mirror of https://github.com/ConsenSys/mythril
parent
0299e12cce
commit
a488f06457
@ -1,102 +1 @@ |
||||
{ |
||||
"error": null, |
||||
"issues": [ |
||||
{ |
||||
"address": 661, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable.", |
||||
"function": "thisisfine()", |
||||
"max_gas_used": 1254, |
||||
"min_gas_used": 643, |
||||
"swc-id": "107", |
||||
"title": "External call", |
||||
"type": "Informational" |
||||
}, |
||||
{ |
||||
"address": 661, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.", |
||||
"function": "thisisfine()", |
||||
"max_gas_used": 35972, |
||||
"min_gas_used": 1361, |
||||
"swc-id": "104", |
||||
"title": "Unchecked CALL return value", |
||||
"type": "Informational" |
||||
}, |
||||
{ |
||||
"address": 779, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable.", |
||||
"function": "callstoredaddress()", |
||||
"max_gas_used": 1298, |
||||
"min_gas_used": 687, |
||||
"swc-id": "107", |
||||
"title": "External call", |
||||
"type": "Informational" |
||||
}, |
||||
{ |
||||
"address": 779, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.", |
||||
"function": "callstoredaddress()", |
||||
"max_gas_used": 36016, |
||||
"min_gas_used": 1405, |
||||
"swc-id": "104", |
||||
"title": "Unchecked CALL return value", |
||||
"type": "Informational" |
||||
}, |
||||
{ |
||||
"address": 858, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable.", |
||||
"function": "reentrancy()", |
||||
"max_gas_used": 1320, |
||||
"min_gas_used": 709, |
||||
"swc-id": "107", |
||||
"title": "External call", |
||||
"type": "Informational" |
||||
}, |
||||
{ |
||||
"address": 858, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.", |
||||
"function": "reentrancy()", |
||||
"max_gas_used": 61052, |
||||
"min_gas_used": 6441, |
||||
"swc-id": "104", |
||||
"title": "Unchecked CALL return value", |
||||
"type": "Informational" |
||||
}, |
||||
{ |
||||
"address": 912, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "The contract executes a function call with high gas to a user-supplied address. Note that the callee can contain arbitrary code and may re-enter any function in this contract. Review the business logic carefully to prevent unanticipated effects on the contract state.", |
||||
"function": "calluseraddress(address)", |
||||
"max_gas_used": 616, |
||||
"min_gas_used": 335, |
||||
"swc-id": "107", |
||||
"title": "External call to user-supplied address", |
||||
"type": "Warning" |
||||
}, |
||||
{ |
||||
"address": 912, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.", |
||||
"function": "calluseraddress(address)", |
||||
"max_gas_used": 35336, |
||||
"min_gas_used": 1055, |
||||
"swc-id": "104", |
||||
"title": "Unchecked CALL return value", |
||||
"type": "Informational" |
||||
} |
||||
], |
||||
"success": true |
||||
} |
||||
{"issues": [{"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-107", "swcTitle": "Reentrancy"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-107", "swcTitle": "Reentrancy"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-107", "swcTitle": "Reentrancy"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-107", "swcTitle": "Reentrancy"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-104", "swcTitle": "Unchecked Call Return Value"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-104", "swcTitle": "Unchecked Call Return Value"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-104", "swcTitle": "Unchecked Call Return Value"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-104", "swcTitle": "Unchecked Call Return Value"}], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null} |
@ -1,80 +1,88 @@ |
||||
==== External call ==== |
||||
==== External Call To Fixed Address ==== |
||||
SWC ID: 107 |
||||
Type: Informational |
||||
Severity: Low |
||||
Contract: Unknown |
||||
Function name: thisisfine() |
||||
PC address: 661 |
||||
Estimated Gas Usage: 643 - 1254 |
||||
