Update tests

pull/852/head
Bernhard Mueller 6 years ago
parent 0299e12cce
commit a488f06457
  1. 2
      tests/cmd_line_test.py
  2. 103
      tests/testdata/outputs_expected/calls.sol.o.json
  3. 56
      tests/testdata/outputs_expected/calls.sol.o.markdown
  4. 56
      tests/testdata/outputs_expected/calls.sol.o.text
  5. 6
      tests/testdata/outputs_expected/ether_send.sol.o.json
  6. 55
      tests/testdata/outputs_expected/exceptions.sol.o.json
  7. 28
      tests/testdata/outputs_expected/exceptions.sol.o.markdown
  8. 28
      tests/testdata/outputs_expected/exceptions.sol.o.text
  9. 67
      tests/testdata/outputs_expected/kinds_of_calls.sol.o.json
  10. 35
      tests/testdata/outputs_expected/kinds_of_calls.sol.o.markdown
  11. 35
      tests/testdata/outputs_expected/kinds_of_calls.sol.o.text
  12. 6
      tests/testdata/outputs_expected/metacoin.sol.o.json
  13. 19
      tests/testdata/outputs_expected/multi_contracts.sol.o.json
  14. 5
      tests/testdata/outputs_expected/multi_contracts.sol.o.markdown
  15. 5
      tests/testdata/outputs_expected/multi_contracts.sol.o.text
  16. 6
      tests/testdata/outputs_expected/nonascii.sol.o.json
  17. 19
      tests/testdata/outputs_expected/origin.sol.o.json
  18. 5
      tests/testdata/outputs_expected/origin.sol.o.markdown
  19. 5
      tests/testdata/outputs_expected/origin.sol.o.text
  20. 43
      tests/testdata/outputs_expected/overflow.sol.o.json
  21. 15
      tests/testdata/outputs_expected/overflow.sol.o.markdown
  22. 15
      tests/testdata/outputs_expected/overflow.sol.o.text
  23. 43
      tests/testdata/outputs_expected/returnvalue.sol.o.json
  24. 21
      tests/testdata/outputs_expected/returnvalue.sol.o.markdown
  25. 21
      tests/testdata/outputs_expected/returnvalue.sol.o.text
  26. 19
      tests/testdata/outputs_expected/suicide.sol.o.json
  27. 7
      tests/testdata/outputs_expected/suicide.sol.o.markdown
  28. 7
      tests/testdata/outputs_expected/suicide.sol.o.text
  29. 43
      tests/testdata/outputs_expected/underflow.sol.o.json
  30. 15
      tests/testdata/outputs_expected/underflow.sol.o.markdown
  31. 15
      tests/testdata/outputs_expected/underflow.sol.o.text

@ -29,7 +29,7 @@ class TruffleTestCase(BaseTestCase):
command = "cd {}; truffle compile; python3 {} --truffle -t 2".format(
truffle_project_root, MYTH
)
self.assertIn("=== Ether thief ====", output_of(command))
self.assertIn("=== Unprotected Ether Withdrawal ====", output_of(command))
class InfuraTestCase(BaseTestCase):

@ -1,102 +1 @@
{
"error": null,
"issues": [
{
"address": 661,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable.",
"function": "thisisfine()",
"max_gas_used": 1254,
"min_gas_used": 643,
"swc-id": "107",
"title": "External call",
"type": "Informational"
},
{
"address": 661,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.",
"function": "thisisfine()",
"max_gas_used": 35972,
"min_gas_used": 1361,
"swc-id": "104",
"title": "Unchecked CALL return value",
"type": "Informational"
},
{
"address": 779,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable.",
"function": "callstoredaddress()",
"max_gas_used": 1298,
"min_gas_used": 687,
"swc-id": "107",
"title": "External call",
"type": "Informational"
},
{
"address": 779,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.",
"function": "callstoredaddress()",
"max_gas_used": 36016,
"min_gas_used": 1405,
"swc-id": "104",
"title": "Unchecked CALL return value",
"type": "Informational"
},
{
"address": 858,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable.",
"function": "reentrancy()",
"max_gas_used": 1320,
"min_gas_used": 709,
"swc-id": "107",
"title": "External call",
"type": "Informational"
},
{
"address": 858,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.",
"function": "reentrancy()",
"max_gas_used": 61052,
"min_gas_used": 6441,
"swc-id": "104",
"title": "Unchecked CALL return value",
"type": "Informational"
},
{
"address": 912,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "The contract executes a function call with high gas to a user-supplied address. Note that the callee can contain arbitrary code and may re-enter any function in this contract. Review the business logic carefully to prevent unanticipated effects on the contract state.",
"function": "calluseraddress(address)",
"max_gas_used": 616,
"min_gas_used": 335,
"swc-id": "107",
"title": "External call to user-supplied address",
"type": "Warning"
},
{
"address": 912,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.",
"function": "calluseraddress(address)",
"max_gas_used": 35336,
"min_gas_used": 1055,
"swc-id": "104",
"title": "Unchecked CALL return value",
"type": "Informational"
}
],
"success": true
}
{"issues": [{"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-107", "swcTitle": "Reentrancy"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-107", "swcTitle": "Reentrancy"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-107", "swcTitle": "Reentrancy"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-107", "swcTitle": "Reentrancy"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-104", "swcTitle": "Unchecked Call Return Value"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-104", "swcTitle": "Unchecked Call Return Value"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-104", "swcTitle": "Unchecked Call Return Value"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-104", "swcTitle": "Unchecked Call Return Value"}], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null}

