evm-analysis
Deep EVM bytecode analysis and decompilation capabilities for smart contract security, gas optimization, and reverse engineering. Provides tools for analyzing opcodes, storage layouts, proxy patterns, and bytecode verification.
Best use case
evm-analysis is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Deep EVM bytecode analysis and decompilation capabilities for smart contract security, gas optimization, and reverse engineering. Provides tools for analyzing opcodes, storage layouts, proxy patterns, and bytecode verification.
Teams using evm-analysis should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/evm-analysis/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How evm-analysis Compares
| Feature / Agent | evm-analysis | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Deep EVM bytecode analysis and decompilation capabilities for smart contract security, gas optimization, and reverse engineering. Provides tools for analyzing opcodes, storage layouts, proxy patterns, and bytecode verification.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
# EVM/Bytecode Analysis Skill
Expert-level EVM bytecode analysis and decompilation for smart contract security audits, gas optimization, and reverse engineering.
## Capabilities
- **Bytecode Analysis**: Analyze EVM bytecode and opcodes
- **Gas Cost Calculation**: Calculate gas costs per operation
- **Storage Layout Identification**: Identify storage slot layouts and packing
- **Decompilation**: Decompile bytecode to pseudo-Solidity
- **Proxy Analysis**: Analyze proxy implementation slots (EIP-1967)
- **Pattern Detection**: Detect bytecode patterns (CREATE2, selfdestruct)
- **Bytecode Verification**: Verify contract bytecode against source
## MCP Server Integration
This skill can leverage the following MCP servers:
| Server | Purpose | Install |
|--------|---------|---------|
| **EVM MCP Tools** | Smart contract auditing, security analysis | [0xGval/evm-mcp-tools](https://github.com/0xGval/evm-mcp-tools) |
| **Solidity Contract Analyzer** | Contract code analysis with metadata | [Skywork](https://skywork.ai/skypage/en/smart-contract-analysis-solidity) |
## Opcode Reference
Common EVM opcodes and gas costs:
| Category | Opcodes | Base Gas |
|----------|---------|----------|
| Arithmetic | ADD, SUB, MUL, DIV | 3-5 |
| Comparison | LT, GT, EQ, ISZERO | 3 |
| Bitwise | AND, OR, XOR, NOT, SHL, SHR | 3 |
| Memory | MLOAD, MSTORE | 3 + memory expansion |
| Storage | SLOAD | 100 (warm) / 2100 (cold) |
| Storage | SSTORE | 100-20000 (varies) |
| Control | JUMP, JUMPI | 8-10 |
| Call | CALL, DELEGATECALL, STATICCALL | 100 + memory + value |
## Storage Layout Analysis
### Standard Slot Patterns
```solidity
// Basic types (slot 0, 1, 2...)
uint256 public a; // slot 0
uint256 public b; // slot 1
// Packed storage
uint128 public c; // slot 2, bytes 0-15
uint128 public d; // slot 2, bytes 16-31
// Mappings: keccak256(key . slot)
mapping(address => uint256) public balances; // slot 3
// balances[addr] at keccak256(addr . 3)
// Dynamic arrays: length at slot, data at keccak256(slot)
uint256[] public arr; // length at slot 4, arr[i] at keccak256(4) + i
```
### EIP-1967 Proxy Slots
```
Implementation: 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
Admin: 0xb53127684a568b3173ae13b9f8a6016e243e63b6e8ee1178d6a717850b5d6103
Beacon: 0xa3f0ad74e5423aebfd80d3ef4346578335a9a72aeaee59ff6cb3582b35133d50
```
## Bytecode Patterns
### Contract Creation
```
PUSH1 0x80 // Free memory pointer
PUSH1 0x40
MSTORE
...
CODECOPY // Copy runtime code
RETURN // Return runtime code
```
### Selector Dispatch
```
PUSH4 <selector> // 4-byte function selector
EQ // Compare with calldata[0:4]
PUSH2 <offset> // Jump destination
JUMPI // Jump if match
```
### Common Vulnerability Patterns
```
// Reentrancy indicator: CALL before SSTORE
CALL
...
