mirror of https://github.com/ConsenSys/mythril
blockchainethereumsmart-contractssoliditysecurityprogram-analysissecurity-analysissymbolic-execution
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
117 lines
3.7 KiB
117 lines
3.7 KiB
==== Message call to external contract ====
|
|
Type: Informational
|
|
Contract: Caller
|
|
Function name: _function_0x5a6814ec
|
|
PC address: 661
|
|
This contract executes a message call to to another contract. Make sure that the called contract is trusted and does not execute user-supplied code.
|
|
--------------------
|
|
In file: <TESTDATA>/inputs/calls.sol:16
|
|
|
|
fixed_address.call()
|
|
|
|
--------------------
|
|
|
|
==== Message call to external contract ====
|
|
Type: Warning
|
|
Contract: Caller
|
|
Function name: _function_0xd24b08cc
|
|
PC address: 779
|
|
This contract executes a message call to an address found at storage slot 1. This storage slot can be written to by calling the function '_function_0x2776b163'. Generally, it is not recommended to call user-supplied adresses using Solidity's call() construct. Note that attackers might leverage reentrancy attacks to exploit race conditions or manipulate this contract's state.
|
|
--------------------
|
|
In file: <TESTDATA>/inputs/calls.sol:29
|
|
|
|
stored_address.call()
|
|
|
|
--------------------
|
|
|
|
==== Message call to external contract ====
|
|
Type: Informational
|
|
Contract: Caller
|
|
Function name: _function_0xe11f493e
|
|
PC address: 858
|
|
This contract executes a message call to to another contract. Make sure that the called contract is trusted and does not execute user-supplied code.
|
|
--------------------
|
|
In file: <TESTDATA>/inputs/calls.sol:20
|
|
|
|
fixed_address.call()
|
|
|
|
--------------------
|
|
|
|
==== State change after external call ====
|
|
Type: Warning
|
|
Contract: Caller
|
|
Function name: _function_0xe11f493e
|
|
PC address: 869
|
|
The contract account state is changed after an external call. Consider that the called contract could re-enter the function before this state change takes place. This can lead to business logic vulnerabilities.
|
|
--------------------
|
|
In file: <TESTDATA>/inputs/calls.sol:21
|
|
|
|
statevar = 0
|
|
|
|
--------------------
|
|
|
|
==== Message call to external contract ====
|
|
Type: Warning
|
|
Contract: Caller
|
|
Function name: _function_0xe1d10f79
|
|
PC address: 912
|
|
This contract executes a message call to an address provided as a function argument. Generally, it is not recommended to call user-supplied adresses using Solidity's call() construct. Note that attackers might leverage reentrancy attacks to exploit race conditions or manipulate this contract's state.
|
|
--------------------
|
|
In file: <TESTDATA>/inputs/calls.sol:25
|
|
|
|
addr.call()
|
|
|
|
--------------------
|
|
|
|
==== Unchecked CALL return value ====
|
|
Type: Informational
|
|
Contract: Caller
|
|
Function name: _function_0x5a6814ec
|
|
PC address: 661
|
|
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
|
|
--------------------
|
|
In file: <TESTDATA>/inputs/calls.sol:16
|
|
|
|
fixed_address.call()
|
|
|
|
--------------------
|
|
|
|
==== Unchecked CALL return value ====
|
|
Type: Informational
|
|
Contract: Caller
|
|
Function name: _function_0xd24b08cc
|
|
PC address: 779
|
|
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
|
|
--------------------
|
|
In file: <TESTDATA>/inputs/calls.sol:29
|
|
|
|
stored_address.call()
|
|
|
|
--------------------
|
|
|
|
==== Unchecked CALL return value ====
|
|
Type: Informational
|
|
Contract: Caller
|
|
Function name: _function_0xe11f493e
|
|
PC address: 858
|
|
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
|
|
--------------------
|
|
In file: <TESTDATA>/inputs/calls.sol:20
|
|
|
|
fixed_address.call()
|
|
|
|
--------------------
|
|
|
|
==== Unchecked CALL return value ====
|
|
Type: Informational
|
|
Contract: Caller
|
|
Function name: _function_0xe1d10f79
|
|
PC address: 912
|
|
The return value of an external call is not checked. Note that execution continue even if the called contract throws.
|
|
--------------------
|
|
In file: <TESTDATA>/inputs/calls.sol:25
|
|
|
|
addr.call()
|
|
|
|
--------------------
|
|
|
|
|