@ -1,8 +1,8 @@
# Analysis results for test-filename.sol
## External call
## External Call To Fixed Address
- SWC ID: 107
- Type: Informational
- Severity: Low
- Contract: Unknown
- Function name: `thisisfine()`
- PC address: 661
@ -10,11 +10,12 @@
### Description
The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable.
The contract executes an external message call.
An external function call to a fixed contract address is executed. Make sure that the callee contract has been reviewed carefully.
## Unchecked CALL return value
## Unchecked Call Return Value
- SWC ID: 104
- Type: Informational
- Severity: Low
- Contract: Unknown
- Function name: `thisisfine()`
- PC address: 661
@ -22,11 +23,12 @@ The contract executes a function call to an external address. Verify that the co
### Description
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
The return value of a message call is not checked.
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states.
## External call
## External Call To Fixed Address
- SWC ID: 107
- Type: Informational
- Severity: Low
- Contract: Unknown
- Function name: `callstoredaddress()`
- PC address: 779
@ -34,11 +36,12 @@ The return value of an external call is not checked. Note that execution continu
### Description
The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable.
The contract executes an external message call.
An external function call to a fixed contract address is executed. Make sure that the callee contract has been reviewed carefully.
## Unchecked CALL return value
## Unchecked Call Return Value
- SWC ID: 104
- Type: Informational
- Severity: Low
- Contract: Unknown
- Function name: `callstoredaddress()`
- PC address: 779
@ -46,11 +49,12 @@ The contract executes a function call to an external address. Verify that the co
### Description
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
The return value of a message call is not checked.
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states.
## External call
## External Call To Fixed Address
- SWC ID: 107
- Type: Informational
- Severity: Low
- Contract: Unknown
- Function name: `reentrancy()`
- PC address: 858
@ -58,11 +62,12 @@ The return value of an external call is not checked. Note that execution continu
### Description
The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable.
The contract executes an external message call.
An external function call to a fixed contract address is executed. Make sure that the callee contract has been reviewed carefully.
## Unchecked CALL return value
## Unchecked Call Return Value
- SWC ID: 104
- Type: Informational
- Severity: Low
- Contract: Unknown
- Function name: `reentrancy()`
- PC address: 858
@ -70,11 +75,12 @@ The contract executes a function call to an external address. Verify that the co
### Description
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
The return value of a message call is not checked.
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states.
## External call to user-supplied address
## External Call To User-Supplied Address
- SWC ID: 107
- Type: Warning
- Severity: Medium
- Contract: Unknown
- Function name: `calluseraddress(address)`
- PC address: 912
@ -82,11 +88,12 @@ The return value of an external call is not checked. Note that execution continu
### Description
The contract executes a function call with high gas to a user-supplied address. Note that the callee can contain arbitrary code and may re-enter any function in this contract. Review the business logic carefully to prevent unanticipated effects on the contract state.
A call to a user-supplied address is executed.
The callee address of an external message call can be set by the caller. Note that the callee can contain arbitrary code and may re-enter any function in this contract. Review the business logic carefully to prevent averse effects on thecontract state.
## Unchecked CALL return value
## Unchecked Call Return Value
- SWC ID: 104
- Type: Informational
- Severity: Low
- Contract: Unknown
- Function name: `calluseraddress(address)`
- PC address: 912
@ -94,4 +101,5 @@ The contract executes a function call with high gas to a user-supplied address.
### Description
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
The return value of a message call is not checked.
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states.

