mirror of https://github.com/ConsenSys/mythril
blockchainethereumsmart-contractssoliditysecurityprogram-analysissecurity-analysissymbolic-execution
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
178 lines
6.4 KiB
178 lines
6.4 KiB
6 years ago
|
==== Ether send ====
|
||
|
Type: Warning
|
||
|
Contract: Unknown
|
||
|
Function name: _function_0x4229616d
|
||
|
PC address: 1599
|
||
|
In the function `_function_0x4229616d` a non-zero amount of Ether is sent to an address taken from storage slot 5.
|
||
|
There is a check on storage index 5. This storage slot can be written to by calling the function `_function_0x67f809e9`.
|
||
|
|
||
|
There is a check on storage index 5. This storage slot can be written to by calling the function `_function_0x67f809e9`.
|
||
|
There is a check on storage index 1. This storage slot can be written to by calling the function `fallback`.
|
||
|
--------------------
|
||
|
|
||
|
==== Ether send ====
|
||
|
Type: Warning
|
||
|
Contract: Unknown
|
||
|
Function name: _function_0xb4022950
|
||
|
PC address: 1940
|
||
|
In the function `_function_0xb4022950` a non-zero amount of Ether is sent to an address taken from storage slot 5.
|
||
|
There is a check on storage index 5. This storage slot can be written to by calling the function `_function_0x67f809e9`.
|
||
|
|
||
|
There is a check on storage index 5. This storage slot can be written to by calling the function `_function_0x67f809e9`.
|
||
|
There is a check on storage index 1. This storage slot can be written to by calling the function `fallback`.
|
||
|
There is a check on storage index 5. This storage slot can be written to by calling the function `_function_0x67f809e9`.
|
||
|
There is a check on storage index 1. This storage slot can be written to by calling the function `fallback`.
|
||
|
--------------------
|
||
|
|
||
|
==== Ether send ====
|
||
|
Type: Warning
|
||
|
Contract: Unknown
|
||
|
Function name: _function_0xb4022950
|
||
|
PC address: 2582
|
||
|
In the function `_function_0xb4022950` a non-zero amount of Ether is sent to an address taken from storage slot 5.
|
||
|
There is a check on storage index 5. This storage slot can be written to by calling the function `_function_0x67f809e9`.
|
||
|
|
||
|
There is a check on storage index 5. This storage slot can be written to by calling the function `_function_0x67f809e9`.
|
||
|
There is a check on storage index 1. This storage slot can be written to by calling the function `fallback`.
|
||
|
There is a check on storage index 5. This storage slot can be written to by calling the function `_function_0x67f809e9`.
|
||
|
There is a check on storage index 1. This storage slot can be written to by calling the function `fallback`.
|
||
|
There is a check on storage index 1. This storage slot can be written to by calling the function `fallback`.
|
||
|
--------------------
|
||
|
|
||
|
==== Exception state ====
|
||
|
Type: Informational
|
||
|
Contract: Unknown
|
||
|
Function name: _function_0x57d4021b
|
||
|
PC address: 1653
|
||
|
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that `assert()` should only be used to check invariants. Use `require()` for regular input checking.
|
||
|
--------------------
|
||
|
|
||
|
==== Exception state ====
|
||
|
Type: Informational
|
||
|
Contract: Unknown
|
||
|
Function name: _function_0x9dbc4f9b
|
||
|
PC address: 2085
|
||
|
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that `assert()` should only be used to check invariants. Use `require()` for regular input checking.
