diff --git a/tests/testdata/outputs_expected/ether_send.sol.o.json b/tests/testdata/outputs_expected/ether_send.sol.o.json index 4bc4f6c0..70a3daf8 100644 --- a/tests/testdata/outputs_expected/ether_send.sol.o.json +++ b/tests/testdata/outputs_expected/ether_send.sol.o.json @@ -9,6 +9,14 @@ "type": "Warning", "address": 816, "debug": "" + }, + { + "title": "Integer Overflow ", + "description": "A possible integer overflow exists in the function `invest()`.\nThe addition or multiplication may result in a value higher than the maximum representable integer.", + "function": "invest()", + "type": "Warning", + "address": 483, + "debug": "" } ] } \ No newline at end of file diff --git a/tests/testdata/outputs_expected/ether_send.sol.o.markdown b/tests/testdata/outputs_expected/ether_send.sol.o.markdown index 69129500..ea1bd54c 100644 --- a/tests/testdata/outputs_expected/ether_send.sol.o.markdown +++ b/tests/testdata/outputs_expected/ether_send.sol.o.markdown @@ -11,4 +11,16 @@ In the function `withdrawfunds()` a non-zero amount of Ether is sent to msg.sender. -There is a check on storage index 1. This storage slot can be written to by calling the function `crowdfunding()`. \ No newline at end of file +There is a check on storage index 1. This storage slot can be written to by calling the function `crowdfunding()`. + +## Integer Overflow + +- Type: Warning +- Contract: Unknown +- Function name: `invest()` +- PC address: 483 + +### Description + +A possible integer overflow exists in the function `invest()`. +The addition or multiplication may result in a value higher than the maximum representable integer. \ No newline at end of file diff --git a/tests/testdata/outputs_expected/ether_send.sol.o.text b/tests/testdata/outputs_expected/ether_send.sol.o.text index f800de7b..d41db8b1 100644 --- a/tests/testdata/outputs_expected/ether_send.sol.o.text +++ b/tests/testdata/outputs_expected/ether_send.sol.o.text @@ -8,3 +8,12 @@ In the function `withdrawfunds()` a non-zero amount of Ether is sent to msg.send There is a check on storage index 1. This storage slot can be written to by calling the function `crowdfunding()`. -------------------- +==== Integer Overflow ==== +Type: Warning +Contract: Unknown +Function name: invest() +PC address: 483 +A possible integer overflow exists in the function `invest()`. +The addition or multiplication may result in a value higher than the maximum representable integer. +-------------------- + diff --git a/tests/testdata/outputs_expected/metacoin.sol.o.json b/tests/testdata/outputs_expected/metacoin.sol.o.json index 130378fc..1977ed30 100644 --- a/tests/testdata/outputs_expected/metacoin.sol.o.json +++ b/tests/testdata/outputs_expected/metacoin.sol.o.json @@ -1,5 +1,14 @@ { "success": true, "error": null, - "issues": [] + "issues": [ + { + "title": "Integer Overflow ", + "description": "A possible integer overflow exists in the function `sendToken(address,uint256)`.\nThe addition or multiplication may result in a value higher than the maximum representable integer.", + "function": "sendToken(address,uint256)", + "type": "Warning", + "address": 498, + "debug": "" + } + ] } \ No newline at end of file diff --git a/tests/testdata/outputs_expected/metacoin.sol.o.markdown b/tests/testdata/outputs_expected/metacoin.sol.o.markdown index e69de29b..aaf85b5d 100644 --- a/tests/testdata/outputs_expected/metacoin.sol.o.markdown +++ b/tests/testdata/outputs_expected/metacoin.sol.o.markdown @@ -0,0 +1,13 @@ +# Analysis results for test-filename.sol + +## Integer Overflow + +- Type: Warning +- Contract: Unknown +- Function name: `sendToken(address,uint256)` +- PC address: 498 + +### Description + +A possible integer overflow exists in the function `sendToken(address,uint256)`. +The addition or multiplication may result in a value higher than the maximum representable integer. \ No newline at end of file