@ -1,80 +1,88 @@
==== External call ====
==== External Call To Fixed Address ====
SWC ID: 107
Type: Informational
Severity: Low
Contract: Unknown
Function name: thisisfine()
PC address: 661
Estimated Gas Usage: 643 - 1254
The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable.
The contract executes an external message call.
An external function call to a fixed contract address is executed. Make sure that the callee contract has been reviewed carefully.
--------------------
==== Unchecked CALL return value ====
==== Unchecked Call Return Value ====
SWC ID: 104
Type: Informational
Severity: Low
Contract: Unknown
Function name: thisisfine()
PC address: 661
Estimated Gas Usage: 1361 - 35972
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
The return value of a message call is not checked.
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states.
--------------------
==== External call ====
==== External Call To Fixed Address ====
SWC ID: 107
Type: Informational
Severity: Low
Contract: Unknown
Function name: callstoredaddress()
PC address: 779
Estimated Gas Usage: 687 - 1298
The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable.
The contract executes an external message call.
An external function call to a fixed contract address is executed. Make sure that the callee contract has been reviewed carefully.
--------------------
==== Unchecked CALL return value ====
==== Unchecked Call Return Value ====
SWC ID: 104
Type: Informational
Severity: Low
Contract: Unknown
Function name: callstoredaddress()
PC address: 779
Estimated Gas Usage: 1405 - 36016
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
The return value of a message call is not checked.
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states.
--------------------
==== External call ====
==== External Call To Fixed Address ====
SWC ID: 107
Type: Informational
Severity: Low
Contract: Unknown
Function name: reentrancy()
PC address: 858
Estimated Gas Usage: 709 - 1320
The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable.
The contract executes an external message call.
An external function call to a fixed contract address is executed. Make sure that the callee contract has been reviewed carefully.
--------------------
==== Unchecked CALL return value ====
==== Unchecked Call Return Value ====
SWC ID: 104
Type: Informational
Severity: Low
Contract: Unknown
Function name: reentrancy()
PC address: 858
Estimated Gas Usage: 6441 - 61052
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
The return value of a message call is not checked.
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states.
--------------------
==== External call to user-supplied address ====
==== External Call To User-Supplied Address ====
SWC ID: 107
Type: Warning
Severity: Medium
Contract: Unknown
Function name: calluseraddress(address)
PC address: 912
Estimated Gas Usage: 335 - 616
The contract executes a function call with high gas to a user-supplied address. Note that the callee can contain arbitrary code and may re-enter any function in this contract. Review the business logic carefully to prevent unanticipated effects on the contract state.
A call to a user-supplied address is executed.
The callee address of an external message call can be set by the caller. Note that the callee can contain arbitrary code and may re-enter any function in this contract. Review the business logic carefully to prevent averse effects on thecontract state.
--------------------
==== Unchecked CALL return value ====
==== Unchecked Call Return Value ====
SWC ID: 104
Type: Informational
Severity: Low
Contract: Unknown
Function name: calluseraddress(address)
PC address: 912
Estimated Gas Usage: 1055 - 35336
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
The return value of a message call is not checked.
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states.
--------------------

@ -1,5 +1 @@
{
"error": null,
"issues": [],
"success": true
}
{"issues": [], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null}

@ -1,54 +1 @@
{
"error": null,
"issues": [
{
"address": 446,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.",
"function": "assert3(uint256)",
"max_gas_used": 301,
"min_gas_used": 206,
"swc-id": "110",
"title": "Exception state",
"type": "Informational"
},
{
"address": 484,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.",
"function": "arrayaccess(uint256)",
"max_gas_used": 351,
"min_gas_used": 256,
"swc-id": "110",
"title": "Exception state",
"type": "Informational"
},
{
"address": 506,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.",
"function": "divisionby0(uint256)",
"max_gas_used": 367,
"min_gas_used": 272,
"swc-id": "110",
"title": "Exception state",
"type": "Informational"
},
{
"address": 531,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.",
"function": "assert1()",
"max_gas_used": 363,
"min_gas_used": 268,
"swc-id": "110",
"title": "Exception state",
"type": "Informational"
}
],
"success": true
}
{"issues": [{"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-110", "swcTitle": "Assert Violation"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-110", "swcTitle": "Assert Violation"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-110", "swcTitle": "Assert Violation"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-110", "swcTitle": "Assert Violation"}], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null}

@ -1,8 +1,8 @@
# Analysis results for test-filename.sol
## Exception state
## Exception State
- SWC ID: 110
- Type: Informational
- Severity: Low
- Contract: Unknown
- Function name: `assert3(uint256)`
- PC address: 446
@ -10,11 +10,12 @@
### Description
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
A reachable exception has been detected.
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
## Exception state
## Exception State
- SWC ID: 110
- Type: Informational
- Severity: Low
- Contract: Unknown
- Function name: `arrayaccess(uint256)`
- PC address: 484
@ -22,11 +23,12 @@ A reachable exception (opcode 0xfe) has been detected. This can be caused by typ
### Description
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
A reachable exception has been detected.
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
## Exception state
## Exception State
- SWC ID: 110
- Type: Informational
- Severity: Low
- Contract: Unknown
- Function name: `divisionby0(uint256)`
- PC address: 506
@ -34,11 +36,12 @@ A reachable exception (opcode 0xfe) has been detected. This can be caused by typ
### Description
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
A reachable exception has been detected.
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
## Exception state
## Exception State
- SWC ID: 110
- Type: Informational
- Severity: Low
- Contract: Unknown
- Function name: `assert1()`
- PC address: 531
@ -46,4 +49,5 @@ A reachable exception (opcode 0xfe) has been detected. This can be caused by typ
### Description
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
A reachable exception has been detected.
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.

