validators for vulnerabilities detected by patterns

LLM supported

  • GPT-3.5
  • GPT-4
  • Claude (Soon)
  • Gemini (Planned)

Set API Keys

Set the openai api key as an environment variable OPENAI_KEY in your operating system

Linux/Mac

export OPENAI_KEY=sk-ApiKeyExample

Windows

set OPENAI_KEY=sk-ApiKeyExample

If you want to specify particular OpenAI org or project, set up OPENAI_ORG_ID and OPENAI_PROJECT_ID environment variables.

How to Use ❓

  1. Build
cargo build
  1. Compile
cargo run
  1. Run
  • By default, only critical and high severity findings are validated. To validate all findings, use the --all-severities flag.
  • To skip vulnerability validation and generate the report without validation, use the --no-validation flag.
  • To specify the OpenAI model to use for vulnerability validation (default is gpt-3.5-turbo), use the --model flag followed by the model name (e.g., --model=gpt-4).
l3x smart-contracts-folder-to-analyse [--all-severities] [--no-validation] [--model=MODEL]

Usage Example 🏁

exec!

gif!

Report example - Rust

Report example - Solana

Report example - Ethereum

Roadmap 🗓️

  • Design
  • MVP concept
  • Rust support
  • Solana support
  • Solidity support
  • GPT-4 Integration
  • Claude Integration 🔜
  • Gemini Integration
  • AI Code Analysis
  • AI Code Analysis - Cross-Validation
  • Refactor
  • Accuracy Comparison

Contact 📧

All suggestions write to contact contact@vulnplanet.com or yevhsec1@gmail.com