diff --git a/tests/testdata/outputs_expected/metacoin.sol.o.text b/tests/testdata/outputs_expected/metacoin.sol.o.text index e69de29b..9cb0bc12 100644 --- a/tests/testdata/outputs_expected/metacoin.sol.o.text +++ b/tests/testdata/outputs_expected/metacoin.sol.o.text @@ -0,0 +1,9 @@ +==== Integer Overflow ==== +Type: Warning +Contract: Unknown +Function name: sendToken(address,uint256) +PC address: 498 +A possible integer overflow exists in the function `sendToken(address,uint256)`. +The addition or multiplication may result in a value higher than the maximum representable integer. +-------------------- + diff --git a/tests/testdata/outputs_expected/overflow.sol.o.json b/tests/testdata/outputs_expected/overflow.sol.o.json index f64152e4..d9e1b0b8 100644 --- a/tests/testdata/outputs_expected/overflow.sol.o.json +++ b/tests/testdata/outputs_expected/overflow.sol.o.json @@ -10,6 +10,14 @@ "address": 649, "debug": "" }, + { + "title": "Integer Overflow ", + "description": "A possible integer overflow exists in the function `sendeth(address,uint256)`.\nThe addition or multiplication may result in a value higher than the maximum representable integer.", + "function": "sendeth(address,uint256)", + "type": "Warning", + "address": 725, + "debug": "" + }, { "title": "Integer Underflow", "description": "A possible integer underflow exists in the function `sendeth(address,uint256)`.\nThe subtraction may result in a value < 0.", diff --git a/tests/testdata/outputs_expected/overflow.sol.o.markdown b/tests/testdata/outputs_expected/overflow.sol.o.markdown index e3095a96..172ff2fc 100644 --- a/tests/testdata/outputs_expected/overflow.sol.o.markdown +++ b/tests/testdata/outputs_expected/overflow.sol.o.markdown @@ -12,6 +12,18 @@ A possible integer underflow exists in the function `sendeth(address,uint256)`. The subtraction may result in a value < 0. +## Integer Overflow + +- Type: Warning +- Contract: Unknown +- Function name: `sendeth(address,uint256)` +- PC address: 725 + +### Description + +A possible integer overflow exists in the function `sendeth(address,uint256)`. +The addition or multiplication may result in a value higher than the maximum representable integer. + ## Integer Underflow - Type: Warning diff --git a/tests/testdata/outputs_expected/overflow.sol.o.text b/tests/testdata/outputs_expected/overflow.sol.o.text index 8920d071..a3ec68c4 100644 --- a/tests/testdata/outputs_expected/overflow.sol.o.text +++ b/tests/testdata/outputs_expected/overflow.sol.o.text @@ -7,6 +7,15 @@ A possible integer underflow exists in the function `sendeth(address,uint256)`. The subtraction may result in a value < 0. -------------------- +==== Integer Overflow ==== +Type: Warning +Contract: Unknown +Function name: sendeth(address,uint256) +PC address: 725 +A possible integer overflow exists in the function `sendeth(address,uint256)`. +The addition or multiplication may result in a value higher than the maximum representable integer. +-------------------- + ==== Integer Underflow ==== Type: Warning Contract: Unknown diff --git a/tests/testdata/outputs_expected/rubixi.sol.o.json b/tests/testdata/outputs_expected/rubixi.sol.o.json index d291bc3b..be5bae99 100644 --- a/tests/testdata/outputs_expected/rubixi.sol.o.json +++ b/tests/testdata/outputs_expected/rubixi.sol.o.json @@ -34,6 +34,14 @@ "address": 2085, "debug": "" }, + { + "title": "Integer Overflow ", + "description": "A possible integer overflow exists in the function `_function_0xfae14192`.