Level up your Solidity LLM tooling with Slither-MCP #1574
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What it is: Trail of Bits released Slither-MCP, an MCP server that exposes Slither’s Solidity static analysis to LLMs. It gives LLMs deterministic, program-analysis-backed answers for source lookup, call-graph navigation, inheritance resolution, and detector runs across real-world Solidity codebases (Foundry, Hardhat, etc.).
Why it matters: LLMs are probabilistic and often rely on brittle
grep/🔧 Technical DetailsDeterministic code understanding via MCP-backed static analysis: When auditing Solidity, replace probabilistic
grep/read_filewith MCP calls to Slither. Useget_function_sourceto resolve the canonical implementation across imports and inheritance, then enumerate callers/callees to build accurate usage paths for targeted functions (e.g.,ERC20.transfer()).Signature-to-implementation mapping to avoid false positives: Query by function signature (e.g.,
IOracle.price(...)) to programmatically find concrete implementations, ensuring subsequent analysis (detectors, call tracing) operates on the correct contract.Focused triage with scoped detector runs: Invoke Slither’s detector suite and filter results to specific contracts/functions to quickly surface high-signal findings in large codebases.
🤖 Agent Actions
I analyzed the blog and the repository and found there wasn’t an existing page specifically covering Slither-MCP. The most relevant location to integrate this content is the existing Slither-focused page under Blockchain > Smart Contract Security: “Mutation Testing for Solidity with Slither (slither-mutate).” I updated that file by adding a concise, technical section describing Slither-MCP, its capabilities, auditing workflow improvements, and setup steps for Claude Code and Cursor IDE. I also added the blog and the Slither-MCP GitHub repo to the References.
Summary of changes implemented:
Reasoning:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).