Update expected test outputs (markdown)

pull/127/head
Bernhard Mueller 7 years ago
parent 509ba09936
commit 350dae5644
  1. 55
      tests/testdata/outputs_expected/calls.sol.markdown
  2. 15
      tests/testdata/outputs_expected/ether_send.sol.markdown
  3. 25
      tests/testdata/outputs_expected/exceptions.sol.markdown
  4. 13
      tests/testdata/outputs_expected/kinds_of_calls.sol.markdown
  5. 7
      tests/testdata/outputs_expected/metacoin.sol.markdown
  6. 7
      tests/testdata/outputs_expected/multi_contracts.sol.markdown
  7. 7
      tests/testdata/outputs_expected/origin.sol.markdown
  8. 19
      tests/testdata/outputs_expected/overflow.sol.markdown
  9. 19
      tests/testdata/outputs_expected/returnvalue.sol.markdown
  10. 55
      tests/testdata/outputs_expected/rubixi.sol.markdown
  11. 9
      tests/testdata/outputs_expected/suicide.sol.markdown
  12. 19
      tests/testdata/outputs_expected/underflow.sol.markdown
  13. 37
      tests/testdata/outputs_expected/weak_random.sol.markdown

@ -1,11 +1,16 @@
# Analysis Results
## Message call to external contract ## Message call to external contract
- Type: Informational - Type: Informational
- Contract: Caller - Contract: Caller
- Function name: `_function_0x5a6814ec` - Function name: `_function_0x5a6814ec`
- PC address: 661 - PC address: 661
### Description ### Description
This contract executes a message call to to another contract. Make sure that the called contract is trusted and does not execute user-supplied code. This contract executes a message call to to another contract. Make sure that the called contract is trusted and does not execute user-supplied code.
In *<TESTDATA>/inputs/calls.sol:16* In *<TESTDATA>/inputs/calls.sol:16*
@ -13,13 +18,19 @@ In *<TESTDATA>/inputs/calls.sol:16*
``` ```
fixed_address.call() fixed_address.call()
``` ```
## Message call to external contract ## Message call to external contract
- Type: Warning - Type: Warning
- Contract: Caller - Contract: Caller
- Function name: `_function_0xd24b08cc` - Function name: `_function_0xd24b08cc`
- PC address: 779 - PC address: 779
### Description ### Description
This contract executes a message call to an address found at storage slot 1. This storage slot can be written to by calling the function '_function_0x2776b163'. Generally, it is not recommended to call user-supplied adresses using Solidity's call() construct. Note that attackers might leverage reentrancy attacks to exploit race conditions or manipulate this contract's state. This contract executes a message call to an address found at storage slot 1. This storage slot can be written to by calling the function '_function_0x2776b163'. Generally, it is not recommended to call user-supplied adresses using Solidity's call() construct. Note that attackers might leverage reentrancy attacks to exploit race conditions or manipulate this contract's state.
In *<TESTDATA>/inputs/calls.sol:29* In *<TESTDATA>/inputs/calls.sol:29*
@ -27,13 +38,19 @@ In *<TESTDATA>/inputs/calls.sol:29*
``` ```
stored_address.call() stored_address.call()
``` ```
## Message call to external contract ## Message call to external contract
- Type: Informational - Type: Informational
- Contract: Caller - Contract: Caller
- Function name: `_function_0xe11f493e` - Function name: `_function_0xe11f493e`
- PC address: 858 - PC address: 858
### Description ### Description
This contract executes a message call to to another contract. Make sure that the called contract is trusted and does not execute user-supplied code. This contract executes a message call to to another contract. Make sure that the called contract is trusted and does not execute user-supplied code.
In *<TESTDATA>/inputs/calls.sol:20* In *<TESTDATA>/inputs/calls.sol:20*
@ -41,13 +58,19 @@ In *<TESTDATA>/inputs/calls.sol:20*
``` ```
fixed_address.call() fixed_address.call()
``` ```
## State change after external call ## State change after external call
- Type: Warning - Type: Warning
- Contract: Caller - Contract: Caller
- Function name: `_function_0xe11f493e` - Function name: `_function_0xe11f493e`
- PC address: 869 - PC address: 869
