entry-point-analyzer — entry-point-analyzer for smart contract security entry-point-analyzer, ChatGPTCaricature, community, entry-point-analyzer for smart contract security, ide skills, installing entry-point-analyzer, Claude Code, Cursor, Windsurf

v1.0.0
GitHub

About this Skill

Perfect for Smart Contract Agents needing advanced security audit capabilities and state-changing entry point analysis. entry-point-analyzer is a skill that analyzes smart contract codebases to identify state-changing entry points, facilitating security audits and access control pattern analysis.

Features

Systematically identifies state-changing entry points in smart contract codebases
Guides security audits to map the attack surface of smart contracts
Analyzes access control patterns across a codebase
Identifies privileged operations and role-restricted functions
Helps build an understanding of which functions can modify contract state

# Core Topics

1203992808 1203992808
[0]
[0]
Updated: 3/8/2026

Agent Capability Analysis

The entry-point-analyzer skill by 1203992808 is an open-source community AI agent skill for Claude Code and other IDE workflows, helping agents execute tasks with better context, repeatability, and domain-specific guidance. Optimized for entry-point-analyzer for smart contract security, installing entry-point-analyzer.

Ideal Agent Persona

Perfect for Smart Contract Agents needing advanced security audit capabilities and state-changing entry point analysis.

Core Value

Empowers agents to systematically identify state-changing entry points in smart contract codebases, guiding security audits with access control pattern analysis and privileged operation identification using Solidity and Ethereum protocols.

Capabilities Granted for entry-point-analyzer

Automating smart contract security audits to map attack surfaces
Identifying external functions and audit flows in Solidity code
Analyzing access control patterns and role-restricted functions in Ethereum smart contracts

! Prerequisites & Limits

  • Requires access to smart contract codebase
  • Limited to Ethereum-based smart contracts
  • Needs expertise in Solidity and smart contract security
Labs Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

entry-point-analyzer

Install entry-point-analyzer, an AI agent skill for AI agent workflows and automation. Works with Claude Code, Cursor, and Windsurf with one-command setup.

SKILL.md
Readonly

Entry Point Analyzer

Systematically identify all state-changing entry points in a smart contract codebase to guide security audits.

When to Use

Use this skill when:

  • Starting a smart contract security audit to map the attack surface
  • Asked to find entry points, external functions, or audit flows
  • Analyzing access control patterns across a codebase
  • Identifying privileged operations and role-restricted functions
  • Building an understanding of which functions can modify contract state

When NOT to Use

Do NOT use this skill for:

  • Vulnerability detection (use audit-context-building or domain-specific-audits)
  • Writing exploit POCs (use solidity-poc-builder)
  • Code quality or gas optimization analysis
  • Non-smart-contract codebases
  • Analyzing read-only functions (this skill excludes them)

Scope: State-Changing Functions Only

This skill focuses exclusively on functions that can modify state. Excluded:

LanguageExcluded Patterns
Solidityview, pure functions
Vyper@view, @pure functions
SolanaFunctions without mut account references
MoveNon-entry public fun (module-callable only)
TONget methods (FunC), read-only receivers (Tact)
CosmWasmquery entry point and its handlers

Why exclude read-only functions? They cannot directly cause loss of funds or state corruption. While they may leak information, the primary audit focus is on functions that can change state.

Workflow

  1. Detect Language - Identify contract language(s) from file extensions and syntax
  2. Use Tooling (if available) - For Solidity, check if Slither is available and use it
  3. Locate Contracts - Find all contract/module files (apply directory filter if specified)
  4. Extract Entry Points - Parse each file for externally callable, state-changing functions
  5. Classify Access - Categorize each function by access level
  6. Generate Report - Output structured markdown report

Slither Integration (Solidity)

For Solidity codebases, Slither can automatically extract entry points. Before manual analysis:

1. Check if Slither is Available

bash
1which slither

2. If Slither is Detected, Run Entry Points Printer

bash
1slither . --print entry-points

This outputs a table of all state-changing entry points with:

  • Contract name
  • Function name
  • Visibility
  • Modifiers applied

3. Use Slither Output as Foundation

  • Parse the Slither output table to populate your analysis
  • Cross-reference with manual inspection for access control classification
  • Slither may miss some patterns (callbacks, dynamic access control)—supplement with manual review
  • If Slither fails (compilation errors, unsupported features), fall back to manual analysis

4. When Slither is NOT Available

If which slither returns nothing, proceed with manual analysis using the language-specific reference files.

