All Products
Search
Document Center

Smart Contract Analyzer

Last Updated: Aug 01, 2019

This article describes how to use the smart contract analyzer in the Alibaba Cloud BaaS Developers Service. Smart Contract Analyzer can detect and locate vulnerabilities in a smart contract, as well as violations of best practices, and then summarize these issues in the form of analysis reports. The analysis report also contains a detailed description of the vulnerability and best practices.

Use smart contract analyzer

  1. Visit Alibaba Cloud BaaS Management Console。Click the drop-down button in the left navigation bar and select “Developers Services” to enter the developers service page.nav_bar

  2. Create a smart contract analysis task. On the Smart contract analyzing page, click on “Create Task” on the right.create_task

  3. Upload smart contract。upload

Note: The file format supports the .sol source file, the .go source file, and the .tar.gz or .tar package. The contract type currently supports both Solidity and Fabric-Golang smart contract.

  1. Check the analyzing status. You can click the “Refresh” button to refresh the status of the current contract analyzing task.refresh_task

Note: Generally, the smart contract analyzing task lasts for about 10 seconds to 2 minutes.

  1. Download the smart contract analysis report. After the task is completed, you can click the “Download” button to download the analysis report.download_report

  2. Interpretation of the analysis report. The content of analysis report is categorized by the type of vulnerabilities found and the occurrence number of each vulnerability is shown as well.ca_step6

  3. Interpretation of vulnerability details. Click on the vulnerability to unfold the detailed description.ca_step7

    Note: The Show Code/Hide Code button can show/hide the relevant code segments in the smart contract. The “Explanation” button can display a detailed description of this vulnerability and provide sample code for your reference. Click on “Explanation” again to close the popup.