mirror of https://github.com/ConsenSys/mythril
parent
4ccc0d70e8
commit
d41b6e2676
@ -1,126 +1 @@ |
|||||||
{ |
{"error": null, "issues": [{"address": 666, "contract": "Unknown", "debug": "<DEBUG-DATA>", "description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.", "function": "thisisfine()", "max_gas_used": 35963, "min_gas_used": 1352, "swc-id": "104", "title": "Unchecked CALL return value", "type": "Informational"}, {"address": 784, "contract": "Unknown", "debug": "<DEBUG-DATA>", "description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.", "function": "callstoredaddress()", "max_gas_used": 36007, "min_gas_used": 1396, "swc-id": "104", "title": "Unchecked CALL return value", "type": "Informational"}, {"address": 871, "contract": "Unknown", "debug": "<DEBUG-DATA>", "description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.", "function": "_function_0xe11f493e", "max_gas_used": 61043, "min_gas_used": 6432, "swc-id": "104", "title": "Unchecked CALL return value", "type": "Informational"}, {"address": 912, "contract": "Unknown", "debug": "<DEBUG-DATA>", "description": "This contract executes a message call to an address provided as a function argument. Generally, it is not recommended to call user-supplied addresses using Solidity's call() construct. Note that attackers might leverage reentrancy attacks to exploit race conditions or manipulate this contract's state.", "function": "calluseraddress(address)", "max_gas_used": 616, "min_gas_used": 335, "swc-id": "107", "title": "Message call to external contract", "type": "Warning"}, {"address": 918, "contract": "Unknown", "debug": "<DEBUG-DATA>", "description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.", "function": "calluseraddress(address)", "max_gas_used": 35327, "min_gas_used": 1046, "swc-id": "104", "title": "Unchecked CALL return value", "type": "Informational"}], "success": true} |
||||||
"error": null, |
|
||||||
"issues": [ |
|
||||||
{ |
|
||||||
"address": 661, |
|
||||||
"contract": "Unknown", |
|
||||||
"debug": "<DEBUG-DATA>", |
|
||||||
"description": "This contract executes a message call to to another contract. Make sure that the called contract is trusted and does not execute user-supplied code.", |
|
||||||
"function": "thisisfine()", |
|
||||||
"swc-id": "107", |
|
||||||
"min_gas_used": 643, |
|
||||||
"max_gas_used": 1254, |
|
||||||
"title": "Message call to external contract", |
|
||||||
"type": "Informational" |
|
||||||
}, |
|
||||||
{ |
|
||||||
"address": 666, |
|
||||||
"contract": "Unknown", |
|
||||||
"debug": "<DEBUG-DATA>", |
|
||||||
"description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.", |
|
||||||
"function": "thisisfine()", |
|
||||||
"swc-id": "104", |
|
||||||
"min_gas_used": 1352, |
|
||||||
"max_gas_used": 35963, |
|
||||||
"title": "Unchecked CALL return value", |
|
||||||
"type": "Informational" |
|
||||||
}, |
|
||||||
{ |
|
||||||
"address": 779, |
|
||||||
"contract": "Unknown", |
|
||||||
"debug": "<DEBUG-DATA>", |
|
||||||
"description": "This contract executes a message call to an address found at storage slot 1. This storage slot can be written to by calling the function `setstoredaddress(address)`. Generally, it is not recommended to call user-supplied addresses using Solidity's call() construct. Note that attackers might leverage reentrancy attacks to exploit race conditions or manipulate this contract's state.", |