The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable. |
||||
The contract executes an external message call. |
||||
An external function call to a fixed contract address is executed. Make sure that the callee contract has been reviewed carefully. |
||||
-------------------- |
||||
|
||||
==== Unchecked CALL return value ==== |
||||
==== Unchecked Call Return Value ==== |
||||
SWC ID: 104 |
||||
Type: Informational |
||||
Severity: Low |
||||
Contract: Unknown |
||||
Function name: thisisfine() |
||||
PC address: 661 |
||||
Estimated Gas Usage: 1361 - 35972 |
||||
The return value of an external call is not checked. Note that execution continue even if the called contract throws. |
||||
The return value of a message call is not checked. |
||||
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states. |
||||
-------------------- |
||||
|
||||
==== External call ==== |
||||
==== External Call To Fixed Address ==== |
||||
SWC ID: 107 |
||||
Type: Informational |
||||
Severity: Low |
||||
Contract: Unknown |
||||
Function name: callstoredaddress() |
||||
PC address: 779 |
||||
Estimated Gas Usage: 687 - 1298 |
||||
The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable. |
||||
The contract executes an external message call. |
||||
An external function call to a fixed contract address is executed. Make sure that the callee contract has been reviewed carefully. |
||||
-------------------- |
||||
|
||||
==== Unchecked CALL return value ==== |
||||
==== Unchecked Call Return Value ==== |
||||
SWC ID: 104 |
||||
Type: Informational |
||||
Severity: Low |
||||
Contract: Unknown |
||||
Function name: callstoredaddress() |
||||
PC address: 779 |
||||
Estimated Gas Usage: 1405 - 36016 |
||||
The return value of an external call is not checked. Note that execution continue even if the called contract throws. |
||||
The return value of a message call is not checked. |
||||
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states. |
||||
-------------------- |
||||
|
||||
==== External call ==== |
||||
==== External Call To Fixed Address ==== |
||||
SWC ID: 107 |
||||
Type: Informational |
||||
Severity: Low |
||||
Contract: Unknown |
||||
Function name: reentrancy() |
||||
PC address: 858 |
||||
Estimated Gas Usage: 709 - 1320 |
||||
The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable. |
||||
The contract executes an external message call. |
||||
An external function call to a fixed contract address is executed. Make sure that the callee contract has been reviewed carefully. |
||||
-------------------- |
||||
|
||||
==== Unchecked CALL return value ==== |
||||
==== Unchecked Call Return Value ==== |
||||
SWC ID: 104 |
||||
Type: Informational |
||||
Severity: Low |
||||
Contract: Unknown |
||||
Function name: reentrancy() |
||||
PC address: 858 |
||||
Estimated Gas Usage: 6441 - 61052 |
||||
The return value of an external call is not checked. Note that execution continue even if the called contract throws. |
||||
The return value of a message call is not checked. |
||||
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states. |
||||
-------------------- |
||||
|
||||
==== External call to user-supplied address ==== |
||||
==== External Call To User-Supplied Address ==== |
||||
SWC ID: 107 |
||||
Type: Warning |
||||
Severity: Medium |
||||
Contract: Unknown |
||||
Function name: calluseraddress(address) |
||||
PC address: 912 |
||||
Estimated Gas Usage: 335 - 616 |
||||
The contract executes a function call with high gas to a user-supplied address. Note that the callee can contain arbitrary code and may re-enter any function in this contract. Review the business logic carefully to prevent unanticipated effects on the contract state. |
||||
A call to a user-supplied address is executed. |
||||
The callee address of an external message call can be set by the caller. Note that the callee can contain arbitrary code and may re-enter any function in this contract. Review the business logic carefully to prevent averse effects on thecontract state. |