### Description ### Description
The contract account state is changed after an external call. Consider that the called contract could re-enter the function before this state change takes place. This can lead to business logic vulnerabilities. The contract account state is changed after an external call. Consider that the called contract could re-enter the function before this state change takes place. This can lead to business logic vulnerabilities.
In *<TESTDATA>/inputs/calls.sol:21* In *<TESTDATA>/inputs/calls.sol:21*
@ -55,13 +78,19 @@ In *<TESTDATA>/inputs/calls.sol:21*
``` ```
statevar = 0 statevar = 0
``` ```
## Message call to external contract ## Message call to external contract
- Type: Warning - Type: Warning
- Contract: Caller - Contract: Caller
- Function name: `_function_0xe1d10f79` - Function name: `_function_0xe1d10f79`
- PC address: 912 - PC address: 912
### Description ### Description
This contract executes a message call to an address provided as a function argument. Generally, it is not recommended to call user-supplied adresses using Solidity's call() construct. Note that attackers might leverage reentrancy attacks to exploit race conditions or manipulate this contract's state. This contract executes a message call to an address provided as a function argument. Generally, it is not recommended to call user-supplied adresses using Solidity's call() construct. Note that attackers might leverage reentrancy attacks to exploit race conditions or manipulate this contract's state.
In *<TESTDATA>/inputs/calls.sol:25* In *<TESTDATA>/inputs/calls.sol:25*
@ -69,13 +98,19 @@ In *<TESTDATA>/inputs/calls.sol:25*
``` ```
addr.call() addr.call()
``` ```
## Unchecked CALL return value ## Unchecked CALL return value
- Type: Informational - Type: Informational
- Contract: Caller - Contract: Caller
- Function name: `_function_0x5a6814ec` - Function name: `_function_0x5a6814ec`
- PC address: 661 - PC address: 661
### Description ### Description
The return value of an external call is not checked. Note that execution continue even if the called contract throws. The return value of an external call is not checked. Note that execution continue even if the called contract throws.
In *<TESTDATA>/inputs/calls.sol:16* In *<TESTDATA>/inputs/calls.sol:16*
@ -83,13 +118,19 @@ In *<TESTDATA>/inputs/calls.sol:16*
``` ```
fixed_address.call() fixed_address.call()
``` ```
## Unchecked CALL return value ## Unchecked CALL return value
- Type: Informational - Type: Informational
- Contract: Caller - Contract: Caller
- Function name: `_function_0xd24b08cc` - Function name: `_function_0xd24b08cc`
- PC address: 779 - PC address: 779
### Description ### Description
The return value of an external call is not checked. Note that execution continue even if the called contract throws. The return value of an external call is not checked. Note that execution continue even if the called contract throws.
In *<TESTDATA>/inputs/calls.sol:29* In *<TESTDATA>/inputs/calls.sol:29*
@ -97,13 +138,19 @@ In *<TESTDATA>/inputs/calls.sol:29*
``` ```
stored_address.call() stored_address.call()
``` ```
## Unchecked CALL return value ## Unchecked CALL return value
- Type: Informational - Type: Informational
- Contract: Caller - Contract: Caller
- Function name: `_function_0xe11f493e` - Function name: `_function_0xe11f493e`
- PC address: 858 - PC address: 858
### Description ### Description
The return value of an external call is not checked. Note that execution continue even if the called contract throws. The return value of an external call is not checked. Note that execution continue even if the called contract throws.
In *<TESTDATA>/inputs/calls.sol:20* In *<TESTDATA>/inputs/calls.sol:20*
@ -111,13 +158,19 @@ In *<TESTDATA>/inputs/calls.sol:20*
``` ```
fixed_address.call() fixed_address.call()
``` ```
## Unchecked CALL return value ## Unchecked CALL return value
- Type: Informational - Type: Informational
- Contract: Caller - Contract: Caller
- Function name: `_function_0xe1d10f79` - Function name: `_function_0xe1d10f79`
- PC address: 912 - PC address: 912
### Description ### Description
The return value of an external call is not checked. Note that execution continue even if the called contract throws. The return value of an external call is not checked. Note that execution continue even if the called contract throws.
In *<TESTDATA>/inputs/calls.sol:25* In *<TESTDATA>/inputs/calls.sol:25*

