Recognition: unknown
V2E: Validating Smart Contract Vulnerabilities through Profit-driven Exploit Generation and Execution
Pith reviewed 2026-05-10 13:20 UTC · model grok-4.3
The pith
V2E uses LLM-generated PoCs and execution feedback to validate whether smart contract vulnerabilities are truly exploitable and profitable.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
V2E automates the generation of targeted Proof-of-Concept exploits by analyzing vulnerability paths, validates them through triggerability and profitability analysis, and iteratively refines the PoCs based on execution feedback to increase the likelihood of confirming actual vulnerabilities.
What carries the argument
The V2E pipeline combining LLM-based PoC generation, automated triggerability and profitability checks, and iterative refinement from execution results.
Load-bearing premise
LLMs can generate and iteratively update PoCs that reliably trigger the specific reported vulnerabilities, and the profitability analysis correctly distinguishes exploitable issues from non-issues.
What would settle it
Applying V2E to a benchmark of smart contracts with known non-exploitable vulnerabilities and observing if it incorrectly validates them as exploitable.
Figures
read the original abstract
Smart contracts are a critical component of blockchain systems. Due to the large amount of digital assets carried by smart contracts, their security is of critical importance. Although numerous tools have been developed for detecting smart contract vulnerability, their effectiveness remains limited, particularly due to the high false positives included in the reported results. Therefore, developers and auditors are often overwhelmed with manually verifying the reported issues. A fundamental reason behind this is that while a reported vulnerability satisfies specific vulnerable patterns, it may not actually be exploitable, either because the vulnerable code cannot be triggered or it does not result in any financial loss. In this paper, we propose V2E, a new framework for validating whether a reported vulnerability is truly exploitable. The core idea of V2E is to automatically generate executable Proof-of-Concept Exploit (PoC for short), and then assess if the vulnerability could be triggered and incur any real damage (i.e., causing financial loss) by the PoC. While LLMs have shown proficiency in PoC generation, achieving our task is by no means trivial. In detail, it is difficult for LLM to: (1) generate and update PoC to trigger a specific vulnerability, (2) evaluate the PoC's effectiveness to validate exploitable vulnerability. To this end, V2E automates the whole process through a novel combination of PoC generation, validation, and refinement: (1) Firstly, V2E generates targeted PoCs by analyzing potential vulnerability paths. (2) Then, V2E verifies the validity of PoCs through triggerability and profitability analysis. (3) In addition, V2E iteratively refines the generated PoC based on PoC execution feedback, therefore, increasing the chance to confirm the vulnerability. Evaluation on 264 manually labeled contracts shows that V2E outperforms the baseline approach.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper introduces V2E, a framework designed to validate reported smart contract vulnerabilities by generating, validating, and refining Proof-of-Concept (PoC) exploits using large language models (LLMs). The approach involves analyzing vulnerability paths to create targeted PoCs, assessing their triggerability and profitability to confirm potential financial loss, and iteratively refining the PoCs based on execution feedback. An evaluation on 264 manually labeled contracts is presented, claiming superior performance compared to a baseline method.
Significance. Should the approach prove effective, V2E has the potential to significantly alleviate the burden of manual verification for smart contract auditors and developers by automatically distinguishing exploitable vulnerabilities from false positives. This is particularly valuable in blockchain ecosystems where vulnerabilities can lead to substantial financial losses, thereby enhancing the overall security and trustworthiness of smart contract deployments.
major comments (2)
- Abstract: The evaluation on 264 manually labeled contracts is said to show outperformance, but no specifics are provided regarding the baseline approach, performance metrics (e.g., accuracy, precision), statistical significance, data selection process, or the definition and measurement of profitability. This omission is load-bearing as it prevents verification of whether the results genuinely support the framework's ability to reduce false positives.
