mirror of https://github.com/ConsenSys/mythril
blockchainethereumsmart-contractssoliditysecurityprogram-analysissecurity-analysissymbolic-execution
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
93 lines
2.3 KiB
93 lines
2.3 KiB
7 years ago
|
|
||
|
|
||
7 years ago
|
## Dependence on predictable environment variable
|
||
7 years ago
|
|
||
7 years ago
|
- Type: Warning
|
||
7 years ago
|
- Contract: Unknown
|
||
7 years ago
|
- Function name: `_function_0xe9874106`
|
||
|
- PC address: 1285
|
||
|
|
||
7 years ago
|
|
||
|
|
||
7 years ago
|
### Description
|
||
7 years ago
|
|
||
|
In the function `'_function_0xe9874106'` the following predictable state variables are used to determine Ether recipient:
|
||
7 years ago
|
- block.coinbase
|
||
|
|
||
|
|
||
|
|
||
|
## Ether send
|
||
7 years ago
|
|
||
7 years ago
|
- Type: Warning
|
||
7 years ago
|
- Contract: Unknown
|
||
7 years ago
|
- Function name: `_function_0xe9874106`
|
||
|
- PC address: 1285
|
||
|
|
||
7 years ago
|
|
||
|
|
||
7 years ago
|
### Description
|
||
7 years ago
|
|
||
|
In the function `'_function_0xe9874106'` a non-zero amount of Ether is sent to an address taken from storage slot 0.
|
||
7 years ago
|
There is a check on storage index 0. This storage slot can be written to by calling the function 'fallback'.
|
||
7 years ago
|
|
||
7 years ago
|
There is a check on storage index 1. This storage slot can be written to by calling the function 'fallback'.
|
||
|
There is a check on storage index 1. This storage slot can be written to by calling the function 'fallback'.
|
||
7 years ago
|
|
||
|
|
||
|
## Exception state
|
||
7 years ago
|
|
||
7 years ago
|
- Type: Informational
|
||
7 years ago
|
- Contract: Unknown
|
||
7 years ago
|
- Function name: `fallback`
|
||
|
- PC address: 356
|
||
|
|
||
7 years ago
|
|
||
|
|
||
7 years ago
|
### Description
|
||
7 years ago
|
|
||
7 years ago
|
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that assert() should only be used to check invariants. Use require() for regular input checking.
|
||
|
|
||
|
|
||
|
## Exception state
|
||
7 years ago
|
|
||
7 years ago
|
- Type: Informational
|
||
7 years ago
|
- Contract: Unknown
|
||
7 years ago
|
- Function name: `_function_0xe9874106`
|
||
|
- PC address: 146
|
||
|
|
||
7 years ago
|
|
||
|
|
||
7 years ago
|
### Description
|
||
7 years ago
|
|
||
7 years ago
|
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that assert() should only be used to check invariants. Use require() for regular input checking.
|
||
|
|
||
|
|
||
7 years ago
|
## Integer Overflow
|
||
7 years ago
|
|
||
7 years ago
|
- Type: Warning
|
||
7 years ago
|
- Contract: Unknown
|
||
7 years ago
|
- Function name: `_function_0xe9874106`
|
||
|
- PC address: 1216
|
||
|
|
||
7 years ago
|
|
||
|
|
||
7 years ago
|
### Description
|
||
7 years ago
|
|
||
|
A possible integer overflow exists in the function `_function_0xe9874106`.
|
||
7 years ago
|
The addition may result in a value higher than the maximum representable integer.
|
||
7 years ago
|
|
||
|
|
||
|
## Integer Overflow
|
||
7 years ago
|
|
||
7 years ago
|
- Type: Warning
|
||
7 years ago
|
- Contract: Unknown
|
||
7 years ago
|
- Function name: `_function_0xe9874106`
|
||
|
- PC address: 262
|
||
|
|
||
|
|
||
|
|
||
7 years ago
|
### Description
|
||
|
|
||
|
A possible integer overflow exists in the function `_function_0xe9874106`.
|
||
|
The addition may result in a value higher than the maximum representable integer.
|