@ -1,12 +1,17 @@
# Analysis Results
## Ether send ## Ether send
- Type: Warning - Type: Warning
- Contract: Crowdfunding - Contract: Crowdfunding
- Function name: `withdrawfunds()` - Function name: `withdrawfunds()`
- PC address: 816 - PC address: 816
### Description ### Description
In the function 'withdrawfunds()' a non-zero amount of Ether is sent to msg.sender.
In the function `'withdrawfunds()'` a non-zero amount of Ether is sent to msg.sender.
There is a check on storage index 1. This storage slot can be written to by calling the function 'crowdfunding()'. There is a check on storage index 1. This storage slot can be written to by calling the function 'crowdfunding()'.
@ -15,13 +20,19 @@ In *<TESTDATA>/inputs/ether_send.sol:18*
``` ```
msg.sender.transfer(this.balance) msg.sender.transfer(this.balance)
``` ```
## Integer Overflow ## Integer Overflow
- Type: Warning - Type: Warning
- Contract: Crowdfunding - Contract: Crowdfunding
- Function name: `invest()` - Function name: `invest()`
- PC address: 483 - PC address: 483
### Description ### Description
A possible integer overflow exists in the function `invest()`. A possible integer overflow exists in the function `invest()`.
The addition may result in a value higher than the maximum representable integer. The addition may result in a value higher than the maximum representable integer.

@ -1,11 +1,16 @@
# Analysis Results
## Exception state ## Exception state
- Type: Informational - Type: Informational
- Contract: Exceptions - Contract: Exceptions
- Function name: `_function_0x546455b5` - Function name: `_function_0x546455b5`
- PC address: 446 - PC address: 446
### Description ### Description
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that assert() should only be used to check invariants. Use require() for regular input checking. A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that assert() should only be used to check invariants. Use require() for regular input checking.
In *<TESTDATA>/inputs/exceptions.sol:16* In *<TESTDATA>/inputs/exceptions.sol:16*
@ -13,13 +18,19 @@ In *<TESTDATA>/inputs/exceptions.sol:16*
``` ```
assert(input != 23) assert(input != 23)
``` ```
## Exception state ## Exception state
- Type: Informational - Type: Informational
- Contract: Exceptions - Contract: Exceptions
- Function name: `_function_0x92dd38ea` - Function name: `_function_0x92dd38ea`
- PC address: 484 - PC address: 484
### Description ### Description
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that assert() should only be used to check invariants. Use require() for regular input checking. A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that assert() should only be used to check invariants. Use require() for regular input checking.
In *<TESTDATA>/inputs/exceptions.sol:34* In *<TESTDATA>/inputs/exceptions.sol:34*
@ -27,13 +38,19 @@ In *<TESTDATA>/inputs/exceptions.sol:34*
``` ```
myarray[index] myarray[index]
``` ```
## Exception state ## Exception state
- Type: Informational - Type: Informational
- Contract: Exceptions - Contract: Exceptions
- Function name: `_function_0xa08299f1` - Function name: `_function_0xa08299f1`
- PC address: 506 - PC address: 506
### Description ### Description
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that assert() should only be used to check invariants. Use require() for regular input checking. A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that assert() should only be used to check invariants. Use require() for regular input checking.
In *<TESTDATA>/inputs/exceptions.sol:24* In *<TESTDATA>/inputs/exceptions.sol:24*
@ -41,13 +58,19 @@ In *<TESTDATA>/inputs/exceptions.sol:24*
``` ```
1/input 1/input
``` ```
## Exception state ## Exception state
- Type: Informational - Type: Informational
- Contract: Exceptions - Contract: Exceptions
- Function name: `_function_0xb34c3610` - Function name: `_function_0xb34c3610`
- PC address: 531 - PC address: 531
### Description ### Description
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that assert() should only be used to check invariants. Use require() for regular input checking. A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that assert() should only be used to check invariants. Use require() for regular input checking.
In *<TESTDATA>/inputs/exceptions.sol:7* In *<TESTDATA>/inputs/exceptions.sol:7*

