Cyfrin CodeHawks
HomeCyfrinSoloditUpdraftSupport
  • 👋Intro to Cyfrin Codehawks
  • ✏️Glossary
  • ⁉️FAQs
  • 🛡️Hawks (auditors)
    • What is a Competitive Audit?
    • Quick Start
    • The Kick-Off Period
    • How to Present Your Findings
    • How to Evaluate a Finding Severity
    • How to Determine a Finding Validity
    • How to Write a PoC
    • Appeals
    • Payouts
    • How Does XP Work?
  • 👩‍⚖️Judging
    • The Judging Process
    • How Community Judging Works
    • Community Judging Eligibility
    • Disqualification Criteria
    • Payouts and Rewards
  • 👩‍💻Protocol teams (sponsors)
    • The Auditing process
    • Case Studies
    • Request an Audit
  • 🦅First Flights
  • 🫂Create and Submit a First Flight
  • 🛠️Tools
  • Learn blockchain security
  • Twitter
  • LinkedIn
  • GitHub
  • Support
Powered by GitBook
On this page
  • How to evaluate a finding severity
  • Examples of High, Medium, and Low severity findings

Was this helpful?

Edit on GitHub
  1. Hawks (auditors)

How to Evaluate a Finding Severity

PreviousHow to Present Your FindingsNextHow to Determine a Finding Validity

Last updated 11 months ago

Was this helpful?

When identifying vulnerabilities in a codebase, it's crucial to assess the potential impact and risk associated with them. Findings, or vulnerabilities, are separated into three categories:

  • High

  • Medium

  • Low severity

These severities help stakeholders prioritize and address the issues appropriately. For auditors, finding higher-severity findings will increase their ranking in the contest leaderboard and .

How to evaluate a finding severity

The severity of a finding can be categorized as High, Medium, or Low and is determined based on several factors:

  1. Impact on the protocol: How severe would the potential damage be if the vulnerability were exploited

  2. Likelihood of exploitation: How probable would an attacker exploit this vulnerability?

  3. Degree of judge/protocol subjectivity

Impact

High

Medium

Low

High

H

H/M

M

Likelihood

Medium

H/M

M

M/L

Low

M

M/L

L

Subjectivity in Classification

While the Impact vs Likelihood matrix provides a structured approach, there remains a degree of subjectivity in classifying findings. The judge's discretion is pivotal in determining a finding's category.

If the protocol under audit stipulates particular criteria, then those guidelines should be the benchmark for classifying findings.

How to evaluate the impact of a finding

Impact refers to the potential harm or consequence to the users or the protocol due to the vulnerability.

  • High Impact:

    • Funds are directly or nearly directly at risk.

    • There's a severe disruption of protocol functionality or availability.

  • Medium Impact:

    • Funds are indirectly at risk.

    • There's some level of disruption to the protocol's functionality or availability.

  • Low Impact:

    • Funds are not at risk.

    • However, a function might be incorrect, the state might not be handled appropriately, etc.

How to evaluate the likelihood of exploitation of a finding

Likelihood represents the probability of the impact occurring due to the vulnerability.

High likelihood

It's highly probable to happen. For instance, a hacker can call a function directly and extract money.

Medium likelihood

It might occur under specific conditions. For example, a peculiar ERC20 token is used on the platform.

Low likelihood

It is unlikely to occur. An example might be if a hard-to-change variable is set to a unique value on a specific block.

Note There are instances where the likelihood is deemed "computationally infeasible". For example, "An attacker could guess the user's private key".

The author must demonstrate that their finding is computationally feasible in such scenarios.

Examples of High, Medium, and Low severity findings

High Severity Findings

Properties:

  • Direct impact on the funds or the main functionality of the protocol.

  • The attack path is straightforward.

  • The vulnerability is easily exploitable, leading to significant damage.

Medium Severity Findings

Properties:

  • Indirect impact on the funds or the protocol's functionality.

  • The attack path isn't straightforward and needs specific conditions to be met.

  • Though the vulnerability might cause harm, exploiting it is challenging.

Low Severity Findings

Properties:

  • Minimal impact on the funds or the protocol's main functionality.

  • The vulnerability doesn't lead to tangible real-world damage.

  • The path to exploit is either non-existent or highly improbable.

Non-Acceptable Severity

As of August 18th, 2023, CodeHawks no longer accepts submissions with a severity of Gas, QA, or Informational. Ensure that the vulnerabilities you are submitting directly or indirectly impact the protocol and are not merely gas optimizations, quality assurance issues, or informational insights.


Example:

For more examples of High severity findings, visit .

Example:

For more examples of findings on medium severity, visit .

Example:

For more severe findings, visit .

For more information on how to write and submit findings, refer to the guide.

🛡️
payout
See Detailed High Severity Finding
Solodit
See Detailed Medium Severity Finding
Solodit
See Detailed Low Severity Finding
Solodit
How to write and submit a finding