|
||||||
"function": "callstoredaddress()", |
|
||||||
"swc-id": "107", |
|
||||||
"min_gas_used": 687, |
|
||||||
"max_gas_used": 1298, |
|
||||||
"title": "Message call to external contract", |
|
||||||
"type": "Warning" |
|
||||||
}, |
|
||||||
{ |
|
||||||
"address": 779, |
|
||||||
"contract": "Unknown", |
|
||||||
"debug": "<DEBUG-DATA>", |
|
||||||
"description": "Possible transaction order dependence vulnerability: The value or direction of the call statement is determined from a tainted storage location.", |
|
||||||
"function": "callstoredaddress()", |
|
||||||
"swc-id": "114", |
|
||||||
"min_gas_used": 687, |
|
||||||
"max_gas_used": 1298, |
|
||||||
"title": "Transaction order dependence", |
|
||||||
"type": "Warning" |
|
||||||
}, |
|
||||||
{ |
|
||||||
"address": 784, |
|
||||||
"contract": "Unknown", |
|
||||||
"debug": "<DEBUG-DATA>", |
|
||||||
"description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.", |
|
||||||
"function": "callstoredaddress()", |
|
||||||
"swc-id": "104", |
|
||||||
"min_gas_used": 1396, |
|
||||||
"max_gas_used": 36007, |
|
||||||
"title": "Unchecked CALL return value", |
|
||||||
"type": "Informational" |
|
||||||
}, |
|
||||||
{ |
|
||||||
"address": 858, |
|
||||||
"contract": "Unknown", |
|
||||||
"debug": "<DEBUG-DATA>", |
|
||||||
"description": "This contract executes a message call to to another contract. Make sure that the called contract is trusted and does not execute user-supplied code.", |
|
||||||
"function": "_function_0xe11f493e", |
|
||||||
"swc-id": "107", |
|
||||||
"min_gas_used": 709, |
|
||||||
"max_gas_used": 1320, |
|
||||||
"title": "Message call to external contract", |
|
||||||
"type": "Informational" |
|
||||||
}, |
|
||||||
{ |
|
||||||
"address": 869, |
|
||||||
"contract": "Unknown", |
|
||||||
"debug": "<DEBUG-DATA>", |
|
||||||
"description": "The contract account state is changed after an external call. Consider that the called contract could re-enter the function before this state change takes place. This can lead to business logic vulnerabilities.", |
|
||||||
"function": "_function_0xe11f493e", |
|
||||||
"swc-id": "107", |
|
||||||
"min_gas_used": 709, |
|
||||||
"max_gas_used": 1320, |
|
||||||
"title": "State change after external call", |
|
||||||
"type": "Warning" |
|
||||||
}, |
|
||||||
{ |
|
||||||
"address": 871, |
|
||||||
"contract": "Unknown", |
|
||||||
"debug": "<DEBUG-DATA>", |
|
||||||
"description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.", |
|
||||||
"function": "_function_0xe11f493e", |
|
||||||
"swc-id": "104", |
|
||||||
"min_gas_used": 6432, |
|
||||||
"max_gas_used": 61043, |
|
||||||
"title": "Unchecked CALL return value", |
|
||||||
"type": "Informational" |
|
||||||
}, |
|
||||||
{ |
|
||||||
"address": 912, |
|
||||||
"contract": "Unknown", |
|
||||||
"debug": "<DEBUG-DATA>", |
|
||||||
"description": "This contract executes a message call to an address provided as a function argument. Generally, it is not recommended to call user-supplied addresses using Solidity's call() construct. Note that attackers might leverage reentrancy attacks to exploit race conditions or manipulate this contract's state.", |
|