@ -1,11 +1,16 @@
# Analysis Results
## Message call to external contract ## Message call to external contract
- Type: Warning - Type: Warning
- Contract: D - Contract: D
- Function name: `_function_0xeea4c864` - Function name: `_function_0xeea4c864`
- PC address: 1038 - PC address: 1038
### Description ### Description
This contract executes a message call to an address provided as a function argument. Generally, it is not recommended to call user-supplied adresses using Solidity's call() construct. Note that attackers might leverage reentrancy attacks to exploit race conditions or manipulate this contract's state. This contract executes a message call to an address provided as a function argument. Generally, it is not recommended to call user-supplied adresses using Solidity's call() construct. Note that attackers might leverage reentrancy attacks to exploit race conditions or manipulate this contract's state.
In *<TESTDATA>/inputs/kinds_of_calls.sol:6* In *<TESTDATA>/inputs/kinds_of_calls.sol:6*
@ -13,13 +18,19 @@ In *<TESTDATA>/inputs/kinds_of_calls.sol:6*
``` ```
_e.call(bytes4(sha3("setN(uint256)")), _n) _e.call(bytes4(sha3("setN(uint256)")), _n)
``` ```
## Unchecked CALL return value ## Unchecked CALL return value
- Type: Informational - Type: Informational
- Contract: D - Contract: D
- Function name: `_function_0xeea4c864` - Function name: `_function_0xeea4c864`
- PC address: 1038 - PC address: 1038
### Description ### Description
The return value of an external call is not checked. Note that execution continue even if the called contract throws. The return value of an external call is not checked. Note that execution continue even if the called contract throws.
In *<TESTDATA>/inputs/kinds_of_calls.sol:6* In *<TESTDATA>/inputs/kinds_of_calls.sol:6*

@ -1,11 +1,16 @@
# Analysis Results
## Integer Overflow ## Integer Overflow
- Type: Warning - Type: Warning
- Contract: metaCoin - Contract: metaCoin
- Function name: `sendToken(address,uint256)` - Function name: `sendToken(address,uint256)`
- PC address: 498 - PC address: 498
### Description ### Description
A possible integer overflow exists in the function `sendToken(address,uint256)`. A possible integer overflow exists in the function `sendToken(address,uint256)`.
The addition may result in a value higher than the maximum representable integer. The addition may result in a value higher than the maximum representable integer.

@ -1,11 +1,16 @@
# Analysis Results
## Ether send ## Ether send
- Type: Warning - Type: Warning
- Contract: Transfer2 - Contract: Transfer2
- Function name: `_function_0x8a4068dd` - Function name: `_function_0x8a4068dd`
- PC address: 142 - PC address: 142
### Description ### Description
In the function `'_function_0x8a4068dd'` a non-zero amount of Ether is sent to msg.sender. In the function `'_function_0x8a4068dd'` a non-zero amount of Ether is sent to msg.sender.
It seems that this function can be called without restrictions. It seems that this function can be called without restrictions.

@ -1,11 +1,16 @@
# Analysis Results
## Use of tx.origin ## Use of tx.origin
- Type: Warning - Type: Warning
- Contract: Origin - Contract: Origin
- Function name: `transferOwnership(address)` - Function name: `transferOwnership(address)`
- PC address: 317 - PC address: 317
### Description ### Description
Function transferOwnership(address) retrieves the transaction origin (tx.origin) using the ORIGIN opcode. Use tx.sender instead. Function transferOwnership(address) retrieves the transaction origin (tx.origin) using the ORIGIN opcode. Use tx.sender instead.
See also: https://solidity.readthedocs.io/en/develop/security-considerations.html#tx-origin See also: https://solidity.readthedocs.io/en/develop/security-considerations.html#tx-origin