||||
-------------------- |
||||
|
||||
==== Unchecked CALL return value ==== |
||||
==== Unchecked Call Return Value ==== |
||||
SWC ID: 104 |
||||
Type: Informational |
||||
Severity: Low |
||||
Contract: Unknown |
||||
Function name: calluseraddress(address) |
||||
PC address: 912 |
||||
Estimated Gas Usage: 1055 - 35336 |
||||
The return value of an external call is not checked. Note that execution continue even if the called contract throws. |
||||
The return value of a message call is not checked. |
||||
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states. |
||||
-------------------- |
||||
|
||||
|
@ -1,5 +1 @@ |
||||
{ |
||||
"error": null, |
||||
"issues": [], |
||||
"success": true |
||||
} |
||||
{"issues": [], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null} |
@ -1,54 +1 @@ |
||||
{ |
||||
"error": null, |
||||
"issues": [ |
||||
{ |
||||
"address": 446, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.", |
||||
"function": "assert3(uint256)", |
||||
"max_gas_used": 301, |
||||
"min_gas_used": 206, |
||||
"swc-id": "110", |
||||
"title": "Exception state", |
||||
"type": "Informational" |
||||
}, |
||||
{ |
||||
"address": 484, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.", |
||||
"function": "arrayaccess(uint256)", |
||||
"max_gas_used": 351, |
||||
"min_gas_used": 256, |
||||
"swc-id": "110", |
||||
"title": "Exception state", |
||||
"type": "Informational" |
||||
}, |
||||
{ |
||||
"address": 506, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.", |
||||
"function": "divisionby0(uint256)", |
||||
"max_gas_used": 367, |
||||
"min_gas_used": 272, |
||||
"swc-id": "110", |
||||
"title": "Exception state", |
||||
"type": "Informational" |
||||
}, |
||||
{ |
||||
"address": 531, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.", |
||||
"function": "assert1()", |
||||
"max_gas_used": 363, |
||||
"min_gas_used": 268, |
||||
"swc-id": "110", |
||||
"title": "Exception state", |
||||
"type": "Informational" |
||||
} |
||||
], |
||||
"success": true |
||||
} |
||||
{"issues": [{"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-110", "swcTitle": "Assert Violation"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-110", "swcTitle": "Assert Violation"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-110", "swcTitle": "Assert Violation"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-110", "swcTitle": "Assert Violation"}], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null} |
@ -1,40 +1,44 @@ |
||||
==== Exception state ==== |
||||
==== Exception State ==== |
||||
SWC ID: 110 |
||||
Type: Informational |
||||
Severity: Low |
||||
Contract: Unknown |
||||
Function name: assert3(uint256) |
||||
PC address: 446 |
||||
Estimated Gas Usage: 206 - 301 |
||||
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking. |
||||
A reachable exception has been detected. |
||||
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking. |
||||
-------------------- |
||||
|
||||
==== Exception state ==== |
||||
==== Exception State ==== |
||||
SWC ID: 110 |
||||
Type: Informational |
||||
Severity: Low |
||||
Contract: Unknown |
||||
Function name: arrayaccess(uint256) |
||||
PC address: 484 |
||||
Estimated Gas Usage: 256 - 351 |
||||
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking. |
||||
A reachable exception has been detected. |
||||
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking. |
||||
-------------------- |
||||
|
||||
==== Exception state ==== |
||||
==== Exception State ==== |
||||
SWC ID: 110 |
||||
Type: Informational |
||||
Severity: Low |
||||
Contract: Unknown |
||||
Function name: divisionby0(uint256) |
||||
PC address: 506 |
||||
Estimated Gas Usage: 272 - 367 |
||||
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking. |
||||
A reachable exception has been detected. |
||||