- V2E Framework Description (PoC generation, validation, and refinement): The iterative refinement process based on PoC execution feedback lacks details on how feedback (e.g., execution logs, balance deltas, revert reasons) is parsed and incorporated into LLM prompts without risking hallucinations or incorrect updates. Additionally, the exact criteria for triggerability and profitability analysis, especially handling complex interactions like reentrancy or external calls, are not elaborated, raising concerns about false positives in validation.
minor comments (1)
- Abstract: The term 'baseline approach' is mentioned without any description; a brief characterization in the abstract or a reference to the specific method would improve clarity.
Simulated Author's Rebuttal
We thank the referee for the constructive comments on our paper. We address the major comments point by point below, indicating planned revisions to enhance the manuscript.
read point-by-point responses
-
Referee: Abstract: The evaluation on 264 manually labeled contracts is said to show outperformance, but no specifics are provided regarding the baseline approach, performance metrics (e.g., accuracy, precision), statistical significance, data selection process, or the definition and measurement of profitability. This omission is load-bearing as it prevents verification of whether the results genuinely support the framework's ability to reduce false positives.
Authors: We acknowledge that the abstract provides only a high-level overview of the evaluation results. The detailed information on the baseline approach, performance metrics including precision, recall, and F1-score, the data selection from a set of 264 labeled contracts with ground truth, and the profitability measurement based on simulated balance changes are elaborated in the Evaluation section of the manuscript. To make the abstract more self-contained, we will revise it to include brief mentions of the key metrics, baseline, and profitability validation. We will also ensure statistical significance is reported in the evaluation section. revision: yes
-
Referee: V2E Framework Description (PoC generation, validation, and refinement): The iterative refinement process based on PoC execution feedback lacks details on how feedback (e.g., execution logs, balance deltas, revert reasons) is parsed and incorporated into LLM prompts without risking hallucinations or incorrect updates. Additionally, the exact criteria for triggerability and profitability analysis, especially handling complex interactions like reentrancy or external calls, are not elaborated, raising concerns about false positives in validation.
Authors: We appreciate this feedback on the framework description. The manuscript outlines the iterative refinement where PoC execution results are used to update the LLM prompts for better PoCs. To address the lack of details, we will expand this section with more precise descriptions of how feedback is processed (e.g., extracting revert reasons and balance deltas and including them in structured prompts) and measures to reduce hallucinations, such as using few-shot examples. For the criteria, triggerability is determined by whether the PoC executes the vulnerable function without reverting, and profitability by whether the attacker's balance increases. For complex cases like reentrancy, the framework supports multi-transaction PoCs to simulate such attacks. We will add explicit criteria and examples in the revision to clarify and reduce concerns about false positives. revision: yes