@ -1,11 +1,16 @@
# Analysis Results
## Integer Underflow ## Integer Underflow
- Type: Warning - Type: Warning
- Contract: Over - Contract: Over
- Function name: `sendeth(address,uint256)` - Function name: `sendeth(address,uint256)`
- PC address: 649 - PC address: 649
### Description ### Description
A possible integer underflow exists in the function `sendeth(address,uint256)`. A possible integer underflow exists in the function `sendeth(address,uint256)`.
The subtraction may result in a value < 0. The subtraction may result in a value < 0.
@ -14,13 +19,19 @@ In *<TESTDATA>/inputs/overflow.sol:12*
``` ```
balances[msg.sender] -= _value balances[msg.sender] -= _value
``` ```
## Integer Overflow ## Integer Overflow
- Type: Warning - Type: Warning
- Contract: Over - Contract: Over
- Function name: `sendeth(address,uint256)` - Function name: `sendeth(address,uint256)`
- PC address: 725 - PC address: 725
### Description ### Description
A possible integer overflow exists in the function `sendeth(address,uint256)`. A possible integer overflow exists in the function `sendeth(address,uint256)`.
The addition may result in a value higher than the maximum representable integer. The addition may result in a value higher than the maximum representable integer.
@ -29,13 +40,19 @@ In *<TESTDATA>/inputs/overflow.sol:13*
``` ```
balances[_to] += _value balances[_to] += _value
``` ```
## Integer Underflow ## Integer Underflow
- Type: Warning - Type: Warning
- Contract: Over - Contract: Over
- Function name: `sendeth(address,uint256)` - Function name: `sendeth(address,uint256)`
- PC address: 567 - PC address: 567
### Description ### Description
A possible integer underflow exists in the function `sendeth(address,uint256)`. A possible integer underflow exists in the function `sendeth(address,uint256)`.
The subtraction may result in a value < 0. The subtraction may result in a value < 0.

@ -1,11 +1,16 @@
# Analysis Results
## Message call to external contract ## Message call to external contract
- Type: Informational - Type: Informational
- Contract: ReturnValue - Contract: ReturnValue
- Function name: `_function_0x633ab5e0` - Function name: `_function_0x633ab5e0`
- PC address: 196 - PC address: 196
### Description ### Description
This contract executes a message call to to another contract. Make sure that the called contract is trusted and does not execute user-supplied code. This contract executes a message call to to another contract. Make sure that the called contract is trusted and does not execute user-supplied code.
In *<TESTDATA>/inputs/returnvalue.sol:10* In *<TESTDATA>/inputs/returnvalue.sol:10*
@ -13,13 +18,19 @@ In *<TESTDATA>/inputs/returnvalue.sol:10*
``` ```
callee.call() callee.call()
``` ```
## Message call to external contract ## Message call to external contract
- Type: Informational - Type: Informational
- Contract: ReturnValue - Contract: ReturnValue
- Function name: `_function_0xe3bea282` - Function name: `_function_0xe3bea282`
- PC address: 285 - PC address: 285
### Description ### Description
This contract executes a message call to to another contract. Make sure that the called contract is trusted and does not execute user-supplied code. This contract executes a message call to to another contract. Make sure that the called contract is trusted and does not execute user-supplied code.
In *<TESTDATA>/inputs/returnvalue.sol:6* In *<TESTDATA>/inputs/returnvalue.sol:6*
@ -27,13 +38,19 @@ In *<TESTDATA>/inputs/returnvalue.sol:6*
``` ```
callee.call() callee.call()
``` ```
## Unchecked CALL return value ## Unchecked CALL return value
- Type: Informational - Type: Informational
- Contract: ReturnValue - Contract: ReturnValue
- Function name: `_function_0xe3bea282` - Function name: `_function_0xe3bea282`
- PC address: 285 - PC address: 285
### Description ### Description
The return value of an external call is not checked. Note that execution continue even if the called contract throws. The return value of an external call is not checked. Note that execution continue even if the called contract throws.
In *<TESTDATA>/inputs/returnvalue.sol:6* In *<TESTDATA>/inputs/returnvalue.sol:6*