SSTORE
// Unchecked return: CALL without ISZERO check
CALL
// Missing: ISZERO, JUMPI for error handling
// Self-destruct (deprecated but detectable)
SELFDESTRUCT
```
## Workflow
### 1. Fetch Contract Bytecode
```bash
# Using cast (Foundry)
cast code <address> --rpc-url <rpc>
# Using curl
curl -X POST <rpc> \
-H "Content-Type: application/json" \
-d '{"jsonrpc":"2.0","method":"eth_getCode","params":["<address>","latest"],"id":1}'
```
### 2. Analyze Opcodes
```bash
# Disassemble with cast
cast disassemble <bytecode>
# Or use online tools
# - evm.codes/playground
# - ethervm.io/decompile
```
### 3. Storage Slot Analysis
```bash
# Read specific storage slot
cast storage <address> <slot> --rpc-url <rpc>
# Read EIP-1967 implementation slot
cast storage <address> 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc --rpc-url <rpc>
```
### 4. Bytecode Comparison
```bash
# Get deployed bytecode
cast code <address> --rpc-url <rpc> > deployed.bin
# Compile source and compare
forge build
diff deployed.bin out/Contract.sol/Contract.bin
```
## Process Integration
This skill integrates with the following processes:
- `gas-optimization.js` - Identify gas-heavy opcodes
- `smart-contract-security-audit.js` - Bytecode-level vulnerability detection
- `smart-contract-upgrade.js` - Proxy slot verification
- `formal-verification.js` - Bytecode correctness verification
## Tools Reference
| Tool | Purpose | URL |
|------|---------|-----|
| **Foundry Cast** | CLI bytecode interaction | [foundry-rs/foundry](https://github.com/foundry-rs/foundry) |
| **evm.codes** | Opcode reference | [evm.codes](https://www.evm.codes/) |
| **Dedaub** | Decompiler | [dedaub.com](https://app.dedaub.com/decompile) |
| **Heimdall** | Advanced decompiler | [heimdall-rs](https://github.com/Jon-Becker/heimdall-rs) |
| **panoramix** | Python decompiler | [eveem.org](https://eveem.org/) |
## Example Analysis
```javascript
// Analyze proxy contract
const analysis = {
type: 'proxy',
pattern: 'EIP-1967 Transparent',
implementation: '0x...',
admin: '0x...',
// Storage layout
storageSlots: {
0: { name: '_initialized', type: 'uint8' },
1: { name: '_initializing', type: 'bool' },
// ...
},
// Function selectors
selectors: {
'0xa9059cbb': 'transfer(address,uint256)',
'0x23b872dd': 'transferFrom(address,address,uint256)',
// ...
},
// Gas hotspots
gasHotspots: [
{ offset: 0x1a4, opcode: 'SSTORE', context: 'balance update' },
{ offset: 0x2f0, opcode: 'CALL', context: 'external call' }
]
};
```
## See Also
- `skills/gas-optimization/SKILL.md` - Gas optimization techniques
- `agents/solidity-auditor/AGENT.md` - Security audit agent
- `references.md` - External resourcesRelated Skills
heatmap-analysis
Analyze user interaction heatmaps for attention patterns and click behavior
static-analysis-runner
Run static analysis tools including SonarQube, ESLint, and multi-language linters
Static Analysis Tools Skill
Integration with security-focused static analysis tools
Smart Contract Analysis Skill
Ethereum and blockchain smart contract security analysis
Network Protocol Analysis Skill
Network protocol capture, analysis, and fuzzing capabilities
Code Coverage Analysis
Multi-language code coverage analysis, reporting, and quality gate enforcement
memlab-analysis
Expert skill for JavaScript memory leak detection using Facebook MemLab. Configure MemLab scenarios, execute memory leak detection runs, analyze heap snapshots, identify detached DOM elements, find event listener leaks, and integrate with CI pipelines.
gpu-memory-analysis
Specialized skill for GPU memory hierarchy analysis and optimization. Analyze memory access patterns, detect bank conflicts, optimize cache utilization, profile global memory bandwidth, and generate optimized memory access code patterns.
power-analysis
FPGA power estimation and optimization skill for low-power design
cdc-analysis
Specialized skill for clock domain crossing analysis and synchronizer design in FPGA designs
misra-c-analysis
MISRA C compliance checking and static analysis integration
memory-analysis
Embedded memory analysis, optimization, and leak detection