Security analysis tool for EVM bytecode. Supports smart contracts built for Ethereum, Hedera, Quorum, Vechain, Roostock, Tron and other EVM-compatible blockchains.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
mythril/tests/testdata/outputs_expected/underflow.sol.o.markdown

1.4 KiB

Analysis results for test-filename.sol

Integer Underflow

  • SWC ID: 101
  • Severity: High
  • Contract: Unknown
  • Function name: sendeth(address,uint256)
  • PC address: 567
  • Estimated Gas Usage: 11915 - 52861

Description

The binary subtraction can underflow. The operands of the subtraction operation are not sufficiently constrained. The subtraction could therefore result in an integer underflow. Prevent the underflow by checking inputs or ensure sure that the underflow is caught by an assertion.

Integer Underflow

  • SWC ID: 101
  • Severity: High
  • Contract: Unknown
  • Function name: sendeth(address,uint256)
  • PC address: 649
  • Estimated Gas Usage: 11915 - 52861

Description

The binary subtraction can underflow. The operands of the subtraction operation are not sufficiently constrained. The subtraction could therefore result in an integer underflow. Prevent the underflow by checking inputs or ensure sure that the underflow is caught by an assertion.

Integer Overflow

  • SWC ID: 101
  • Severity: High
  • Contract: Unknown
  • Function name: sendeth(address,uint256)
  • PC address: 725
  • Estimated Gas Usage: 11915 - 52861

Description

The binary addition can overflow. The operands of the addition operation are not sufficiently constrained. The addition could therefore result in an integer overflow. Prevent the overflow by checking inputs or ensure sure that the overflow is caught by an assertion.