|
||
|
--------------------
|
||
|
|
||
|
==== Tautology ====
|
||
|
Type: Informational
|
||
|
Contract: Unknown
|
||
|
Function name: fallback
|
||
|
PC address: 3111
|
||
|
Found a conditional jump which always follows the same branch, value: True
|
||
|
--------------------
|
||
|
|
||
|
==== Tautology ====
|
||
|
Type: Informational
|
||
|
Contract: Unknown
|
||
|
Function name: fallback
|
||
|
PC address: 3140
|
||
|
Found a conditional jump which always follows the same branch, value: True
|
||
|
--------------------
|
||
|
|
||
|
==== Tautology ====
|
||
|
Type: Informational
|
||
|
Contract: Unknown
|
||
|
Function name: fallback
|
||
|
PC address: 2950
|
||
|
Found a conditional jump which always follows the same branch, value: True
|
||
|
--------------------
|
||
|
|
||
|
==== Tautology ====
|
||
|
Type: Informational
|
||
|
Contract: Unknown
|
||
|
Function name: fallback
|
||
|
PC address: 1268
|
||
|
Found a conditional jump which always follows the same branch, value: True
|
||
|
--------------------
|
||
|
|
||
|
==== Tautology ====
|
||
|
Type: Informational
|
||
|
Contract: Unknown
|
||
|
Function name: _function_0x09dfdc71
|
||
|
PC address: 310
|
||
|
Found a conditional jump which always follows the same branch, value: False
|
||
|
--------------------
|
||
|
|
||
|
==== Tautology ====
|
||
|
Type: Informational
|
||
|
Contract: Unknown
|
||
|
Function name: _function_0x09dfdc71
|
||
|
PC address: 1316
|
||
|
Found a conditional jump which always follows the same branch, value: True
|
||
|
--------------------
|
||
|
|
||
|
==== Tautology ====
|
||
|
Type: Informational
|
||
|
Contract: Unknown
|
||
|
Function name: _function_0x253459e3
|
||
|
PC address: 1375
|
||
|
Found a conditional jump which always follows the same branch, value: True
|
||
|
--------------------
|
||
|
|
||
|
==== Tautology ====
|
||
|
Type: Informational
|
||
|
Contract: Unknown
|
||
|
Function name: _function_0x4229616d
|
||
|
PC address: 1511
|
||
|
Found a conditional jump which always follows the same branch, value: True
|
||
|
--------------------
|
||
|
|
||
|
==== Tautology ====
|
||
|
Type: Informational
|
||
|
Contract: Unknown
|
||
|
Function name: _function_0x57d4021b
|
||
|
PC address: 1679
|
||
|
Found a conditional jump which always follows the same branch, value: True
|
||
|
--------------------
|
||
|
|
||
|
==== Tautology ====
|
||
|
Type: Informational
|
||
|
Contract: Unknown
|
||
|
Function name: _function_0x6fbaaa1e
|
||
|
PC address: 618
|
||
|
Found a conditional jump which always follows the same branch, value: False
|
||
|
--------------------
|
||
|
|
||
|
==== Tautology ====
|
||
|
Type: Informational
|
||
|
Contract: Unknown
|
||
|
Function name: _function_0x8a5fb3ca
|
||
|
PC address: 805
|
||
|
Found a conditional jump which always follows the same branch, value: False
|
||
|
--------------------
|
||
|
|
||
|
==== Tautology ====
|
||
|
Type: Informational
|
||
|
Contract: Unknown
|
||
|
Function name: _function_0x9dbc4f9b
|
||
|
PC address: 2187
|
||
|
Found a conditional jump which always follows the same branch, value: True
|
||
|
--------------------
|
||
|
|
||
|
==== Unchecked CALL return value ====
|
||
|
Type: Informational
|
||
|
Contract: Unknown
|
||
|
Function name: _function_0x4229616d
|
||
|
PC address: 1599
|
||
|
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
|
||
|
--------------------
|
||
|
|
||
|
==== Unchecked CALL return value ====
|
||
|
Type: Informational
|
||
|
Contract: Unknown
|
||
|
Function name: _function_0xb4022950
|
||
|
PC address: 1940
|
||
|
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
|
||
|
--------------------
|
||
|
|
||
|
==== Unchecked CALL return value ====
|
||
|
Type: Informational
|
||
|
Contract: Unknown
|
||
|
Function name: _function_0xb4022950
|
||
|
PC address: 2582
|
||
|
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
|
||
|
--------------------
|
||
|
|