Mythril Classic is an open-source security analysis tool for Ethereum smart contracts. It uses concolic analysis, taint analysis and control flow checking to detect a variety of security vulnerabilities.
Whether you want to contribute, need support, or want to learn what we have cooking for the future, our Discord server will serve your needs.
Oh and by the way, we're also building an easy-to-use security analysis platform called MythX that integrates seamlessly with Truffle, Visual Studio Code, Github and other environments. If you're looking for tooling to plug into your SDLC you should check it out.
Get it with Docker:
$ docker pull mythril/myth
Install from Pypi:
$ pip3 install mythril
See the Wiki for more detailed instructions.
Instructions for using Mythril Classic are found on the Wiki.
For support or general discussions please join the Mythril community on Discord.
Mythril Classic's documentation is contained in the docs
folder. It is based on Sphinx and can be built using the Makefile contained in the subdirectory:
cd docs
make html
This will create a build
output directory containing the HTML output. Alternatively, PDF documentation can be built with make latexpdf
. The available output format options can be seen with make help
.
Visit the Smart Contract Vulnerability Classification Registry to find detailed information and remediation guidance for the vulnerabilities reported.