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking. |
||||
-------------------- |
||||
|
||||
==== Exception state ==== |
||||
==== Exception State ==== |
||||
SWC ID: 110 |
||||
Type: Informational |
||||
Severity: Low |
||||
Contract: Unknown |
||||
Function name: assert1() |
||||
PC address: 531 |
||||
Estimated Gas Usage: 268 - 363 |
||||
A reachable exception (opcode 0xfe) has been detected. This can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking. |
||||
A reachable exception has been detected. |
||||
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking. |
||||
-------------------- |
||||
|
||||
|
@ -1,66 +1 @@ |
||||
{ |
||||
"error": null, |
||||
"issues": [ |
||||
{ |
||||
"address": 618, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.", |
||||
"function": "_function_0x141f32ff", |
||||
"max_gas_used": 35865, |
||||
"min_gas_used": 1113, |
||||
"swc-id": "104", |
||||
"title": "Unchecked CALL return value", |
||||
"type": "Informational" |
||||
}, |
||||
{ |
||||
"address": 618, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "The function `_function_0x141f32ff` uses callcode. Callcode does not persist sender or value over the call. Use delegatecall instead.", |
||||
"function": "_function_0x141f32ff", |
||||
"max_gas_used": 1141, |
||||
"min_gas_used": 389, |
||||
"swc-id": "111", |
||||
"title": "Use of callcode", |
||||
"type": "Warning" |
||||
}, |
||||
{ |
||||
"address": 849, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.", |
||||
"function": "_function_0x9b58bc26", |
||||
"max_gas_used": 35922, |
||||
"min_gas_used": 1170, |
||||
"swc-id": "104", |
||||
"title": "Unchecked CALL return value", |
||||
"type": "Informational" |
||||
}, |
||||
{ |
||||
"address": 1038, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "The contract executes a function call with high gas to a user-supplied address. Note that the callee can contain arbitrary code and may re-enter any function in this contract. Review the business logic carefully to prevent unanticipated effects on the contract state.", |
||||
"function": "_function_0xeea4c864", |
||||
"max_gas_used": 1223, |
||||
"min_gas_used": 471, |
||||
"swc-id": "107", |
||||
"title": "External call to user-supplied address", |
||||
"type": "Warning" |
||||
}, |
||||
{ |
||||
"address": 1038, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.", |
||||
"function": "_function_0xeea4c864", |
||||
"max_gas_used": 35947, |
||||
"min_gas_used": 1195, |
||||
"swc-id": "104", |
||||
"title": "Unchecked CALL return value", |
||||
"type": "Informational" |
||||
} |
||||
], |
||||
"success": true |
||||
} |
||||
{"issues": [{"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-111", "swcTitle": "Use of Deprecated Solidity Functions"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-107", "swcTitle": "Reentrancy"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-104", "swcTitle": "Unchecked Call Return Value"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-104", "swcTitle": "Unchecked Call Return Value"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-104", "swcTitle": "Unchecked Call Return Value"}], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null} |
@ -1,50 +1,55 @@ |
||||
==== Unchecked CALL return value ==== |
||||
==== Unchecked Call Return Value ==== |
||||
SWC ID: 104 |
||||
Type: Informational |
||||
Severity: Low |
||||
Contract: Unknown |
||||
Function name: _function_0x141f32ff |
||||
PC address: 618 |
||||
Estimated Gas Usage: 1113 - 35865 |
||||
The return value of an external call is not checked. Note that execution continue even if the called contract throws. |
||||
The return value of a message call is not checked. |
||||
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states. |
||||
-------------------- |
||||
|
||||
==== Use of callcode ==== |
||||
==== Use of Callcode ==== |
||||
SWC ID: 111 |
||||
Type: Warning |
||||
Severity: Medium |
||||
Contract: Unknown |
||||