@ -1,11 +1,16 @@
# Analysis Results
## Ether send ## Ether send
- Type: Warning - Type: Warning
- Contract: Rubixi - Contract: Rubixi
- Function name: `_function_0x4229616d` - Function name: `_function_0x4229616d`
- PC address: 1599 - PC address: 1599
### Description ### Description
In the function `'_function_0x4229616d'` a non-zero amount of Ether is sent to an address taken from storage slot 5. In the function `'_function_0x4229616d'` a non-zero amount of Ether is sent to an address taken from storage slot 5.
There is a check on storage index 5. This storage slot can be written to by calling the function '_function_0x67f809e9'. There is a check on storage index 5. This storage slot can be written to by calling the function '_function_0x67f809e9'.
@ -17,13 +22,19 @@ In *<TESTDATA>/inputs/rubixi.sol:93*
``` ```
creator.send(feesToCollect) creator.send(feesToCollect)
``` ```
## Ether send ## Ether send
- Type: Warning - Type: Warning
- Contract: Rubixi - Contract: Rubixi
- Function name: `_function_0x686f2c90` - Function name: `_function_0x686f2c90`
- PC address: 1940 - PC address: 1940
### Description ### Description
In the function `'_function_0x686f2c90'` a non-zero amount of Ether is sent to an address taken from storage slot 5. In the function `'_function_0x686f2c90'` a non-zero amount of Ether is sent to an address taken from storage slot 5.
There is a check on storage index 5. This storage slot can be written to by calling the function '_function_0x67f809e9'. There is a check on storage index 5. This storage slot can be written to by calling the function '_function_0x67f809e9'.
@ -35,13 +46,19 @@ In *<TESTDATA>/inputs/rubixi.sol:75*
``` ```
creator.send(collectedFees) creator.send(collectedFees)
``` ```
## Exception state ## Exception state
- Type: Informational - Type: Informational
- Contract: Rubixi - Contract: Rubixi
- Function name: `_function_0x57d4021b` - Function name: `_function_0x57d4021b`
- PC address: 1653 - PC address: 1653
### Description ### Description
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that assert() should only be used to check invariants. Use require() for regular input checking. A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that assert() should only be used to check invariants. Use require() for regular input checking.
In *<TESTDATA>/inputs/rubixi.sol:131* In *<TESTDATA>/inputs/rubixi.sol:131*
@ -49,13 +66,19 @@ In *<TESTDATA>/inputs/rubixi.sol:131*
``` ```
participants[payoutOrder] participants[payoutOrder]
``` ```
## Exception state ## Exception state
- Type: Informational - Type: Informational
- Contract: Rubixi - Contract: Rubixi
- Function name: `_function_0x9dbc4f9b` - Function name: `_function_0x9dbc4f9b`
- PC address: 2085 - PC address: 2085
### Description ### Description
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that assert() should only be used to check invariants. Use require() for regular input checking. A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that assert() should only be used to check invariants. Use require() for regular input checking.
In *<TESTDATA>/inputs/rubixi.sol:148* In *<TESTDATA>/inputs/rubixi.sol:148*
@ -63,13 +86,19 @@ In *<TESTDATA>/inputs/rubixi.sol:148*
``` ```
participants[orderInPyramid] participants[orderInPyramid]
``` ```
## Integer Overflow ## Integer Overflow
- Type: Warning - Type: Warning
- Contract: Rubixi - Contract: Rubixi
- Function name: `_function_0xfae14192` - Function name: `_function_0xfae14192`
- PC address: 1223 - PC address: 1223
### Description ### Description
A possible integer overflow exists in the function `_function_0xfae14192`. A possible integer overflow exists in the function `_function_0xfae14192`.
The addition may result in a value higher than the maximum representable integer. The addition may result in a value higher than the maximum representable integer.
@ -78,13 +107,19 @@ In *<TESTDATA>/inputs/rubixi.sol:37*
``` ```
collectedFees += msg.value collectedFees += msg.value
``` ```
## Integer Underflow ## Integer Underflow
- Type: Warning - Type: Warning
- Contract: Rubixi - Contract: Rubixi
- Function name: `_function_0xd11f13df` - Function name: `_function_0xd11f13df`
- PC address: 2743 - PC address: 2743
### Description ### Description
A possible integer underflow exists in the function `_function_0xd11f13df`. A possible integer underflow exists in the function `_function_0xd11f13df`.
The subtraction may result in a value < 0. The subtraction may result in a value < 0.
@ -93,13 +128,19 @@ In *<TESTDATA>/inputs/rubixi.sol:143*
``` ```
participants.length - payoutOrder participants.length - payoutOrder
``` ```
## Unchecked CALL return value ## Unchecked CALL return value
- Type: Informational - Type: Informational
- Contract: Rubixi - Contract: Rubixi
- Function name: `_function_0x4229616d` - Function name: `_function_0x4229616d`
- PC address: 1599 - PC address: 1599
### Description ### Description
The return value of an external call is not checked. Note that execution continue even if the called contract throws. The return value of an external call is not checked. Note that execution continue even if the called contract throws.
In *<TESTDATA>/inputs/rubixi.sol:93* In *<TESTDATA>/inputs/rubixi.sol:93*
@ -107,13 +148,19 @@ In *<TESTDATA>/inputs/rubixi.sol:93*
``` ```
creator.send(feesToCollect) creator.send(feesToCollect)
``` ```
## Unchecked CALL return value ## Unchecked CALL return value
- Type: Informational - Type: Informational
- Contract: Rubixi - Contract: Rubixi
- Function name: `_function_0xb4022950` - Function name: `_function_0xb4022950`
- PC address: 1940 - PC address: 1940
### Description ### Description
The return value of an external call is not checked. Note that execution continue even if the called contract throws. The return value of an external call is not checked. Note that execution continue even if the called contract throws.
In *<TESTDATA>/inputs/rubixi.sol:75* In *<TESTDATA>/inputs/rubixi.sol:75*
@ -121,13 +168,19 @@ In *<TESTDATA>/inputs/rubixi.sol:75*
``` ```
creator.send(collectedFees) creator.send(collectedFees)
``` ```
## Unchecked CALL return value ## Unchecked CALL return value
- Type: Informational - Type: Informational
- Contract: Rubixi - Contract: Rubixi
- Function name: `_function_0xb4022950` - Function name: `_function_0xb4022950`
- PC address: 2582 - PC address: 2582
### Description ### Description
The return value of an external call is not checked. Note that execution continue even if the called contract throws. The return value of an external call is not checked. Note that execution continue even if the called contract throws.
In *<TESTDATA>/inputs/rubixi.sol:85* In *<TESTDATA>/inputs/rubixi.sol:85*

