๐ Project Description: Decentralized Smart Contract Security Platform This platform transforms Web3 security by merging AI-powered verification, gig-based bug hunting, and automated smart contract workflows into one seamless ecosystem.
โญ Key Points Decentralized Bounty System: Developers upload smart contracts and deposit bounty funds. AI Audit Assistants: Automatically scan contracts for known vulnerabilities and generate risk reports. Bug Hunter Gig Marketplace: Open platform where security researchers browse, select, and hunt bounties. AI Bug Verification: AI verifies hunter-submitted bugs and determines validity. Smart Contract Payouts: If verified, rewards are automatically distributed via smart contracts. On-chain Recordkeeping: Contracts, submissions, and payout events are transparently logged on-chain. Reputation System: Hunters build credibility through successful reports; developers earn trust by resolving bugs. ๐ค AI Agents
Audit Agent: Pre-screens uploaded contracts, highlights common flaws (reentrancy, unchecked calls, etc.). Verification Agent: Analyzes bug reports, validates exploit feasibility, compares against existing vulnerabilities. Incentive Agent (optional): Suggests bounty amounts based on code complexity and past reward data. ๐ผ Gig Economy for Bug Hunters This platform introduces a decentralized gig model, similar to Upwork/Fiverr but tailored for Web3 security:
No Gatekeeping: Anyone can become a bug hunter and earn. Earn-as-you-hack: Bounties are released immediately upon verification. Skill-based Matching: Future roadmap includes AI recommending bounties based on hunter skill and history. Transparent and Fair: All contract audits, bug reports, and payouts are visible on-chain. ๐ง Prompt Documentation Project Title: Decentralized Smart Contract Security with AI Agents & Gig Economy for Bug Hunters
๐ค AI Agent 1: Analyze Agent ๐ Purpose Analyzes Solidity smart contract code for vulnerabilities and gas optimization issues, and generates a complete audit report.
๐ง Prompt Logic The AI is instructed to:
Categorize vulnerabilities like Reentrancy, Access Control, Arithmetic Bugs, Gas Optimization, etc. Provide detailed issue description, location, severity, and suggested fix. Structure the report in a standardized, markdown format. Always include a Security Score (0โ100). Even if no issues are found, return a full report with 100/100 score. ๐ฅ Prompt Used text CopyEditCarefully analyze the Solidity code for vulnerabilities. Follow the exact output format. Categorize each vulnerability with severity, location, and fix. Always respond with the full report โ never summarize in one line. Do not add any extra explanation before or after the report. If no bugs are found, still return the report with a 100/100 score. ๐ค Output Format markdown CopyEdit### Audit Report
Contract Overview:
[Short summary of the contract's functionality in 1โ2 lines.]
Vulnerabilities:
- [Category: e.g., Reentrancy]
- Location: [Function name]
- Severity: [High/Medium/Low]
- Issue: [Short issue description]
- Fix: [Suggested fix]
Security Score: [0โ100]
Audit Completed By: AI Smart Contract Auditor โ Sample Output markdown CopyEdit### Audit Report
Contract Overview:
This contract is a simple bank allowing users to deposit and withdraw Ether.
Vulnerabilities:
- [Category: Reentrancy]
- Location: withdraw()
- Severity: High
- Issue: External call is made before updating state, allowing for reentrancy attacks.
Fix: Use Checks-Effects-Interactions pattern and OpenZeppelin's ReentrancyGuard.
[Category: Gas Optimization]
Location: deposit()
Severity: Low
Issue: Mapping update can be optimized.
Fix: Use "unchecked" block to save gas in Solidity 0.8.x.
Security Score: 50/100
Audit Completed By: AI Smart Contract Auditor ๐งช AI Agent 2: Verification Agent ๐ Purpose Verifies whether a bug report submitted by a hunter accurately describes a real and valid vulnerability in a given Solidity contract.
๐ง Prompt Logic The AI:
Compares the report code (hunter submission) with the uploaded contract code. Checks if the issue exists, is correctly described, and is relevant. Returns a strict JSON format confirming if the report is legit or not. Prevents abuse by flagging false, trivial, or misreported bugs. ๐ฅ Prompt Used text CopyEditCompare the submitted bug report (review code) to the provided smart contract code. Carefully check whether the vulnerability exists and is described correctly. Return response strictly as a JSON object: isLegit + reason. Do not explain or repeat the code. Be strict โ mark false reports as isLegit: false. Do not exceed 1โ2 sentences in 'reason'. Add the given address in the response, like send the bounty to the address. Follow the format exactly as specified. Always return the response in JSON format and ensure it can be parsed using JSON.parse. ๐ค Output Format json CopyEdit{ "isLegit": true, "reason": "[Short valid explanation]", "sendTo": "0xHunterAddress" } Or:
json CopyEdit{ "isLegit": false, "reason": "[Short invalid explanation]", "sendTo": "0xHunterAddress" } โ Sample Output json CopyEdit{ "isLegit": true, "reason": "The report accurately identifies a reentrancy vulnerability in the withdraw function and provides a correct description, location, and fix.", "sendTo": "0x1234...abcd" } ๐งฐ AI Tools Used ToolPurposeOpenAI GPT-4 MiniCore LLM used for smart contract understanding and reasoningCovalent AI Agent SDKCustom agent execution, routing, and prompt management
Built With
- covalent
- nextjs
- openai
- remix
- rootstock
- solidity
- supabase
Log in or sign up for Devpost to join the conversation.