Function name: _function_0x141f32ff |
||||
PC address: 618 |
||||
Estimated Gas Usage: 389 - 1141 |
||||
The function `_function_0x141f32ff` uses callcode. Callcode does not persist sender or value over the call. Use delegatecall instead. |
||||
Use of callcode is deprecated. |
||||
The function `_function_0x141f32ff` uses the callcode function. Callcode does not persist sender or value over the call. Use delegatecall instead. |
||||
-------------------- |
||||
|
||||
==== Unchecked CALL return value ==== |
||||
==== Unchecked Call Return Value ==== |
||||
SWC ID: 104 |
||||
Type: Informational |
||||
Severity: Low |
||||
Contract: Unknown |
||||
Function name: _function_0x9b58bc26 |
||||
PC address: 849 |
||||
Estimated Gas Usage: 1170 - 35922 |
||||
The return value of an external call is not checked. Note that execution continue even if the called contract throws. |
||||
The return value of a message call is not checked. |
||||
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states. |
||||
-------------------- |
||||
|
||||
==== External call to user-supplied address ==== |
||||
==== External Call To User-Supplied Address ==== |
||||
SWC ID: 107 |
||||
Type: Warning |
||||
Severity: Medium |
||||
Contract: Unknown |
||||
Function name: _function_0xeea4c864 |
||||
PC address: 1038 |
||||
Estimated Gas Usage: 471 - 1223 |
||||
The contract executes a function call with high gas to a user-supplied address. Note that the callee can contain arbitrary code and may re-enter any function in this contract. Review the business logic carefully to prevent unanticipated effects on the contract state. |
||||
A call to a user-supplied address is executed. |
||||
The callee address of an external message call can be set by the caller. Note that the callee can contain arbitrary code and may re-enter any function in this contract. Review the business logic carefully to prevent averse effects on thecontract state. |
||||
-------------------- |
||||
|
||||
==== Unchecked CALL return value ==== |
||||
==== Unchecked Call Return Value ==== |
||||
SWC ID: 104 |
||||
Type: Informational |
||||
Severity: Low |
||||
Contract: Unknown |
||||
Function name: _function_0xeea4c864 |
||||
PC address: 1038 |
||||
Estimated Gas Usage: 1195 - 35947 |
||||
The return value of an external call is not checked. Note that execution continue even if the called contract throws. |
||||
The return value of a message call is not checked. |
||||
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states. |
||||
-------------------- |
||||
|
||||
|
@ -1,5 +1 @@ |
||||
{ |
||||
"error": null, |
||||
"issues": [], |
||||
"success": true |
||||
} |
||||
{"issues": [], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null} |
@ -1,18 +1 @@ |
||||
{ |
||||
"error": null, |
||||
"issues": [ |
||||
{ |
||||
"address": 142, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "Arbitrary senders other than the contract creator can withdraw ETH from the contract account without previously having sent an equivalent amount of ETH to it. This is likely to be a vulnerability.", |
||||
"function": "transfer()", |
||||
"max_gas_used": 467, |
||||
"min_gas_used": 186, |
||||
"swc-id": "105", |
||||
"title": "Ether thief", |
||||
"type": "Warning" |
||||
} |
||||
], |
||||
"success": true |
||||
} |
||||
{"issues": [{"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-105", "swcTitle": "Unprotected Ether Withdrawal"}], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null} |
@ -1,10 +1,11 @@ |
||||
==== Ether thief ==== |
||||
==== Unprotected Ether Withdrawal ==== |
||||
SWC ID: 105 |
||||
Type: Warning |
||||
Severity: High |
||||
Contract: Unknown |
||||
Function name: transfer() |
||||
PC address: 142 |
||||
Estimated Gas Usage: 186 - 467 |
||||
Anyone can withdraw ETH from the contract account. |
||||
Arbitrary senders other than the contract creator can withdraw ETH from the contract account without previously having sent an equivalent amount of ETH to it. This is likely to be a vulnerability. |