Circularity Check
No circularity; empirical validation stands on independent evaluation
full rationale
The paper describes an LLM-assisted framework (V2E) for generating, validating, and refining PoCs via vulnerability-path analysis, triggerability/profitability checks, and execution feedback. Its claims rest on an empirical evaluation over 264 manually labeled contracts that reports outperformance versus a baseline. No equations, fitted parameters renamed as predictions, self-definitional loops, or load-bearing self-citations appear in the derivation. The central argument is therefore self-contained against external benchmarks rather than reducing to its own inputs by construction.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption LLMs have sufficient proficiency in generating and updating PoC code for smart contract vulnerabilities when given vulnerability path analysis
Reference graph
Works this paper leans on
-
[1]
anthropic. 2025. Introducing Claude 4. https://www.anthropic.com/news/claude-4. Proc. ACM Softw. Eng., Vol. 3, No. FSE, Article FSE101. Publication date: July 2026. V2E: Validating Smart Contract Vulnerabilities through Profit-driven Exploit Generation and Execution FSE101:21
2025
-
[2]
Sam Blackshear, Evan Cheng, David L Dill, Victor Gao, Ben Maurer, Todd Nowacki, Alistair Pott, Shaz Qadeer, Dario Russi Rain, Stephane Sezer, et al. 2019. Move: A language with programmable resources.Libra Assoc1 (2019)
2019
-
[3]
Priyanka Bose, Dipanjan Das, Yanju Chen, Yu Feng, Christopher Kruegel, and Giovanni Vigna. 2022. Sailfish: Vetting smart contract state-inconsistency bugs in seconds. In2022 IEEE Symposium on Security and Privacy (SP). IEEE, 161–178
2022
-
[4]
c5huracan. 2025. Experimental exploration of AI-driven smart contract security analysis for educational and defensive research purposes. https://github.com/c5huracan/a1-agent-exploration
2025
-
[5]
Stefanos Chaliasos, Marcos Antonios Charalambous, Liyi Zhou, Rafaila Galanopoulou, Arthur Gervais, Dimitris Mitropoulos, and Benjamin Livshits. 2024. Smart contract and defi security tools: Do they meet the needs of practition- ers?. InProceedings of the 46th IEEE/ACM International Conference on Software Engineering. 1–13
2024
-
[6]
Zhiyang Chen, Sidi Mohamed Beillahi, and Fan Long. 2024. FlashSyn: Flash Loan Attack Synthesis via Counter Example Driven Approximation. InProceedings of the 46th IEEE/ACM International Conference on Software Engineering, ICSE 2024
2024
-
[7]
2017.Introducing Ethereum and solidity
Chris Dannen. 2017.Introducing Ethereum and solidity. Vol. 1. Springer
2017
-
[8]
DeFiHackLabs. 2025. DeFi Hacks Reproduce - Foundry. Retrieved August 31, 2025 from https://github.com/ SunWeb3Sec/DeFiHackLabs
2025
-
[9]
DefiLlama. 2025. Breakdown by Smart Contract Languages. Retrieved August 31, 2025 from https://defillama.com/ languages
2025
-
[10]
Mojtaba Eshghie and Cyrille Artho. 2024. Oracle-guided vulnerability diversity and exploit synthesis of smart contracts using llms. InProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering. 2240–2248
2024
-
[11]
Zhiyu Fan, Xiang Gao, Martin Mirchev, Abhik Roychoudhury, and Shin Hwei Tan. 2023. Automated repair of programs from large language models. In2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE). IEEE, 1469–1481
2023
-
[12]
protected
