Active unchecked_retval module

pull/30/head
Bernhard Mueller 7 years ago
parent fd83764dd1
commit 94fd2c6227
  1. 2
      mythril/analysis/modules/unchecked_retval.py
  2. 4
      mythril/analysis/security.py

@ -35,6 +35,8 @@ def execute(statespace):
instr = call.node.instruction_list[next_i] instr = call.node.instruction_list[next_i]
logging.info("CALL. Next instruction: " + instr['opcode'])
# The stack contents at a particular point of execution are found in node.states[address].stack # The stack contents at a particular point of execution are found in node.states[address].stack
if (instr['opcode'] != 'ISZERO' or not re.search(r'retval', str(call.node.states[call.addr + 1].stack[-1]))): if (instr['opcode'] != 'ISZERO' or not re.search(r'retval', str(call.node.states[call.addr + 1].stack[-1]))):

@ -9,9 +9,7 @@ def fire_lasers(statespace):
issues += delegatecall_forward.execute(statespace) issues += delegatecall_forward.execute(statespace)
issues += unchecked_suicide.execute(statespace) issues += unchecked_suicide.execute(statespace)
issues += ether_send.execute(statespace) issues += ether_send.execute(statespace)
issues += unchecked_retval.execute(statespace)
# still needs some work
# issues += unchecked_retval.execute(statespace)
if (len(issues)): if (len(issues)):
report = Report(issues) report = Report(issues)

Loading…
Cancel
Save