@ -1,40 +1,44 @@
==== Exception state ====
==== Exception State ====
SWC ID: 110
Type: Informational
Severity: Low
Contract: Unknown
Function name: assert3(uint256)
PC address: 446
Estimated Gas Usage: 206 - 301
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
A reachable exception has been detected.
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
--------------------
==== Exception state ====
==== Exception State ====
SWC ID: 110
Type: Informational
Severity: Low
Contract: Unknown
Function name: arrayaccess(uint256)
PC address: 484
Estimated Gas Usage: 256 - 351
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
A reachable exception has been detected.
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
--------------------
==== Exception state ====
==== Exception State ====
SWC ID: 110
Type: Informational
Severity: Low
Contract: Unknown
Function name: divisionby0(uint256)
PC address: 506
Estimated Gas Usage: 272 - 367
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
A reachable exception has been detected.
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
--------------------
==== Exception state ====
==== Exception State ====
SWC ID: 110
Type: Informational
Severity: Low
Contract: Unknown
Function name: assert1()
PC address: 531
Estimated Gas Usage: 268 - 363
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
A reachable exception has been detected.
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
--------------------

@ -1,66 +1 @@
{
"error": null,
"issues": [
{
"address": 618,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.",
"function": "_function_0x141f32ff",
"max_gas_used": 35865,
"min_gas_used": 1113,
"swc-id": "104",
"title": "Unchecked CALL return value",
"type": "Informational"
},
{
"address": 618,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "The function `_function_0x141f32ff` uses callcode. Callcode does not persist sender or value over the call. Use delegatecall instead.",
"function": "_function_0x141f32ff",
"max_gas_used": 1141,
"min_gas_used": 389,
"swc-id": "111",
"title": "Use of callcode",
"type": "Warning"
},
{
"address": 849,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.",
"function": "_function_0x9b58bc26",
"max_gas_used": 35922,
"min_gas_used": 1170,
"swc-id": "104",
"title": "Unchecked CALL return value",
"type": "Informational"
},
{
"address": 1038,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "The contract executes a function call with high gas to a user-supplied address. Note that the callee can contain arbitrary code and may re-enter any function in this contract. Review the business logic carefully to prevent unanticipated effects on the contract state.",
"function": "_function_0xeea4c864",
"max_gas_used": 1223,
"min_gas_used": 471,
"swc-id": "107",
"title": "External call to user-supplied address",
"type": "Warning"
},
{
"address": 1038,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.",
"function": "_function_0xeea4c864",
"max_gas_used": 35947,
"min_gas_used": 1195,
"swc-id": "104",
"title": "Unchecked CALL return value",
"type": "Informational"
}
],
"success": true
}
{"issues": [{"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-111", "swcTitle": "Use of Deprecated Solidity Functions"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-107", "swcTitle": "Reentrancy"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-104", "swcTitle": "Unchecked Call Return Value"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-104", "swcTitle": "Unchecked Call Return Value"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-104", "swcTitle": "Unchecked Call Return Value"}], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null}

@ -1,8 +1,8 @@
# Analysis results for test-filename.sol
## Unchecked CALL return value
## Unchecked Call Return Value
- SWC ID: 104
- Type: Informational
- Severity: Low
- Contract: Unknown
- Function name: `_function_0x141f32ff`
- PC address: 618
@ -10,11 +10,12 @@
### Description
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
The return value of a message call is not checked.
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states.
## Use of callcode
## Use of Callcode
- SWC ID: 111
- Type: Warning
- Severity: Medium
- Contract: Unknown
- Function name: `_function_0x141f32ff`
- PC address: 618
@ -22,11 +23,12 @@ The return value of an external call is not checked. Note that execution continu
### Description
The function `_function_0x141f32ff` uses callcode. Callcode does not persist sender or value over the call. Use delegatecall instead.
Use of callcode is deprecated.
The function `_function_0x141f32ff` uses the callcode function. Callcode does not persist sender or value over the call. Use delegatecall instead.
## Unchecked CALL return value
## Unchecked Call Return Value
- SWC ID: 104
- Type: Informational
- Severity: Low
- Contract: Unknown
- Function name: `_function_0x9b58bc26`
- PC address: 849
@ -34,11 +36,12 @@ The function `_function_0x141f32ff` uses callcode. Callcode does not persist sen
### Description
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
The return value of a message call is not checked.
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states.
## External call to user-supplied address
## External Call To User-Supplied Address
- SWC ID: 107
- Type: Warning
- Severity: Medium
- Contract: Unknown
- Function name: `_function_0xeea4c864`
- PC address: 1038
@ -46,11 +49,12 @@ The return value of an external call is not checked. Note that execution continu
### Description
The contract executes a function call with high gas to a user-supplied address. Note that the callee can contain arbitrary code and may re-enter any function in this contract. Review the business logic carefully to prevent unanticipated effects on the contract state.
A call to a user-supplied address is executed.
The callee address of an external message call can be set by the caller. Note that the callee can contain arbitrary code and may re-enter any function in this contract. Review the business logic carefully to prevent averse effects on thecontract state.
## Unchecked CALL return value
## Unchecked Call Return Value
- SWC ID: 104
- Type: Informational
- Severity: Low
- Contract: Unknown
- Function name: `_function_0xeea4c864`
- PC address: 1038
@ -58,4 +62,5 @@ The contract executes a function call with high gas to a user-supplied address.
### Description
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
The return value of a message call is not checked.
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states.