Yuzhou Fang, Daoyuan Wu, Xiao Yi, Shuai Wang, Yufan Chen, Mengjie Chen, Yang Liu, and Lingxiao Jiang. 2023. Beyond “protected” and “private”: An empirical security analysis of custom function modifiers in smart contracts. In Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis. 1157–1168
2023
-
[13]
Josselin Feist, Gustavo Grieco, and Alex Groce. 2019. Slither: a static analysis framework for smart contracts. In2019 IEEE/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB). IEEE, 8–15
2019
-
[14]
Ferreira, Pedro Cruz, Thomas Durieux, and Rui Abreu
João F. Ferreira, Pedro Cruz, Thomas Durieux, and Rui Abreu. 2021. SmartBugs: a framework to analyze solidity smart contracts. InProceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering. 1349–1352
2021
-
[15]
Foundry-rs. 2025. A blazing fast, portable and modular toolkit for Ethereum application. Retrieved September 10, 2025 from https://github.com/foundry-rs/foundry
2025
-
[16]
Foundry-rs. 2025. Foundry support Solidity versions greater than 0.6. Retrieved August 31, 2025 from https: //github.com/foundry-rs/forge-std/blob/master/src/StdToml.sol#L2
2025
- [17]
-
[18]
Asem Ghaleb and Karthik Pattabiraman. 2020. How effective are smart contract analysis tools? evaluating smart contract static analysis tools using bug injection. InProceedings of the 29th ACM SIGSOFT international symposium on software testing and analysis. 415–427
2020
-
[19]
Asem Ghaleb, Julia Rubin, and Karthik Pattabiraman. 2022. eTainter: detecting gas-related vulnerabilities in smart contracts. InProceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis. 728–739
2022
-
[20]
Asem Ghaleb, Julia Rubin, and Karthik Pattabiraman. 2023. AChecker: Statically Detecting Smart Contract Access Control Vulnerabilities.Proc. ACM ICSE(2023)
2023
-
[21]
Neville Grech, Lexi Brent, Bernhard Scholz, and Yannis Smaragdakis. 2019. Gigahorse: thorough, declarative de- compilation of smart contracts. In2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE). IEEE, 1176–1186
2019
-
[22]
Daya Guo, Dejian Yang, Haowei Zhang, Junxiao Song, Ruoyu Zhang, Runxin Xu, Qihao Zhu, Shirong Ma, Peiyi Wang, Xiao Bi, et al. 2025. Deepseek-r1: Incentivizing reasoning capability in llms via reinforcement learning.arXiv preprint arXiv:2501.12948(2025)
work page internal anchor Pith review Pith/arXiv arXiv 2025
-
[23]
Tianyuan Hu, Jingyue Li, Bixin Li, and Andre Storhaug. 2024. Why smart contracts reported as vulnerable were not exploited?IEEE Transactions on Dependable and Secure Computing(2024)
2024
-
[24]
Jie Huang and Kevin Chen-Chuan Chang. 2023. Towards Reasoning in Large Language Models: A Survey. InThe 61st Annual Meeting Of The Association For Computational Linguistics
2023
-
[25]
Ling Jin, Yinzhi Cao, Yan Chen, Di Zhang, and Simone Campanoni. 2023. ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities.IEEE Trans. Dependable Secur. Comput.(2023)
2023
-
[26]
Queping Kong, Jiachi Chen, Yanlin Wang, Zigui Jiang, and Zibin Zheng. 2023. DeFiTainter: Detecting Price Manipulation Vulnerabilities in DeFi Protocols. InProceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing Proc. ACM Softw. Eng., Vol. 3, No. FSE, Article FSE101. Publication date: July 2026. FSE101:22 Jingwen Zhang et al. and An...
2023
-
[27]
Ziqiao Kong, Cen Zhang, Maoyi Xie, Ming Hu, Yue Xue, Ye Liu, Haijun Wang, and Yang Liu. 2025. Smart Contract Fuzzing Towards Profitable Vulnerabilities.Proceedings of the ACM on Software Engineering2, FSE (2025), 153–175
2025
-
[28]
Johannes Krupp and Christian Rossow. 2018. {teEther}: Gnawing at ethereum to automatically exploit smart contracts. In27th USENIX security symposium (USENIX Security 18). 1317–1333