Language Detection

ExtensionLanguageReference
.solSolidity{baseDir}/references/solidity.md
.vyVyper{baseDir}/references/vyper.md
.rs + Cargo.toml with solana-programSolana (Rust){baseDir}/references/solana.md
.moveMove (Aptos/Sui){baseDir}/references/move.md
.fc, .func, .tactTON (FunC/Tact){baseDir}/references/ton.md
.rs + Cargo.toml with cosmwasm-stdCosmWasm{baseDir}/references/cosmwasm.md

Load the appropriate reference file(s) based on detected language before analysis.

Access Classification

Classify each state-changing entry point into one of these categories:

1. Public (Unrestricted)

Functions callable by anyone without restrictions.

2. Role-Restricted

Functions limited to specific roles. Common patterns to detect:

  • Explicit role names: admin, owner, governance, guardian, operator, manager, minter, pauser, keeper, relayer, lender, borrower
  • Role-checking patterns: onlyRole, hasRole, require(msg.sender == X), assert_owner, #[access_control]
  • When role is ambiguous, flag as "Restricted (review required)" with the restriction pattern noted

3. Contract-Only (Internal Integration Points)

Functions callable only by other contracts, not by EOAs. Indicators:

  • Callbacks: onERC721Received, uniswapV3SwapCallback, flashLoanCallback
  • Interface implementations with contract-caller checks
  • Functions that revert if tx.origin == msg.sender
  • Cross-contract hooks

Output Format

Generate a markdown report with this structure:

markdown
1# Entry Point Analysis: [Project Name] 2 3**Analyzed**: [timestamp] 4**Scope**: [directories analyzed or "full codebase"] 5**Languages**: [detected languages] 6**Focus**: State-changing functions only (view/pure excluded) 7 8## Summary 9 10| Category | Count | 11|----------|-------| 12| Public (Unrestricted) | X | 13| Role-Restricted | X | 14| Restricted (Review Required) | X | 15| Contract-Only | X | 16| **Total** | **X** | 17 18--- 19 20## Public Entry Points (Unrestricted) 21 22State-changing functions callable by anyone—prioritize for attack surface analysis. 23 24| Function | File | Notes | 25|----------|------|-------| 26| `functionName(params)` | `path/to/file.sol:L42` | Brief note if relevant | 27 28--- 29 30## Role-Restricted Entry Points 31 32### Admin / Owner 33| Function | File | Restriction | 34|----------|------|-------------| 35| `setFee(uint256)` | `Config.sol:L15` | `onlyOwner` | 36 37### Governance 38| Function | File | Restriction | 39|----------|------|-------------| 40 41### Guardian / Pauser 42| Function | File | Restriction | 43|----------|------|-------------| 44 45### Other Roles 46| Function | File | Restriction | Role | 47|----------|------|-------------|------| 48 49--- 50 51## Restricted (Review Required) 52 53Functions with access control patterns that need manual verification. 54 55| Function | File | Pattern | Why Review | 56|----------|------|---------|------------| 57| `execute(bytes)` | `Executor.sol:L88` | `require(trusted[msg.sender])` | Dynamic trust list | 58 59--- 60 61## Contract-Only (Internal Integration Points) 62 63Functions only callable by other contracts—useful for understanding trust boundaries. 64 65| Function | File | Expected Caller | 66|----------|------|-----------------| 67| `onFlashLoan(...)` | `Vault.sol:L200` | Flash loan provider | 68 69--- 70 71## Files Analyzed 72 73- `path/to/file1.sol` (X state-changing entry points) 74- `path/to/file2.sol` (X state-changing entry points)