@ -1,50 +1,55 @@
==== Unchecked CALL return value ====
==== Unchecked Call Return Value ====
SWC ID: 104
Type: Informational
Severity: Low
Contract: Unknown
Function name: _function_0x141f32ff
PC address: 618
Estimated Gas Usage: 1113 - 35865
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
The return value of a message call is not checked.
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states.
--------------------
==== Use of callcode ====
==== Use of Callcode ====
SWC ID: 111
Type: Warning
Severity: Medium
Contract: Unknown
Function name: _function_0x141f32ff
PC address: 618
Estimated Gas Usage: 389 - 1141
The function `_function_0x141f32ff` uses callcode. Callcode does not persist sender or value over the call. Use delegatecall instead.
Use of callcode is deprecated.
The function `_function_0x141f32ff` uses the callcode function. Callcode does not persist sender or value over the call. Use delegatecall instead.
--------------------
==== Unchecked CALL return value ====
==== Unchecked Call Return Value ====
SWC ID: 104
Type: Informational
Severity: Low
Contract: Unknown
Function name: _function_0x9b58bc26
PC address: 849
Estimated Gas Usage: 1170 - 35922
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
The return value of a message call is not checked.
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states.
--------------------
==== External call to user-supplied address ====
==== External Call To User-Supplied Address ====
SWC ID: 107
Type: Warning
Severity: Medium
Contract: Unknown
Function name: _function_0xeea4c864
PC address: 1038
Estimated Gas Usage: 471 - 1223
The contract executes a function call with high gas to a user-supplied address. Note that the callee can contain arbitrary code and may re-enter any function in this contract. Review the business logic carefully to prevent unanticipated effects on the contract state.
A call to a user-supplied address is executed.
The callee address of an external message call can be set by the caller. Note that the callee can contain arbitrary code and may re-enter any function in this contract. Review the business logic carefully to prevent averse effects on thecontract state.
--------------------
==== Unchecked CALL return value ====
==== Unchecked Call Return Value ====
SWC ID: 104
Type: Informational
Severity: Low
Contract: Unknown
Function name: _function_0xeea4c864
PC address: 1038
Estimated Gas Usage: 1195 - 35947
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
The return value of a message call is not checked.
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states.
--------------------

@ -1,5 +1 @@
{
"error": null,
"issues": [],
"success": true
}
{"issues": [], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null}

@ -1,18 +1 @@
{
"error": null,
"issues": [
{
"address": 142,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "Arbitrary senders other than the contract creator can withdraw ETH from the contract account without previously having sent an equivalent amount of ETH to it. This is likely to be a vulnerability.",
"function": "transfer()",
"max_gas_used": 467,
"min_gas_used": 186,
"swc-id": "105",
"title": "Ether thief",
"type": "Warning"
}
],
"success": true
}
{"issues": [{"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-105", "swcTitle": "Unprotected Ether Withdrawal"}], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null}

@ -1,8 +1,8 @@
# Analysis results for test-filename.sol
## Ether thief
## Unprotected Ether Withdrawal
- SWC ID: 105
- Type: Warning
- Severity: High
- Contract: Unknown
- Function name: `transfer()`
- PC address: 142
@ -10,4 +10,5 @@
### Description
Anyone can withdraw ETH from the contract account.
Arbitrary senders other than the contract creator can withdraw ETH from the contract account without previously having sent an equivalent amount of ETH to it. This is likely to be a vulnerability.

