mirror of https://github.com/ConsenSys/mythril
Refactor Ether Send Module (#696)
* Refactor ether_send -> ether_thief and update tests * Commit file change missed previously * Remove unused import and fix formatting * Fix expected output in Truffle testpull/699/head
parent
86e1544090
commit
2fdc2878e8
File diff suppressed because one or more lines are too long
@ -1 +1 @@ |
||||
{"error":null,"issues":[{"address":722,"contract":"Unknown","debug":"<DEBUG-DATA>","description":"It seems that an attacker is able to execute an call instruction, this can mean that the attacker is able to extract funds out of the contract.","function":"withdrawfunds()","swc-id":"105","title":"Ether send","type":"Warning"},{"address":883,"contract":"Unknown","debug":"<DEBUG-DATA>","description":"This binary add operation can result in integer overflow.\n","function":"invest()","swc-id":"101","title":"Integer Overflow","type":"Warning"}],"success":true} |
||||
{"error": null, "issues": [{"address": 722, "contract": "Unknown", "debug": "<DEBUG-DATA>", "description": "Users other than the contract creator can withdraw ETH from the contract account without previously having sent any ETH to it. This is likely to be vulnerability.", "function": "withdrawfunds()", "swc-id": "105", "title": "Ether thief", "type": "Warning"}, {"address": 883, "contract": "Unknown", "debug": "<DEBUG-DATA>", "description": "This binary add operation can result in integer overflow.\n", "function": "invest()", "swc-id": "101", "title": "Integer Overflow", "type": "Warning"}], "success": true} |
File diff suppressed because one or more lines are too long
@ -1 +1 @@ |
||||
{"error": null, "issues": [{"address": 142, "contract": "Unknown", "debug": "<DEBUG-DATA>", "description": "It seems that an attacker is able to execute an call instruction, this can mean that the attacker is able to extract funds out of the contract.", "function": "_function_0x8a4068dd", "swc-id": "105", "title": "Ether send", "type": "Warning"}], "success": true} |
||||
{"error": null, "issues": [{"address": 142, "contract": "Unknown", "debug": "<DEBUG-DATA>", "description": "Users other than the contract creator can withdraw ETH from the contract account without previously having sent any ETH to it. This is likely to be vulnerability.", "function": "_function_0x8a4068dd", "swc-id": "105", "title": "Ether thief", "type": "Warning"}], "success": true} |
@ -1,9 +1,9 @@ |
||||
==== Ether send ==== |
||||
==== Ether thief ==== |
||||
SWC ID: 105 |
||||
Type: Warning |
||||
Contract: Unknown |
||||
Function name: _function_0x8a4068dd |
||||
PC address: 142 |
||||
It seems that an attacker is able to execute an call instruction, this can mean that the attacker is able to extract funds out of the contract. |
||||
Users other than the contract creator can withdraw ETH from the contract account without previously having sent any ETH to it. This is likely to be vulnerability. |
||||
-------------------- |
||||
|
||||
|
Loading…
Reference in new issue