\nThe addition or multiplication may result in a value higher than the maximum representable integer.", + "function": "_function_0xfae14192", + "type": "Warning", + "address": 1223, + "debug": "" + }, { "title": "Unchecked CALL return value", "description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.", diff --git a/tests/testdata/outputs_expected/rubixi.sol.o.markdown b/tests/testdata/outputs_expected/rubixi.sol.o.markdown index 68862834..dd298fbb 100644 --- a/tests/testdata/outputs_expected/rubixi.sol.o.markdown +++ b/tests/testdata/outputs_expected/rubixi.sol.o.markdown @@ -52,6 +52,18 @@ A reachable exception (opcode 0xfe) has been detected. This can be caused by typ A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that `assert()` should only be used to check invariants. Use `require()` for regular input checking. +## Integer Overflow + +- Type: Warning +- Contract: Unknown +- Function name: `_function_0xfae14192` +- PC address: 1223 + +### Description + +A possible integer overflow exists in the function `_function_0xfae14192`. +The addition or multiplication may result in a value higher than the maximum representable integer. + ## Unchecked CALL return value - Type: Informational diff --git a/tests/testdata/outputs_expected/rubixi.sol.o.text b/tests/testdata/outputs_expected/rubixi.sol.o.text index b26478dc..18e2ed6d 100644 --- a/tests/testdata/outputs_expected/rubixi.sol.o.text +++ b/tests/testdata/outputs_expected/rubixi.sol.o.text @@ -38,6 +38,15 @@ PC address: 2085 A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that `assert()` should only be used to check invariants. Use `require()` for regular input checking. -------------------- +==== Integer Overflow ==== +Type: Warning +Contract: Unknown +Function name: _function_0xfae14192 +PC address: 1223 +A possible integer overflow exists in the function `_function_0xfae14192`. +The addition or multiplication may result in a value higher than the maximum representable integer. +-------------------- + ==== Unchecked CALL return value ==== Type: Informational Contract: Unknown diff --git a/tests/testdata/outputs_expected/underflow.sol.o.json b/tests/testdata/outputs_expected/underflow.sol.o.json index f64152e4..d9e1b0b8 100644 --- a/tests/testdata/outputs_expected/underflow.sol.o.json +++ b/tests/testdata/outputs_expected/underflow.sol.o.json @@ -10,6 +10,14 @@ "address": 649, "debug": "" }, + { + "title": "Integer Overflow ", + "description": "A possible integer overflow exists in the function `sendeth(address,uint256)`.\nThe addition or multiplication may result in a value higher than the maximum representable integer.", + "function": "sendeth(address,uint256)", + "type": "Warning", + "address": 725, + "debug": "" + }, { "title": "Integer Underflow", "description": "A possible integer underflow exists in the function `sendeth(address,uint256)`.\nThe subtraction may result in a value < 0.", diff --git a/tests/testdata/outputs_expected/underflow.sol.o.markdown b/tests/testdata/outputs_expected/underflow.sol.o.markdown index e3095a96..172ff2fc 100644 --- a/tests/testdata/outputs_expected/underflow.sol.o.markdown +++ b/tests/testdata/outputs_expected/underflow.sol.o.markdown @@ -12,6 +12,18 @@ A possible integer underflow exists in the function `sendeth(address,uint256)`. The subtraction may result in a value < 0. +## Integer Overflow + +- Type: Warning +- Contract: Unknown +- Function name: `sendeth(address,uint256)` +- PC address: 725 + +### Description + +A possible integer overflow exists in the function `sendeth(address,uint256)`. +The addition or multiplication may result in a value higher than the maximum representable integer. + ## Integer Underflow - Type: Warning diff --git a/tests/testdata/outputs_expected/underflow.sol.o.text b/tests/testdata/outputs_expected/underflow.sol.o.text index 8920d071..a3ec68c4 100644 --- a/tests/testdata/outputs_expected/underflow.sol.o.text +++ b/tests/testdata/outputs_expected/underflow.sol.o.text @@ -7,6 +7,15 @@ A possible integer underflow exists in the function `sendeth(address,uint256)`. The subtraction may result in a value < 0. -------------------- +==== Integer Overflow ==== +Type: Warning +Contract: Unknown +Function name: sendeth(address,uint256) +PC address: 725 +A possible integer overflow