OpenZeppelin audits EVMbench, finds data contamination

OpenZeppelin審計EVMbench發現資料污染

Blockchain security auditing firm OpenZeppelin has conducted an independent review of the AI-based smart contract security benchmark EVMbench, launched through a collaboration between OpenAI and Paradigm, and identified two major critical issues: data contamination during training and at least four vulnerabilities labeled as “high risk” that are actually invalid forgeries.

EVMbench Data Contamination: A Critical Flaw in AI Training Cutoff Dates

EVMbench was released in mid-February 2026, aiming to evaluate different AI models’ ability to identify, fix, and exploit smart contract vulnerabilities. During testing, the AI agents’ internet access was cut off to prevent them from searching for answers online. However, OpenZeppelin’s audit revealed a structural flaw: the benchmark is based on vulnerabilities from 120 audits conducted between 2024 and mid-2025, and most top AI models’ knowledge cutoff dates are also set in mid-2025.

This means AI agents likely encountered EVMbench’s vulnerability reports during pretraining, and their memory may already contain answers to all the questions. OpenZeppelin stated, “The most important ability for AI security is to discover new vulnerabilities in code that the model has never seen before.” The limited size of the dataset further amplifies the impact of contamination on overall evaluation.

Key Issues Found in the EVMbench Audit

  • Training Data Contamination: Pretraining of AI agents may have included EVMbench’s vulnerability reports, rendering “zero-knowledge discovery” tests meaningless.
  • Invalid High-Risk Vulnerability Classifications: At least four vulnerabilities marked as high risk are actually unexploitable.
  • Scoring System Flaws: EVMbench previously awarded points for AI discovering these fake vulnerabilities, indicating issues with the scoring basis.
  • Limited Dataset Size: Further magnifies the impact of contamination on overall results.
  • Current Leaderboard: Anthropic’s Claude 4.6 leads, followed by OpenAI’s OC-GPT-5.2 and Google’s Gemini 3 Pro.

Fake Vulnerability Crisis: At Least Four High-Risk Classifications Proven Invalid

Beyond data contamination, OpenZeppelin uncovered specific factual errors. They evaluated at least four vulnerabilities categorized as high risk by EVMbench and found that these vulnerabilities do not exist—more critically, the described exploit methods are fundamentally ineffective.

OpenZeppelin pointed out, “These are not subjective disagreements over severity; rather, the described exploit methods simply do not work.” If an AI agent “discovers” these fake vulnerabilities during testing, it indicates the scoring system rewards incorrect results.

OpenZeppelin emphasized that this audit does not negate AI’s potential in blockchain security: “The issue is not whether AI will change the security of smart contracts— it certainly will. The problem is whether the data and benchmarks we use to build and evaluate these tools are aligned with the standards of the contracts they aim to protect.”

Frequently Asked Questions

Q: What issues did OpenZeppelin find in their audit of EVMbench?
A: They identified two core problems: first, data contamination, as EVMbench’s test vulnerabilities come from audits conducted between 2024 and 2025, overlapping with AI models’ training cutoff dates, meaning models may have “seen” the answers during pretraining; second, at least four high-risk vulnerabilities are invalid forgeries, with exploit descriptions that are actually unexecutable.

Q: Why is data contamination so dangerous for AI security evaluation?
A: If AI models have already encountered the benchmark’s vulnerability reports during pretraining, they might answer questions based on memory rather than genuine vulnerability discovery ability. This invalidates the “zero-knowledge” test, making it impossible to accurately assess AI’s real security auditing capabilities against entirely new, unknown smart contracts.

Q: What is OpenZeppelin’s attitude toward AI’s future in blockchain security?
A: They believe AI will significantly impact smart contract security but emphasize that this influence must be based on trustworthy methodologies and accurate evaluation standards. They see the issues with EVMbench not as a rejection of AI’s potential but as an important warning to the industry standards.

View Original
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Lido: Potential Vulnerability in ZKsync wstETH Bridge Endpoint Contract

Lido officially disclosed that the ZKsync wstETH bridge contract has a potential vulnerability, but it has not been exploited, and holders are unaffected. Lido has paused new fund deposits to the contract and plans to fix and restore functionality after the next governance vote.

GateNews2h ago

sDOLA LlamaLend suffers flash loan price manipulation attack, losing approximately $240,000

ChainCatcher reports that sDOLA LlamaLend was subjected to a flash loan price manipulation attack, resulting in a loss of approximately $240,000. The attacker manipulated the sDOLA price, causing multiple accounts' health factors to drop below 0, triggering liquidation conditions and profiting from it.

GateNews3h ago

GoPlus: Beware of 26 malicious software packages released by North Korean hackers that can be remotely downloaded and execute Trojans

GoPlus Chinese Community issued a warning that North Korean hackers have published 26 malicious packages on the npm registry. These packages can execute hidden malicious code and steal user information. Users should verify the source of software packages and avoid using the listed malicious packages to prevent privacy leaks and asset loss.

GateNews5h ago

Former Los Angeles police officer convicted of kidnapping a teenager and stealing Bitcoin: $350,000 in digital assets stolen

Former Los Angeles Police Officer Eric Halem was convicted of kidnapping and robbing a teenage Bitcoin holder, valued at approximately $350,000. The case highlights the risks of cryptocurrency in crime, reminding investors to protect digital assets against theft and scams. Sentencing will take place on March 31.

GateNews6h ago

SANAE TOKEN Collapse! Sanae Tanaka Denies Supporting Political Coins, Issuer Faces Backlash in Japan

Japanese Prime Minister Sanae Takaichi strongly denies involvement in the issuance of the cryptocurrency called SANAE TOKEN, which is promoted in her name and has caused social panic. The latest reports indicate that the coin's price has plummeted by over 50%. The issuer claims that the coin promotes political participation but was not authorized by the government, leading to public condemnation and legal issues. Investors should stay vigilant to avoid financial scams.

CryptoCity8h ago
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)