# Analysis results for test-filename.sol ## Ether send - SWC ID: 105 - Type: Warning - Contract: Unknown - Function name: `withdrawfunds()` - PC address: 722 ### Description It seems that an attacker is able to execute an call instruction, this can mean that the attacker is able to extract funds out of the contract. ## Integer Overflow - SWC ID: 101 - Type: Warning - Contract: Unknown - Function name: `invest()` - PC address: 883 ### Description This binary add operation can result in integer overflow.