@ -1,10 +1,11 @@
==== Ether thief ====
==== Unprotected Ether Withdrawal ====
SWC ID: 105
Type: Warning
Severity: High
Contract: Unknown
Function name: transfer()
PC address: 142
Estimated Gas Usage: 186 - 467
Anyone can withdraw ETH from the contract account.
Arbitrary senders other than the contract creator can withdraw ETH from the contract account without previously having sent an equivalent amount of ETH to it. This is likely to be a vulnerability.
--------------------

@ -1,5 +1 @@
{
"error": null,
"issues": [],
"success": true
}
{"issues": [], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null}

@ -1,18 +1 @@
{
"error": null,
"issues": [
{
"address": 317,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "The function `transferOwnership(address)` retrieves the transaction origin (tx.origin) using the ORIGIN opcode. Use msg.sender instead.\nSee also: https://solidity.readthedocs.io/en/develop/security-considerations.html#tx-origin",
"function": "transferOwnership(address)",
"max_gas_used": 1051,
"min_gas_used": 626,
"swc-id": "111",
"title": "Use of tx.origin",
"type": "Warning"
}
],
"success": true
}
{"issues": [{"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-111", "swcTitle": "Use of Deprecated Solidity Functions"}], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null}

@ -1,8 +1,8 @@
# Analysis results for test-filename.sol
## Use of tx.origin
## Use of tx.origin is deprecated.
- SWC ID: 111
- Type: Warning
- Severity: Medium
- Contract: Unknown
- Function name: `transferOwnership(address)`
- PC address: 317
@ -10,5 +10,6 @@
### Description
Use of tx.origin is deprecated.
The function `transferOwnership(address)` retrieves the transaction origin (tx.origin) using the ORIGIN opcode. Use msg.sender instead.
See also: https://solidity.readthedocs.io/en/develop/security-considerations.html#tx-origin

@ -1,10 +1,11 @@
==== Use of tx.origin ====
==== Use of tx.origin is deprecated. ====
SWC ID: 111
Type: Warning
Severity: Medium
Contract: Unknown
Function name: transferOwnership(address)
PC address: 317
Estimated Gas Usage: 626 - 1051
Use of tx.origin is deprecated.
The function `transferOwnership(address)` retrieves the transaction origin (tx.origin) using the ORIGIN opcode. Use msg.sender instead.
See also: https://solidity.readthedocs.io/en/develop/security-considerations.html#tx-origin
--------------------

@ -1,42 +1 @@
{
"error":null,
"issues":[
{
"address":567,
"contract":"Unknown",
"debug":"<DEBUG-DATA>",
"description":"This binary subtraction operation can result in integer overflow.\n",
"function":"sendeth(address,uint256)",
"max_gas_used":1053,
"min_gas_used":768,
"swc-id":"101",
"title":"Integer Overflow",
"type":"Warning"
},
{
"address":567,
"contract":"Unknown",
"debug":"<DEBUG-DATA>",
"description":"This binary subtraction operation can result in integer underflow.\n",
"function":"sendeth(address,uint256)",
"max_gas_used":1774,
"min_gas_used":1299,
"swc-id":"101",
"title":"Integer Underflow",
"type":"Warning"
},
{
"address":649,
"contract":"Unknown",
"debug":"<DEBUG-DATA>",
"description":"This binary subtraction operation can result in integer underflow.\n",
"function":"sendeth(address,uint256)",
"max_gas_used":1774,
"min_gas_used":1299,
"swc-id":"101",
"title":"Integer Underflow",
"type":"Warning"
}
],
"success":true
}
{"issues": [{"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-101", "swcTitle": "Integer Overflow and Underflow"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-101", "swcTitle": "Integer Overflow and Underflow"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-101", "swcTitle": "Integer Overflow and Underflow"}], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null}

@ -2,7 +2,7 @@
## Integer Overflow
- SWC ID: 101
- Type: Warning
- Severity: High
- Contract: Unknown
- Function name: `sendeth(address,uint256)`
- PC address: 567
@ -10,11 +10,12 @@
### Description
This binary subtraction operation can result in integer overflow.
The subtraction can overflow.
The binary subtraction operation can result in an integer overflow.
## Integer Underflow
- SWC ID: 101
- Type: Warning
- Severity: High
- Contract: Unknown
- Function name: `sendeth(address,uint256)`
- PC address: 567
@ -22,11 +23,12 @@ This binary subtraction operation can result in integer overflow.
### Description
This binary subtraction operation can result in integer underflow.
The subtraction can underflow.
The binary subtraction operation can result in an integer underflow.
## Integer Underflow
- SWC ID: 101
- Type: Warning
- Severity: High
- Contract: Unknown
- Function name: `sendeth(address,uint256)`
- PC address: 649
@ -34,4 +36,5 @@ This binary subtraction operation can result in integer underflow.
### Description
This binary subtraction operation can result in integer underflow.
The subtraction can underflow.
The binary subtraction operation can result in an integer underflow.