||||
-------------------- |
||||
|
||||
|
@ -1,5 +1 @@ |
||||
{ |
||||
"error": null, |
||||
"issues": [], |
||||
"success": true |
||||
} |
||||
{"issues": [], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null} |
@ -1,18 +1 @@ |
||||
{ |
||||
"error": null, |
||||
"issues": [ |
||||
{ |
||||
"address": 317, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "The function `transferOwnership(address)` retrieves the transaction origin (tx.origin) using the ORIGIN opcode. Use msg.sender instead.\nSee also: https://solidity.readthedocs.io/en/develop/security-considerations.html#tx-origin", |
||||
"function": "transferOwnership(address)", |
||||
"max_gas_used": 1051, |
||||
"min_gas_used": 626, |
||||
"swc-id": "111", |
||||
"title": "Use of tx.origin", |
||||
"type": "Warning" |
||||
} |
||||
], |
||||
"success": true |
||||
} |
||||
{"issues": [{"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-111", "swcTitle": "Use of Deprecated Solidity Functions"}], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null} |
@ -1,42 +1 @@ |
||||
{ |
||||
"error":null, |
||||
"issues":[ |
||||
{ |
||||
"address":567, |
||||
"contract":"Unknown", |
||||
"debug":"<DEBUG-DATA>", |
||||
"description":"This binary subtraction operation can result in integer overflow.\n", |
||||
"function":"sendeth(address,uint256)", |
||||
"max_gas_used":1053, |
||||
"min_gas_used":768, |
||||
"swc-id":"101", |
||||
"title":"Integer Overflow", |
||||
"type":"Warning" |
||||
}, |
||||
{ |
||||
"address":567, |
||||
"contract":"Unknown", |
||||
"debug":"<DEBUG-DATA>", |
||||
"description":"This binary subtraction operation can result in integer underflow.\n", |
||||
"function":"sendeth(address,uint256)", |
||||
"max_gas_used":1774, |
||||
"min_gas_used":1299, |
||||
"swc-id":"101", |
||||
"title":"Integer Underflow", |
||||
"type":"Warning" |
||||
}, |
||||
{ |
||||
"address":649, |
||||
"contract":"Unknown", |
||||
"debug":"<DEBUG-DATA>", |
||||
"description":"This binary subtraction operation can result in integer underflow.\n", |
||||
"function":"sendeth(address,uint256)", |
||||
"max_gas_used":1774, |
||||
"min_gas_used":1299, |
||||
"swc-id":"101", |
||||
"title":"Integer Underflow", |
||||
"type":"Warning" |
||||
} |
||||
], |
||||
"success":true |
||||
} |
||||
{"issues": [{"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-101", "swcTitle": "Integer Overflow and Underflow"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-101", "swcTitle": "Integer Overflow and Underflow"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-101", "swcTitle": "Integer Overflow and Underflow"}], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null} |
@ -1,33 +1,36 @@ |
||||
==== Integer Overflow ==== |
||||
SWC ID: 101 |
||||
Type: Warning |
||||
Severity: High |
||||
Contract: Unknown |
||||
Function name: sendeth(address,uint256) |
||||
PC address: 567 |
||||
Estimated Gas Usage: 768 - 1053 |
||||
This binary subtraction operation can result in integer overflow. |
||||
The subtraction can overflow. |
||||
The binary subtraction operation can result in an integer overflow. |
||||
|
||||
-------------------- |
||||
|
||||
==== Integer Underflow ==== |
||||
SWC ID: 101 |
||||
Type: Warning |
||||
Severity: High |
||||
Contract: Unknown |
||||
Function name: sendeth(address,uint256) |
||||
PC address: 567 |
||||
Estimated Gas Usage: 1299 - 1774 |
||||
This binary subtraction operation can result in integer underflow. |
||||
The subtraction can underflow. |
||||
The binary subtraction operation can result in an integer underflow. |
||||
|
||||
-------------------- |
||||
|
||||
==== Integer Underflow ==== |
||||
SWC ID: 101 |
||||
Type: Warning |
||||
Severity: High |
||||
Contract: Unknown |
||||
Function name: sendeth(address,uint256) |
||||
PC address: 649 |
||||
Estimated Gas Usage: 1299 - 1774 |
||||