2018
- [29]
-
[30]
Wei Li, Yuhong Nan, Mingxi Ye, Jingwen Zhang, Peilin Zheng, and Zibin Zheng. 2025. ASTRO: Detecting Access Control Vulnerabilities in Smart Contracts via Graph Similarity Comparison.IEEE Transactions on Software Engineering (2025)
2025
-
[31]
Zeqin Liao, Zibin Zheng, Xiao Chen, and Yuhong Nan. 2022. SmartDagger: a bytecode-based static analysis approach for detecting cross-contract vulnerability. InProceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis. 752–764
2022
- [32]
-
[33]
Zhenguang Liu, Peng Qian, Jiaxu Yang, Lingfeng Liu, Xiaojun Xu, Qinming He, and Xiaosong Zhang. 2023. Rethinking smart contract fuzzing: Fuzzing with invocation ordering and important branch revisiting.IEEE Transactions on Information Forensics and Security18 (2023), 1237–1251
2023
- [34]
-
[35]
Muhammad Izhar Mehar, Charles Louis Shier, Alana Giambattista, Elgar Gong, Gabrielle Fletcher, Ryan Sanayhie, Henry M Kim, and Marek Laskowski. 2019. Understanding a revolutionary and flawed grand experiment in blockchain: The DAO attack.Journal of Cases on Information Technology (JCIT)21, 1 (2019), 19–32
2019
-
[36]
William Metcalfe et al. 2020. Ethereum, smart contracts, DApps.Blockchain and Crypt Currency77 (2020), 77–93
2020
-
[37]
Bernhard Mueller. 2018. Smashing ethereum smart contracts for fun and real profit.HITB SECCONF Amsterdam9, 54 (2018), 4–17
2018
-
[38]
Tai D Nguyen, Long H Pham, Jun Sun, Yun Lin, and Quang Tran Minh. 2020. sfuzz: An efficient adaptive fuzzer for solidity smart contracts. InProceedings of the ACM/IEEE 42nd International Conference on Software Engineering. 778–788
2020
- [39]
-
[40]
OpenAI. 2025. OpenAI Platform. Retrieved August 31, 2025 from https://platform.openai.com/docs/models/gpt-4o
2025
-
[41]
OpenAI. 2025. OpenAI Price. Retrieved August 31, 2025 from https://openai.com/api/pricing/
2025
-
[42]
Daniel Perez and Benjamin Livshits. 2021. Smart contract vulnerabilities: Vulnerable does not imply exploited. In30th USENIX Security Symposium (USENIX Security 21). 1325–1341
2021
- [43]
- [44]
-
[45]
Chaofan Shou, Shangyin Tan, and Koushik Sen. 2023. Ityfuzz: Snapshot-based fuzzer for smart contract. InProceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis. 322–333
2023
- [46]
-
[47]
SmartContractSecurity. 2025. Smart Contract Weakness Classification and Test Cases. Retrieved August 31, 2025 from https://github.com/SmartContractSecurity/SWC-registry
2025
-
[48]
Solidity. 2025. Solidity Source Mappings - Documentation. Retrieved August 31, 2025 from https://docs.soliditylang. org/en/latest/internals/source_mappings.html
2025
-
[49]
soliditylang. 2025. Solidity v0.8.0 Breaking Changes. Retrieved September 10, 2025 from https://docs.soliditylang.org/ en/latest/080-breaking-changes.html
2025
-
[50]
Yuqiang Sun, Daoyuan Wu, Yue Xue, Han Liu, Haijun Wang, Zhengzi Xu, Xiaofei Xie, and Yang Liu. 2024. Gptscan: Detecting logic vulnerabilities in smart contracts by combining gpt with program analysis. InProceedings of the IEEE/ACM 46th International Conference on Software Engineering. 1–13
2024
-
[51]
Christof Ferreira Torres, Antonio Ken Iannillo, Arthur Gervais, and Radu State. 2021. Confuzzius: A data dependency- aware hybrid fuzzer for smart contracts. In2021 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, Proc. ACM Softw. Eng., Vol. 3, No. FSE, Article FSE101. Publication date: July 2026. V2E: Validating Smart Contract Vulnerabili...