@ -1,33 +1,36 @@
==== Integer Overflow ====
SWC ID: 101
Type: Warning
Severity: High
Contract: Unknown
Function name: sendeth(address,uint256)
PC address: 567
Estimated Gas Usage: 768 - 1053
This binary subtraction operation can result in integer overflow.
The subtraction can overflow.
The binary subtraction operation can result in an integer overflow.
--------------------
==== Integer Underflow ====
SWC ID: 101
Type: Warning
Severity: High
Contract: Unknown
Function name: sendeth(address,uint256)
PC address: 567
Estimated Gas Usage: 1299 - 1774
This binary subtraction operation can result in integer underflow.
The subtraction can underflow.
The binary subtraction operation can result in an integer underflow.
--------------------
==== Integer Underflow ====
SWC ID: 101
Type: Warning
Severity: High
Contract: Unknown
Function name: sendeth(address,uint256)
PC address: 649
Estimated Gas Usage: 1299 - 1774
This binary subtraction operation can result in integer underflow.
The subtraction can underflow.
The binary subtraction operation can result in an integer underflow.
--------------------

@ -1,42 +1 @@
{
"error": null,
"issues": [
{
"address": 196,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable.",
"function": "callchecked()",
"max_gas_used": 1210,
"min_gas_used": 599,
"swc-id": "107",
"title": "External call",
"type": "Informational"
},
{
"address": 285,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable.",
"function": "callnotchecked()",
"max_gas_used": 1232,
"min_gas_used": 621,
"swc-id": "107",
"title": "External call",
"type": "Informational"
},
{
"address": 285,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.",
"function": "callnotchecked()",
"max_gas_used": 35950,
"min_gas_used": 1339,
"swc-id": "104",
"title": "Unchecked CALL return value",
"type": "Informational"
}
],
"success": true
}
{"issues": [{"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-107", "swcTitle": "Reentrancy"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-107", "swcTitle": "Reentrancy"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-104", "swcTitle": "Unchecked Call Return Value"}], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null}

@ -1,8 +1,8 @@
# Analysis results for test-filename.sol
## External call
## External Call To Fixed Address
- SWC ID: 107
- Type: Informational
- Severity: Low
- Contract: Unknown
- Function name: `callchecked()`
- PC address: 196
@ -10,11 +10,12 @@
### Description
The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable.
The contract executes an external message call.
An external function call to a fixed contract address is executed. Make sure that the callee contract has been reviewed carefully.
## External call
## External Call To Fixed Address
- SWC ID: 107
- Type: Informational
- Severity: Low
- Contract: Unknown
- Function name: `callnotchecked()`
- PC address: 285
@ -22,11 +23,12 @@ The contract executes a function call to an external address. Verify that the co
### Description
The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable.
The contract executes an external message call.
An external function call to a fixed contract address is executed. Make sure that the callee contract has been reviewed carefully.
## Unchecked CALL return value
## Unchecked Call Return Value
- SWC ID: 104
- Type: Informational
- Severity: Low
- Contract: Unknown
- Function name: `callnotchecked()`
- PC address: 285
@ -34,4 +36,5 @@ The contract executes a function call to an external address. Verify that the co
### Description
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
The return value of a message call is not checked.
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states.

@ -1,30 +1,33 @@
==== External call ====
==== External Call To Fixed Address ====
SWC ID: 107
Type: Informational
Severity: Low
Contract: Unknown
Function name: callchecked()
PC address: 196
Estimated Gas Usage: 599 - 1210
The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable.
The contract executes an external message call.
An external function call to a fixed contract address is executed. Make sure that the callee contract has been reviewed carefully.
--------------------
==== External call ====
==== External Call To Fixed Address ====
SWC ID: 107
Type: Informational
Severity: Low
Contract: Unknown
Function name: callnotchecked()
PC address: 285
Estimated Gas Usage: 621 - 1232
The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable.
The contract executes an external message call.
An external function call to a fixed contract address is executed. Make sure that the callee contract has been reviewed carefully.
--------------------
==== Unchecked CALL return value ====
==== Unchecked Call Return Value ====
SWC ID: 104
Type: Informational
Severity: Low
Contract: Unknown
Function name: callnotchecked()
PC address: 285
Estimated Gas Usage: 1339 - 35950
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
The return value of a message call is not checked.
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states.
--------------------

@ -1,18 +1 @@
{
"error": null,
"issues": [
{
"address": 146,
"contract": "Unknown",
"debug": "<DEBUG-DATA>",
"description": "Anyone can kill this contract and withdraw its balance to their own account.",
"function": "kill(address)",
"max_gas_used": 263,
"min_gas_used": 168,
"swc-id": "106",
"title": "Unchecked SUICIDE",
"type": "Warning"
}
],
"success": true
}
{"issues": [{"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-106", "swcTitle": "Unprotected SELFDESTRUCT Instruction"}], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null}

@ -1,8 +1,8 @@
# Analysis results for test-filename.sol
## Unchecked SUICIDE
## Unprotected Selfdestruct
- SWC ID: 106
- Type: Warning
- Severity: High
- Contract: Unknown
- Function name: `kill(address)`
- PC address: 146
@ -10,4 +10,5 @@
### Description
Anyone can kill this contract and withdraw its balance to their own account.
The contract can be killed by anyone.
Arbitrary senders can kill this contract and withdraw its balance to their own account.