@ -1,12 +1,17 @@
# Analysis Results
## Unchecked SUICIDE ## Unchecked SUICIDE
- Type: Warning - Type: Warning
- Contract: Suicide - Contract: Suicide
- Function name: `_function_0xcbf0b0c0` - Function name: `_function_0xcbf0b0c0`
- PC address: 146 - PC address: 146
### Description ### Description
The function _function_0xcbf0b0c0 executes the SUICIDE instruction. The remaining Ether is sent to an address provided as a function argument.
The function `_function_0xcbf0b0c0` executes the SUICIDE instruction. The remaining Ether is sent to an address provided as a function argument.
It seems that this function can be called without restrictions. It seems that this function can be called without restrictions.

@ -1,11 +1,16 @@
# Analysis Results
## Integer Underflow ## Integer Underflow
- Type: Warning - Type: Warning
- Contract: Under - Contract: Under
- Function name: `sendeth(address,uint256)` - Function name: `sendeth(address,uint256)`
- PC address: 649 - PC address: 649
### Description ### Description
A possible integer underflow exists in the function `sendeth(address,uint256)`. A possible integer underflow exists in the function `sendeth(address,uint256)`.
The subtraction may result in a value < 0. The subtraction may result in a value < 0.
@ -14,13 +19,19 @@ In *<TESTDATA>/inputs/underflow.sol:12*
``` ```
balances[msg.sender] -= _value balances[msg.sender] -= _value
``` ```
## Integer Overflow ## Integer Overflow
- Type: Warning - Type: Warning
- Contract: Under - Contract: Under
- Function name: `sendeth(address,uint256)` - Function name: `sendeth(address,uint256)`
- PC address: 725 - PC address: 725
### Description ### Description
A possible integer overflow exists in the function `sendeth(address,uint256)`. A possible integer overflow exists in the function `sendeth(address,uint256)`.
The addition may result in a value higher than the maximum representable integer. The addition may result in a value higher than the maximum representable integer.
@ -29,13 +40,19 @@ In *<TESTDATA>/inputs/underflow.sol:13*
``` ```
balances[_to] += _value balances[_to] += _value
``` ```
## Integer Underflow ## Integer Underflow
- Type: Warning - Type: Warning
- Contract: Under - Contract: Under
- Function name: `sendeth(address,uint256)` - Function name: `sendeth(address,uint256)`
- PC address: 567 - PC address: 567
### Description ### Description
A possible integer underflow exists in the function `sendeth(address,uint256)`. A possible integer underflow exists in the function `sendeth(address,uint256)`.
The subtraction may result in a value < 0. The subtraction may result in a value < 0.