||||||
"function": "calluseraddress(address)", |
|
||||||
"swc-id": "107", |
|
||||||
"min_gas_used": 335, |
|
||||||
"max_gas_used": 616, |
|
||||||
"title": "Message call to external contract", |
|
||||||
"type": "Warning" |
|
||||||
}, |
|
||||||
{ |
|
||||||
"address": 918, |
|
||||||
"contract": "Unknown", |
|
||||||
"debug": "<DEBUG-DATA>", |
|
||||||
"description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.", |
|
||||||
"function": "calluseraddress(address)", |
|
||||||
"swc-id": "104", |
|
||||||
"min_gas_used": 1046, |
|
||||||
"max_gas_used": 35327, |
|
||||||
"title": "Unchecked CALL return value", |
|
||||||
"type": "Informational" |
|
||||||
} |
|
||||||
], |
|
||||||
"success": true |
|
||||||
} |
|
@ -1,30 +1 @@ |
|||||||
{ |
{"error": null, "issues": [], "success": true} |
||||||
"error": null, |
|
||||||
"issues": [ |
|
||||||
{ |
|
||||||
"address": 722, |
|
||||||
"contract": "Unknown", |
|
||||||
"debug": "<DEBUG-DATA>", |
|
||||||
"description": "Arbitrary senders other than the contract creator can withdraw ETH from the contract account without previously having sent an equivalent amount of ETH to it. This is likely to be a vulnerability.", |
|
||||||
"function": "withdrawfunds()", |
|
||||||
"max_gas_used": 1749, |
|
||||||
"min_gas_used": 1138, |
|
||||||
"swc-id": "105", |
|
||||||
"title": "Ether thief", |
|
||||||
"type": "Warning" |
|
||||||
}, |
|
||||||
{ |
|
||||||
"address": 883, |
|
||||||
"contract": "Unknown", |
|
||||||
"debug": "<DEBUG-DATA>", |
|
||||||
"description": "This binary add operation can result in integer overflow.\n", |
|
||||||
"function": "invest()", |
|
||||||
"max_gas_used": 1856, |
|
||||||
"min_gas_used": 1571, |
|
||||||
"swc-id": "101", |
|
||||||
"title": "Integer Overflow", |
|
||||||
"type": "Warning" |
|
||||||
} |
|
||||||
], |
|
||||||
"success": true |
|
||||||
} |
|
@ -1,25 +1,3 @@ |
|||||||
# Analysis results for test-filename.sol |
# Analysis results for None |
||||||
|
|
||||||
## Ether thief |
The analysis was completed successfully. No issues were detected. |
||||||
- SWC ID: 105 |
|
||||||
- Type: Warning |
|
||||||
- Contract: Unknown |
|
||||||
- Function name: `withdrawfunds()` |
|
||||||
- PC address: 722 |
|
||||||
- Estimated Gas Usage: 1138 - 1749 |
|
||||||
|
|
||||||
### Description |
|
||||||
|
|
||||||
Arbitrary senders other than the contract creator can withdraw ETH from the contract account without previously having sent an equivalent amount of ETH to it. This is likely to be a vulnerability. |
|
||||||
|
|
||||||
## Integer Overflow |
|
||||||
- SWC ID: 101 |
|
||||||
- Type: Warning |
|
||||||
- Contract: Unknown |
|
||||||
- Function name: `invest()` |
|
||||||
- PC address: 883 |
|
||||||
- Estimated Gas Usage: 1571 - 1856 |
|
||||||
|
|
||||||
### Description |
|
||||||
|
|
||||||
This binary add operation can result in integer overflow. |
|
||||||
|
@ -1,21 +1 @@ |
|||||||
==== Ether thief ==== |
The analysis was completed successfully. No issues were detected. |
||||||
SWC ID: 105 |
|
||||||
Type: Warning |
|
||||||
Contract: Unknown |
|
||||||
Function name: withdrawfunds() |
|
||||||
PC address: 722 |
|
||||||
Estimated Gas Usage: 1138 - 1749 |
|
||||||
