==== Message call to external contract ==== Type: Informational Contract: Caller Function name: _function_0x5a6814ec PC address: 661 This contract executes a message call to to another contract. Make sure that the called contract is trusted and does not execute user-supplied code. -------------------- In file: /inputs/calls.sol:16 fixed_address.call() -------------------- ==== Message call to external contract ==== Type: Warning Contract: Caller Function name: _function_0xd24b08cc PC address: 779 This contract executes a message call to an address found at storage slot 1. This storage slot can be written to by calling the function '_function_0x2776b163'. Generally, it is not recommended to call user-supplied adresses using Solidity's call() construct. Note that attackers might leverage reentrancy attacks to exploit race conditions or manipulate this contract's state. -------------------- In file: /inputs/calls.sol:29 stored_address.call() -------------------- ==== Message call to external contract ==== Type: Informational Contract: Caller Function name: _function_0xe11f493e PC address: 858 This contract executes a message call to to another contract. Make sure that the called contract is trusted and does not execute user-supplied code. -------------------- In file: /inputs/calls.sol:20 fixed_address.call() -------------------- ==== State change after external call ==== Type: Warning Contract: Caller Function name: _function_0xe11f493e PC address: 869 The contract account state is changed after an external call. Consider that the called contract could re-enter the function before this state change takes place. This can lead to business logic vulnerabilities. -------------------- In file: /inputs/calls.sol:21 statevar = 0 -------------------- ==== Message call to external contract ==== Type: Warning Contract: Caller Function name: _function_0xe1d10f79 PC address: 912 This contract executes a message call to an address provided as a function argument. Generally, it is not recommended to call user-supplied adresses using Solidity's call() construct. Note that attackers might leverage reentrancy attacks to exploit race conditions or manipulate this contract's state. -------------------- In file: /inputs/calls.sol:25 addr.call() -------------------- ==== Unchecked CALL return value ==== Type: Informational Contract: Caller Function name: _function_0x5a6814ec PC address: 661 The return value of an external call is not checked. Note that execution continue even if the called contract throws. -------------------- In file: /inputs/calls.sol:16 fixed_address.call() -------------------- ==== Unchecked CALL return value ==== Type: Informational Contract: Caller Function name: _function_0xd24b08cc PC address: 779 The return value of an external call is not checked. Note that execution continue even if the called contract throws. -------------------- In file: /inputs/calls.sol:29 stored_address.call() -------------------- ==== Unchecked CALL return value ==== Type: Informational Contract: Caller Function name: _function_0xe11f493e PC address: 858 The return value of an external call is not checked. Note that execution continue even if the called contract throws. -------------------- In file: /inputs/calls.sol:20 fixed_address.call() -------------------- ==== Unchecked CALL return value ==== Type: Informational Contract: Caller Function name: _function_0xe1d10f79 PC address: 912 The return value of an external call is not checked. Note that execution continue even if the called contract throws. -------------------- In file: /inputs/calls.sol:25 addr.call() --------------------