@ -1,11 +1,16 @@
# Analysis Results
## Dependence on predictable environment variable ## Dependence on predictable environment variable
- Type: Warning - Type: Warning
- Contract: WeakRandom - Contract: WeakRandom
- Function name: `_function_0xe9874106` - Function name: `_function_0xe9874106`
- PC address: 1285 - PC address: 1285
### Description ### Description
In the function `'_function_0xe9874106'` the following predictable state variables are used to determine Ether recipient: In the function `'_function_0xe9874106'` the following predictable state variables are used to determine Ether recipient:
- block.coinbase - block.coinbase
@ -15,13 +20,19 @@ In *<TESTDATA>/inputs/weak_random.sol:47*
``` ```
winningAddress.transfer(prize) winningAddress.transfer(prize)
``` ```
## Ether send ## Ether send
- Type: Warning - Type: Warning
- Contract: WeakRandom - Contract: WeakRandom
- Function name: `_function_0xe9874106` - Function name: `_function_0xe9874106`
- PC address: 1285 - PC address: 1285
### Description ### Description
In the function `'_function_0xe9874106'` a non-zero amount of Ether is sent to an address taken from storage slot 0. In the function `'_function_0xe9874106'` a non-zero amount of Ether is sent to an address taken from storage slot 0.
There is a check on storage index 0. This storage slot can be written to by calling the function 'fallback'. There is a check on storage index 0. This storage slot can be written to by calling the function 'fallback'.
@ -33,13 +44,19 @@ In *<TESTDATA>/inputs/weak_random.sol:47*
``` ```
winningAddress.transfer(prize) winningAddress.transfer(prize)
``` ```
## Exception state ## Exception state
- Type: Informational - Type: Informational
- Contract: WeakRandom - Contract: WeakRandom
- Function name: `fallback` - Function name: `fallback`
- PC address: 356 - PC address: 356
### Description ### Description
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that assert() should only be used to check invariants. Use require() for regular input checking. A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that assert() should only be used to check invariants. Use require() for regular input checking.
In *<TESTDATA>/inputs/weak_random.sol:11* In *<TESTDATA>/inputs/weak_random.sol:11*
@ -47,13 +64,19 @@ In *<TESTDATA>/inputs/weak_random.sol:11*
``` ```
prize / totalTickets prize / totalTickets
``` ```
## Exception state ## Exception state
- Type: Informational - Type: Informational
- Contract: WeakRandom - Contract: WeakRandom
- Function name: `_function_0xe9874106` - Function name: `_function_0xe9874106`
- PC address: 146 - PC address: 146
### Description ### Description
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that assert() should only be used to check invariants. Use require() for regular input checking. A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that assert() should only be used to check invariants. Use require() for regular input checking.
In *<TESTDATA>/inputs/weak_random.sol:11* In *<TESTDATA>/inputs/weak_random.sol:11*
@ -61,13 +84,19 @@ In *<TESTDATA>/inputs/weak_random.sol:11*
``` ```
prize / totalTickets prize / totalTickets
``` ```
## Integer Overflow ## Integer Overflow
- Type: Warning - Type: Warning
- Contract: WeakRandom - Contract: WeakRandom
- Function name: `_function_0xe9874106` - Function name: `_function_0xe9874106`
- PC address: 1216 - PC address: 1216
### Description ### Description
A possible integer overflow exists in the function `_function_0xe9874106`. A possible integer overflow exists in the function `_function_0xe9874106`.
The addition may result in a value higher than the maximum representable integer. The addition may result in a value higher than the maximum representable integer.
@ -76,13 +105,19 @@ In *<TESTDATA>/inputs/weak_random.sol:45*
``` ```
gameId++ gameId++
``` ```
## Integer Overflow ## Integer Overflow
- Type: Warning - Type: Warning
- Contract: WeakRandom - Contract: WeakRandom
- Function name: `_function_0xe9874106` - Function name: `_function_0xe9874106`
- PC address: 262 - PC address: 262
### Description ### Description
A possible integer overflow exists in the function `_function_0xe9874106`. A possible integer overflow exists in the function `_function_0xe9874106`.
The addition may result in a value higher than the maximum representable integer. The addition may result in a value higher than the maximum representable integer.

Loading…
Cancel
Save