2021
-
[52]
Vyper. 2025. Vyper Document. Retrieved August 31, 2025 from https://docs.vyperlang.org/en/latest/
2025
-
[53]
Zexu Wang, Jiachi Chen, Peilin Zheng, Yu Zhang, Weizhe Zhang, and Zibin Zheng. 2024. Unity is strength: Enhancing precision in reentrancy vulnerability detection of smart contract analysis tools.IEEE Transactions on Software Engineering(2024)
2024
-
[54]
Gavin Wood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger.Ethereum project yellow paper151, 2014 (2014), 1–32
2014
-
[55]
Shuohan Wu, Zihao Li, Luyi Yan, Weimin Chen, Muhui Jiang, Chenxu Wang, Xiapu Luo, and Hao Zhou. 2024. Are we there yet? unraveling the state-of-the-art smart contract fuzzers. InProceedings of the IEEE/ACM 46th International Conference on Software Engineering. 1–13
2024
-
[56]
Yin Wu, Xiaofei Xie, Chenyang Peng, Dijun Liu, Hao Wu, Ming Fan, Ting Liu, and Haijun Wang. 2024. AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis. In Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, ASE
2024
-
[57]
Valentin Wüstholz and Maria Christakis. 2020. Harvey: A greybox fuzzer for smart contracts. InProceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 1398–1409
2020
-
[58]
Chunqiu Steven Xia and Lingming Zhang. 2024. Automated program repair via conversation: Fixing 162 out of 337 bugs for $0.42 each using chatgpt. InProceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis. 819–831
2024
-
[59]
Ziwei Xu, Sanjay Jain, and Mohan Kankanhalli. 2024. Hallucination is inevitable: An innate limitation of large language models.arXiv preprint arXiv:2401.11817(2024)
work page internal anchor Pith review arXiv 2024
-
[60]
Yinxing Xue, Jiaming Ye, Wei Zhang, Jun Sun, Lei Ma, Haijun Wang, and Jianjun Zhao. 2022. xfuzz: Machine learning guided cross-contract fuzzing.IEEE Transactions on Dependable and Secure Computing(2022)
2022
-
[61]
Mingxi Ye, Xingwei Lin, Yuhong Nan, Jiajing Wu, and Zibin Zheng. 2024. Midas: Mining Profitable Exploits in On-Chain Smart Contracts via Feedback-Driven Fuzzing and Differential Analysis. InProceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis. 794–805
2024
-
[62]
Mingxi Ye, Yuhong Nan, Zibin Zheng, Dongpeng Wu, and Huizhong Li. 2023. Detecting State Inconsistency Bugs in DApps via On-Chain Transaction Replay and Fuzzing. InProceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis. 298–309
2023
-
[63]
Zheng Yu, Ziyi Guo, Yuhang Wu, Jiahao Yu, Meng Xu, Dongliang Mu, Yan Chen, and Xinyu Xing. [n. d.]. PATCHAGENT: A Practical Program Repair Agent Mimicking Human Expertise. InUSENIX Security 2025
2025
-
[64]
Jingwen Zhang, Yuhong Nan, Wei Li, Kaiwen Ning, Zewei Lin, Zitong Yao, Yuming Feng, Weizhe Zhang, and Zibin Zheng. 2025. Finding Insecure State Dependency in DApps via Multi-Source Tracing and Semantic Enrichment. In 2025 40th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 1529–1540
2025
-
[65]
Jingwen Zhang, Zibin Zheng, Yuhong Nan, Mingxi Ye, Kaiwen Ning, Yu Zhang, and Weizhe Zhang. 2025. SmartReco: De- tecting Read-Only Reentrancy via Fine-Grained Cross-DApp Analysis. InProceedings of the IEEE/ACM 47th International Conference on Software Engineering. 1–12
2025
-
[66]
Qingzhao Zhang, Yizhuo Wang, Juanru Li, and Siqi Ma. 2020. EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts. In27th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2020, London, ON, Canada, February 18-21, 2020. 116–126
2020
-
[67]
Wuqi Zhang, Zhuo Zhang, Qingkai Shi, Lu Liu, Lili Wei, Yepang Liu, Xiangyu Zhang, and Shing-Chi Cheung. 2024. Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts. In2024 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 146–146
2024
-
[68]
Zhuo Zhang, Brian Zhang, Wen Xu, and Zhiqiang Lin. 2023. Demystifying exploitable bugs in smart contracts. In2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE). IEEE, 615–627
2023
-
[69]
Zibin Zheng, Jianzhong Su, Jiachi Chen, David Lo, Zhijie Zhong, and Mingxi Ye. 2024. DAppSCAN: Building Large-Scale Datasets for Smart Contract Weaknesses in DApp Projects.IEEE Transactions on Software Engineering(2024). Received 2025-09-11; accepted 2026-03-24 Proc. ACM Softw. Eng., Vol. 3, No. FSE, Article FSE101. Publication date: July 2026
2024
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.