@ -1,10 +1,11 @@
==== Unchecked SUICIDE ====
==== Unprotected Selfdestruct ====
SWC ID: 106
Type: Warning
Severity: High
Contract: Unknown
Function name: kill(address)
PC address: 146
Estimated Gas Usage: 168 - 263
Anyone can kill this contract and withdraw its balance to their own account.
The contract can be killed by anyone.
Arbitrary senders can kill this contract and withdraw its balance to their own account.
--------------------

@ -1,42 +1 @@
{
"error":null,
"issues":[
{
"address":567,
"contract":"Unknown",
"debug":"<DEBUG-DATA>",
"description":"This binary subtraction operation can result in integer overflow.\n",
"function":"sendeth(address,uint256)",
"max_gas_used":1053,
"min_gas_used":768,
"swc-id":"101",
"title":"Integer Overflow",
"type":"Warning"
},
{
"address":567,
"contract":"Unknown",
"debug":"<DEBUG-DATA>",
"description":"This binary subtraction operation can result in integer underflow.\n",
"function":"sendeth(address,uint256)",
"max_gas_used":1774,
"min_gas_used":1299,
"swc-id":"101",
"title":"Integer Underflow",
"type":"Warning"
},
{
"address":649,
"contract":"Unknown",
"debug":"<DEBUG-DATA>",
"description":"This binary subtraction operation can result in integer underflow.\n",
"function":"sendeth(address,uint256)",
"max_gas_used":1774,
"min_gas_used":1299,
"swc-id":"101",
"title":"Integer Underflow",
"type":"Warning"
}
],
"success":true
}
{"issues": [{"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-101", "swcTitle": "Integer Overflow and Underflow"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-101", "swcTitle": "Integer Overflow and Underflow"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-101", "swcTitle": "Integer Overflow and Underflow"}], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null}

@ -2,7 +2,7 @@
## Integer Overflow
- SWC ID: 101
- Type: Warning
- Severity: High
- Contract: Unknown
- Function name: `sendeth(address,uint256)`
- PC address: 567
@ -10,11 +10,12 @@
### Description
This binary subtraction operation can result in integer overflow.
The subtraction can overflow.
The binary subtraction operation can result in an integer overflow.
## Integer Underflow
- SWC ID: 101
- Type: Warning
- Severity: High
- Contract: Unknown
- Function name: `sendeth(address,uint256)`
- PC address: 567
@ -22,11 +23,12 @@ This binary subtraction operation can result in integer overflow.
### Description
This binary subtraction operation can result in integer underflow.
The subtraction can underflow.
The binary subtraction operation can result in an integer underflow.
## Integer Underflow
- SWC ID: 101
- Type: Warning
- Severity: High
- Contract: Unknown
- Function name: `sendeth(address,uint256)`
- PC address: 649
@ -34,4 +36,5 @@ This binary subtraction operation can result in integer underflow.
### Description
This binary subtraction operation can result in integer underflow.
The subtraction can underflow.
The binary subtraction operation can result in an integer underflow.

@ -1,33 +1,36 @@
==== Integer Overflow ====
SWC ID: 101
Type: Warning
Severity: High
Contract: Unknown
Function name: sendeth(address,uint256)
PC address: 567
Estimated Gas Usage: 768 - 1053
This binary subtraction operation can result in integer overflow.
The subtraction can overflow.
The binary subtraction operation can result in an integer overflow.
--------------------
==== Integer Underflow ====
SWC ID: 101
Type: Warning
Severity: High
Contract: Unknown
Function name: sendeth(address,uint256)
PC address: 567
Estimated Gas Usage: 1299 - 1774
This binary subtraction operation can result in integer underflow.
The subtraction can underflow.
The binary subtraction operation can result in an integer underflow.
--------------------
==== Integer Underflow ====
SWC ID: 101
Type: Warning
Severity: High
Contract: Unknown
Function name: sendeth(address,uint256)
PC address: 649
Estimated Gas Usage: 1299 - 1774
This binary subtraction operation can result in integer underflow.
The subtraction can underflow.
The binary subtraction operation can result in an integer underflow.
--------------------

Loading…
Cancel
Save