Everything you need to secure smart contracts
Professional-grade security tools, accessible directly in your browser.
Deep Analysis Example
See exactly what our AI agent finds. This is a real report generated from a vulnerable codebase.
Security Analysis Report
Target: snowman | Scan ID: REPORT-4
Project Summary
The Snowman Merkle Airdrop system comprises three main contracts: Snow (ERC20 with weekly free-earn and paid purchase), Snowman (ERC721 on‐chain NFT), and SnowmanAirdrop (Merkle‐tree airdrop using EIP‐712 signatures). Our audit uncovered critical flaws across the protocol:
- •Snowman (ERC721) unrestricted mint: Any address can mint unlimited NFTs at no cost, and the mint routine is vulnerable to reentrancy DoS via the
_safeMinthook. - •Snow token economic bugs: The global earn timer can be DoSed by any user, blocking all others from earning. Users who overpay or underpay ETH in
buySnowpermanently lose funds until the collector withdraws, and the WETH transfer incollectFeeis unchecked, risking stuck tokens. - •SnowmanAirdrop logic faults: The airdrop contract never enforces the "has claimed" flag, allowing repeated claims if tokens are re-staked.
Severity Distribution
Critical Findings Preview
The Snowman contract's mintSnowman function is callable by any address without authorization, allowing attackers to mint unlimited NFTs to themselves at no cost. This breaks intended access control and devalues the NFT system.
In Snow.buySnow, if a user overpays ETH (i.e., sends more Ether than s_buyFee * amount), the surplus is not refunded and remains locked in the contract until collectFee is called by the collector.
Integrate Security directly into your CI/CD Pipeline
Eagle Audit isn't just a web interface. Our entire platform is built on top of a powerful, documented API that you can consume programmatically.
Automated Scanning
Trigger deep analysis scans automatically on every pull request or commit.
JSON & PDF Exports
Retrieve structured JSON data for your dashboards or full PDF reports for stakeholders.
Model Configuration
Select your favorite model for deep scans, including local models via Ollama.
curl -X POST "deep_report/" \
-H "Authorization: Bearer $API_KEY" \
-H "Content-Type: application/json" \
-d '{
"model": "gpt-5.1-codex-mini",
"provider": "azure-responses",
"targets": [
"src/PositionManager.sol",
"src/UniversalRouter.sol"
],
"workspace": "UniswapV4"
}'
# Response
{ "scan_id": "SCAN-8842", "status": "queued", ... }