Filtering

When user specifies a directory filter:

  • Only analyze files within that path
  • Note the filter in the report header
  • Example: "Analyze only src/core/" → scope = src/core/

Analysis Guidelines

  1. Be thorough: Don't skip files. Every state-changing externally callable function matters.
  2. Be conservative: When uncertain about access level, flag for review rather than miscategorize.
  3. Skip read-only: Exclude view, pure, and equivalent read-only functions.
  4. Note inheritance: If a function's access control comes from a parent contract, note this.
  5. Track modifiers: List all access-related modifiers/decorators applied to each function.
  6. Identify patterns: Look for common patterns like:
    • Initializer functions (often unrestricted on first call)
    • Upgrade functions (high-privilege)
    • Emergency/pause functions (guardian-level)
    • Fee/parameter setters (admin-level)
    • Token transfers and approvals (often public)

Common Role Patterns by Protocol Type

Protocol TypeCommon Roles
DEXowner, feeManager, pairCreator
Lendingadmin, guardian, liquidator, oracle
Governanceproposer, executor, canceller, timelock
NFTminter, admin, royaltyReceiver
Bridgerelayer, guardian, validator, operator
Vault/Yieldstrategist, keeper, harvester, manager

Rationalizations to Reject

When analyzing entry points, reject these shortcuts:

  • "This function looks standard" → Still classify it; standard functions can have non-standard access control
  • "The modifier name is clear" → Verify the modifier's actual implementation
  • "This is obviously admin-only" → Trace the actual restriction; "obvious" assumptions miss subtle bypasses
  • "I'll skip the callbacks" → Callbacks define trust boundaries; always include them
  • "It doesn't modify much state" → Any state change can be exploited; include all non-view functions

Error Handling

If a file cannot be parsed:

  1. Note it in the report under "Analysis Warnings"
  2. Continue with remaining files
  3. Suggest manual review for unparsable files

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is entry-point-analyzer?

Perfect for Smart Contract Agents needing advanced security audit capabilities and state-changing entry point analysis. entry-point-analyzer is a skill that analyzes smart contract codebases to identify state-changing entry points, facilitating security audits and access control pattern analysis.

How do I install entry-point-analyzer?

Run the command: npx killer-skills add 1203992808/ChatGPTCaricature/entry-point-analyzer. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for entry-point-analyzer?

Key use cases include: Automating smart contract security audits to map attack surfaces, Identifying external functions and audit flows in Solidity code, Analyzing access control patterns and role-restricted functions in Ethereum smart contracts.

Which IDEs are compatible with entry-point-analyzer?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for entry-point-analyzer?

Requires access to smart contract codebase. Limited to Ethereum-based smart contracts. Needs expertise in Solidity and smart contract security.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add 1203992808/ChatGPTCaricature/entry-point-analyzer. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use entry-point-analyzer immediately in the current project.

Related Skills

Looking for an alternative to entry-point-analyzer or another community skill for your workflow? Explore these related open-source skills.

View All

widget-generator

Logo of f
f

f.k.a. Awesome ChatGPT Prompts. Share, discover, and collect prompts from the community. Free and open source — self-host for your organization with complete privacy.

149.6k
0
AI

flags

Logo of vercel
vercel

flags is a Next.js feature management skill that enables developers to efficiently add or modify framework feature flags, streamlining React application development.

138.4k
0
Browser

zustand

Logo of lobehub
lobehub

The ultimate space for work and life — to find, build, and collaborate with agent teammates that grow with you. We are taking agent harness to the next level — enabling multi-agent collaboration, effortless agent team design, and introducing agents as the unit of work interaction.

72.8k
0
AI

data-fetching

Logo of lobehub
lobehub

The ultimate space for work and life — to find, build, and collaborate with agent teammates that grow with you. We are taking agent harness to the next level — enabling multi-agent collaboration, effortless agent team design, and introducing agents as the unit of work interaction.

72.8k
0
AI