exists in the function `sendeth(address,uint256)`. +The addition or multiplication may result in a value higher than the maximum representable integer. +-------------------- + ==== Integer Underflow ==== Type: Warning Contract: Unknown diff --git a/tests/testdata/outputs_expected/weak_random.sol.o.json b/tests/testdata/outputs_expected/weak_random.sol.o.json index 62158749..510abea1 100644 --- a/tests/testdata/outputs_expected/weak_random.sol.o.json +++ b/tests/testdata/outputs_expected/weak_random.sol.o.json @@ -33,6 +33,22 @@ "type": "Informational", "address": 146, "debug": "" + }, + { + "title": "Integer Overflow ", + "description": "A possible integer overflow exists in the function `_function_0xe9874106`.\nThe addition or multiplication may result in a value higher than the maximum representable integer.", + "function": "_function_0xe9874106", + "type": "Warning", + "address": 1216, + "debug": "" + }, + { + "title": "Integer Overflow ", + "description": "A possible integer overflow exists in the function `_function_0xe9874106`.\nThe addition or multiplication may result in a value higher than the maximum representable integer.", + "function": "_function_0xe9874106", + "type": "Warning", + "address": 262, + "debug": "" } ] } \ No newline at end of file diff --git a/tests/testdata/outputs_expected/weak_random.sol.o.markdown b/tests/testdata/outputs_expected/weak_random.sol.o.markdown index 2f3319b5..83edf60f 100644 --- a/tests/testdata/outputs_expected/weak_random.sol.o.markdown +++ b/tests/testdata/outputs_expected/weak_random.sol.o.markdown @@ -48,4 +48,28 @@ A reachable exception (opcode 0xfe) has been detected. This can be caused by typ ### Description -A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that `assert()` should only be used to check invariants. Use `require()` for regular input checking. \ No newline at end of file +A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that `assert()` should only be used to check invariants. Use `require()` for regular input checking. + +## Integer Overflow + +- Type: Warning +- Contract: Unknown +- Function name: `_function_0xe9874106` +- PC address: 1216 + +### Description + +A possible integer overflow exists in the function `_function_0xe9874106`. +The addition or multiplication may result in a value higher than the maximum representable integer. + +## Integer Overflow + +- Type: Warning +- Contract: Unknown +- Function name: `_function_0xe9874106` +- PC address: 262 + +### Description + +A possible integer overflow exists in the function `_function_0xe9874106`. +The addition or multiplication may result in a value higher than the maximum representable integer. \ No newline at end of file diff --git a/tests/testdata/outputs_expected/weak_random.sol.o.text b/tests/testdata/outputs_expected/weak_random.sol.o.text index 1537e177..7ab15307 100644 --- a/tests/testdata/outputs_expected/weak_random.sol.o.text +++ b/tests/testdata/outputs_expected/weak_random.sol.o.text @@ -36,3 +36,21 @@ PC address: 146 A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. This is acceptable in most situations. Note however that `assert()` should only be used to check invariants. Use `require()` for regular input checking. -------------------- +==== Integer Overflow ==== +Type: Warning +Contract: Unknown +Function name: _function_0xe9874106 +PC address: 1216 +A possible integer overflow exists in the function `_function_0xe9874106`. +The addition or multiplication may result in a value higher than the maximum representable integer. +-------------------- + +==== Integer Overflow ==== +Type: Warning +Contract: Unknown +Function name: _function_0xe9874106 +PC address: 262 +A possible integer overflow exists in the function `_function_0xe9874106`. +The addition or multiplication may result in a value higher than the maximum representable integer. +-------------------- +