This binary subtraction operation can result in integer underflow. |
||||
The subtraction can underflow. |
||||
The binary subtraction operation can result in an integer underflow. |
||||
|
||||
-------------------- |
||||
|
||||
|
@ -1,42 +1 @@ |
||||
{ |
||||
"error": null, |
||||
"issues": [ |
||||
{ |
||||
"address": 196, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable.", |
||||
"function": "callchecked()", |
||||
"max_gas_used": 1210, |
||||
"min_gas_used": 599, |
||||
"swc-id": "107", |
||||
"title": "External call", |
||||
"type": "Informational" |
||||
}, |
||||
{ |
||||
"address": 285, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable.", |
||||
"function": "callnotchecked()", |
||||
"max_gas_used": 1232, |
||||
"min_gas_used": 621, |
||||
"swc-id": "107", |
||||
"title": "External call", |
||||
"type": "Informational" |
||||
}, |
||||
{ |
||||
"address": 285, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.", |
||||
"function": "callnotchecked()", |
||||
"max_gas_used": 35950, |
||||
"min_gas_used": 1339, |
||||
"swc-id": "104", |
||||
"title": "Unchecked CALL return value", |
||||
"type": "Informational" |
||||
} |
||||
], |
||||
"success": true |
||||
} |
||||
{"issues": [{"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-107", "swcTitle": "Reentrancy"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-107", "swcTitle": "Reentrancy"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-104", "swcTitle": "Unchecked Call Return Value"}], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null} |
@ -1,30 +1,33 @@ |
||||
==== External call ==== |
||||
==== External Call To Fixed Address ==== |
||||
SWC ID: 107 |
||||
Type: Informational |
||||
Severity: Low |
||||
Contract: Unknown |
||||
Function name: callchecked() |
||||
PC address: 196 |
||||
Estimated Gas Usage: 599 - 1210 |
||||
The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable. |
||||
The contract executes an external message call. |
||||
An external function call to a fixed contract address is executed. Make sure that the callee contract has been reviewed carefully. |
||||
-------------------- |
||||
|
||||
==== External call ==== |
||||
==== External Call To Fixed Address ==== |
||||
SWC ID: 107 |
||||
Type: Informational |
||||
Severity: Low |
||||
Contract: Unknown |
||||
Function name: callnotchecked() |
||||
PC address: 285 |
||||
Estimated Gas Usage: 621 - 1232 |
||||
The contract executes a function call to an external address. Verify that the code at this address is trusted and immutable. |
||||
The contract executes an external message call. |
||||
An external function call to a fixed contract address is executed. Make sure that the callee contract has been reviewed carefully. |
||||
-------------------- |
||||
|
||||
==== Unchecked CALL return value ==== |
||||
==== Unchecked Call Return Value ==== |
||||
SWC ID: 104 |
||||
Type: Informational |
||||
Severity: Low |
||||
Contract: Unknown |
||||
Function name: callnotchecked() |
||||
PC address: 285 |
||||
Estimated Gas Usage: 1339 - 35950 |
||||
The return value of an external call is not checked. Note that execution continue even if the called contract throws. |
||||
The return value of a message call is not checked. |
||||
External calls return a boolean value. If the callee contract halts with an exception, 'false' is returned and execution continues in the caller. It is usually recommended to wrap external calls into a require statement to prevent unexpected states. |
||||
-------------------- |
||||
|
||||
|
@ -1,18 +1 @@ |
||||
{ |
||||
"error": null, |
||||
"issues": [ |
||||
{ |
||||
"address": 146, |
||||
"contract": "Unknown", |
||||
"debug": "<DEBUG-DATA>", |
||||
"description": "Anyone can kill this contract and withdraw its balance to their own account.", |
||||
"function": "kill(address)", |
||||
"max_gas_used": 263, |
||||
"min_gas_used": 168, |
||||
"swc-id": "106", |
||||
"title": "Unchecked SUICIDE", |