Arbitrary senders other than the contract creator can withdraw ETH from the contract account without previously having sent an equivalent amount of ETH to it. This is likely to be a vulnerability. |
|
||||||
-------------------- |
|
||||||
|
|
||||||
==== Integer Overflow ==== |
|
||||||
SWC ID: 101 |
|
||||||
Type: Warning |
|
||||||
Contract: Unknown |
|
||||||
Function name: invest() |
|
||||||
PC address: 883 |
|
||||||
Estimated Gas Usage: 1571 - 1856 |
|
||||||
This binary add operation can result in integer overflow. |
|
||||||
|
|
||||||
-------------------- |
|
||||||
|
|
||||||
|
@ -1,42 +1 @@ |
|||||||
{ |
{"error": null, "issues": [{"address": 567, "contract": "Unknown", "debug": "<DEBUG-DATA>", "description": "The subtraction can result in an integer underflow.\n", "function": "sendeth(address,uint256)", "max_gas_used": 1035, "min_gas_used": 750, "swc-id": "101", "title": "Integer Underflow", "type": "Warning"}, {"address": 649, "contract": "Unknown", "debug": "<DEBUG-DATA>", "description": "The subtraction can result in an integer underflow.\n", "function": "sendeth(address,uint256)", "max_gas_used": 1758, "min_gas_used": 1283, "swc-id": "101", "title": "Integer Underflow", "type": "Warning"}], "success": true} |
||||||
"error": null, |
|
||||||
"issues": [ |
|
||||||
{ |
|
||||||
"address": 567, |
|
||||||
"contract": "Unknown", |
|
||||||
"debug": "<DEBUG-DATA>", |
|
||||||
"description": "The subtraction can result in an integer underflow.\n", |
|
||||||
"function": "sendeth(address,uint256)", |
|
||||||
"swc-id": "101", |
|
||||||
"min_gas_used": 750, |
|
||||||
"max_gas_used": 1035, |
|
||||||
"title": "Integer Underflow", |
|
||||||
"type": "Warning" |
|
||||||
}, |
|
||||||
{ |
|
||||||
"address": 649, |
|
||||||
"contract": "Unknown", |
|
||||||
"debug": "<DEBUG-DATA>", |
|
||||||
"description": "The subtraction can result in an integer underflow.\n", |
|
||||||
"function": "sendeth(address,uint256)", |
|
||||||
"swc-id": "101", |
|
||||||
"min_gas_used": 1283, |
|
||||||
"max_gas_used": 1758, |
|
||||||
"title": "Integer Underflow", |
|
||||||
"type": "Warning" |
|
||||||
}, |
|
||||||
{ |
|
||||||
"address": 725, |
|
||||||
"contract": "Unknown", |
|
||||||
"debug": "<DEBUG-DATA>", |
|
||||||
"description": "This binary add operation can result in integer overflow.\n", |
|
||||||
"function": "sendeth(address,uint256)", |
|
||||||
"swc-id": "101", |
|
||||||
"min_gas_used": 6806, |
|
||||||
"max_gas_used": 27471, |
|
||||||
"title": "Integer Overflow", |
|
||||||
"type": "Warning" |
|
||||||
} |
|
||||||
], |
|
||||||
"success": true |
|
||||||
} |
|
@ -1,42 +1 @@ |
|||||||
{ |
{"error": null, "issues": [{"address": 290, "contract": "Unknown", "debug": "<DEBUG-DATA>", "description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.", "function": "callnotchecked()", "max_gas_used": 35941, "min_gas_used": 1330, "swc-id": "104", "title": "Unchecked CALL return value", "type": "Informational"}], "success": true} |
||||||
"error": null, |
|
||||||
"issues": [ |
|
||||||
{ |
|
||||||
"address": 196, |
|
||||||
"contract": "Unknown", |
|
||||||
"debug": "<DEBUG-DATA>", |
|
||||||
"description": "This contract executes a message call to to another contract. Make sure that the called contract is trusted and does not execute user-supplied code.", |
|
||||||
"function": "callchecked()", |
|
||||||
"swc-id": "107", |
|