||||
"type": "Warning" |
||||
} |
||||
], |
||||
"success": true |
||||
} |
||||
{"issues": [{"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-106", "swcTitle": "Unprotected SELFDESTRUCT Instruction"}], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null} |
@ -1,10 +1,11 @@ |
||||
==== Unchecked SUICIDE ==== |
||||
==== Unprotected Selfdestruct ==== |
||||
SWC ID: 106 |
||||
Type: Warning |
||||
Severity: High |
||||
Contract: Unknown |
||||
Function name: kill(address) |
||||
PC address: 146 |
||||
Estimated Gas Usage: 168 - 263 |
||||
Anyone can kill this contract and withdraw its balance to their own account. |
||||
The contract can be killed by anyone. |
||||
Arbitrary senders can kill this contract and withdraw its balance to their own account. |
||||
-------------------- |
||||
|
||||
|
@ -1,42 +1 @@ |
||||
{ |
||||
"error":null, |
||||
"issues":[ |
||||
{ |
||||
"address":567, |
||||
"contract":"Unknown", |
||||
"debug":"<DEBUG-DATA>", |
||||
"description":"This binary subtraction operation can result in integer overflow.\n", |
||||
"function":"sendeth(address,uint256)", |
||||
"max_gas_used":1053, |
||||
"min_gas_used":768, |
||||
"swc-id":"101", |
||||
"title":"Integer Overflow", |
||||
"type":"Warning" |
||||
}, |
||||
{ |
||||
"address":567, |
||||
"contract":"Unknown", |
||||
"debug":"<DEBUG-DATA>", |
||||
"description":"This binary subtraction operation can result in integer underflow.\n", |
||||
"function":"sendeth(address,uint256)", |
||||
"max_gas_used":1774, |
||||
"min_gas_used":1299, |
||||
"swc-id":"101", |
||||
"title":"Integer Underflow", |
||||
"type":"Warning" |
||||
}, |
||||
{ |
||||
"address":649, |
||||
"contract":"Unknown", |
||||
"debug":"<DEBUG-DATA>", |
||||
"description":"This binary subtraction operation can result in integer underflow.\n", |
||||
"function":"sendeth(address,uint256)", |
||||
"max_gas_used":1774, |
||||
"min_gas_used":1299, |
||||
"swc-id":"101", |
||||
"title":"Integer Underflow", |
||||
"type":"Warning" |
||||
} |
||||
], |
||||
"success":true |
||||
} |
||||
{"issues": [{"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-101", "swcTitle": "Integer Overflow and Underflow"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-101", "swcTitle": "Integer Overflow and Underflow"}, {"debug": "<DEBUG-DATA>", "extra": "", "locations": [{"sourceMap": null}], "swcID": "SWC-101", "swcTitle": "Integer Overflow and Underflow"}], "meta": null, "sourceFormat": null, "sourceList": [], "sourceType": null} |
@ -1,33 +1,36 @@ |
||||
==== Integer Overflow ==== |
||||
SWC ID: 101 |
||||
Type: Warning |
||||
Severity: High |
||||
Contract: Unknown |
||||
Function name: sendeth(address,uint256) |
||||
PC address: 567 |
||||
Estimated Gas Usage: 768 - 1053 |
||||
This binary subtraction operation can result in integer overflow. |
||||
The subtraction can overflow. |
||||
The binary subtraction operation can result in an integer overflow. |
||||
|
||||
-------------------- |
||||
|
||||
==== Integer Underflow ==== |
||||
SWC ID: 101 |
||||
Type: Warning |
||||
Severity: High |
||||
Contract: Unknown |
||||
Function name: sendeth(address,uint256) |
||||
PC address: 567 |
||||
Estimated Gas Usage: 1299 - 1774 |
||||
This binary subtraction operation can result in integer underflow. |
||||
The subtraction can underflow. |
||||
The binary subtraction operation can result in an integer underflow. |
||||
|
||||
-------------------- |
||||
|
||||
==== Integer Underflow ==== |
||||
SWC ID: 101 |
||||
Type: Warning |
||||
Severity: High |
||||
Contract: Unknown |
||||
Function name: sendeth(address,uint256) |
||||
PC address: 649 |
||||
Estimated Gas Usage: 1299 - 1774 |
||||
This binary subtraction operation can result in integer underflow. |
||||
The subtraction can underflow. |
||||
The binary subtraction operation can result in an integer underflow. |
||||
|
||||
-------------------- |
||||
|
||||
|
Loading…
Reference in new issue