||||||
"min_gas_used": 599, |
|
||||||
"max_gas_used": 1210, |
|
||||||
"title": "Message call to external contract", |
|
||||||
"type": "Informational" |
|
||||||
}, |
|
||||||
{ |
|
||||||
"address": 285, |
|
||||||
"contract": "Unknown", |
|
||||||
"debug": "<DEBUG-DATA>", |
|
||||||
"description": "This contract executes a message call to to another contract. Make sure that the called contract is trusted and does not execute user-supplied code.", |
|
||||||
"function": "callnotchecked()", |
|
||||||
"swc-id": "107", |
|
||||||
"min_gas_used": 621, |
|
||||||
"max_gas_used": 1232, |
|
||||||
"title": "Message call to external contract", |
|
||||||
"type": "Informational" |
|
||||||
}, |
|
||||||
{ |
|
||||||
"address": 290, |
|
||||||
"contract": "Unknown", |
|
||||||
"debug": "<DEBUG-DATA>", |
|
||||||
"description": "The return value of an external call is not checked. Note that execution continue even if the called contract throws.", |
|
||||||
"function": "callnotchecked()", |
|
||||||
"swc-id": "104", |
|
||||||
"min_gas_used": 1330, |
|
||||||
"max_gas_used": 35941, |
|
||||||
"title": "Unchecked CALL return value", |
|
||||||
"type": "Informational" |
|
||||||
} |
|
||||||
], |
|
||||||
"success": true |
|
||||||
} |
|
@ -1,42 +1 @@ |
|||||||
{ |
{"error": null, "issues": [{"address": 567, "contract": "Unknown", "debug": "<DEBUG-DATA>", "description": "The subtraction can result in an integer underflow.\n", "function": "sendeth(address,uint256)", "max_gas_used": 1035, "min_gas_used": 750, "swc-id": "101", "title": "Integer Underflow", "type": "Warning"}, {"address": 649, "contract": "Unknown", "debug": "<DEBUG-DATA>", "description": "The subtraction can result in an integer underflow.\n", "function": "sendeth(address,uint256)", "max_gas_used": 1758, "min_gas_used": 1283, "swc-id": "101", "title": "Integer Underflow", "type": "Warning"}], "success": true} |
||||||
"error": null, |
|
||||||
"issues": [ |
|
||||||
{ |
|
||||||
"address": 567, |
|
||||||
"contract": "Unknown", |
|
||||||
"debug": "<DEBUG-DATA>", |
|
||||||
"description": "The subtraction can result in an integer underflow.\n", |
|
||||||
"function": "sendeth(address,uint256)", |
|
||||||
"swc-id": "101", |
|
||||||
"min_gas_used": 750, |
|
||||||
"max_gas_used": 1035, |
|
||||||
"title": "Integer Underflow", |
|
||||||
"type": "Warning" |
|
||||||
}, |
|
||||||
{ |
|
||||||
"address": 649, |
|
||||||
"contract": "Unknown", |
|
||||||
"debug": "<DEBUG-DATA>", |
|
||||||
"description": "The subtraction can result in an integer underflow.\n", |
|
||||||
"function": "sendeth(address,uint256)", |
|
||||||
"swc-id": "101", |
|
||||||
"min_gas_used": 1283, |
|
||||||
"max_gas_used": 1758, |
|
||||||
"title": "Integer Underflow", |
|
||||||
"type": "Warning" |
|
||||||
}, |
|
||||||
{ |
|
||||||
"address": 725, |
|
||||||
"contract": "Unknown", |
|
||||||
"debug": "<DEBUG-DATA>", |
|
||||||
"description": "This binary add operation can result in integer overflow.\n", |
|
||||||
"function": "sendeth(address,uint256)", |
|
||||||
"swc-id": "101", |
|
||||||
"min_gas_used": 6806, |
|
||||||
"max_gas_used": 27471, |
|
||||||
"title": "Integer Overflow", |
|
||||||
"type": "Warning" |
|
||||||
} |
|
||||||
], |
|
||||||
"success": true |
|
||||||
} |
|
Loading…
Reference in new issue