Static Analyzer for Solidity
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
slither/tests/detectors/events-access/0.6.11/missing_events_access_contr...

651 lines
31 KiB

[
[
{
"elements": [
{
"type": "function",
"name": "bad1",
"source_mapping": {
"start": 364,
"length": 90,
"filename_used": "/GENERIC_PATH",
"filename_relative": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"filename_absolute": "/GENERIC_PATH",
"filename_short": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"is_dependency": false,
"lines": [
19,
20,
21
],
"starting_column": 3,
"ending_column": 4
},
"type_specific_fields": {
"parent": {
"type": "contract",
"name": "Bug",
"source_mapping": {
"start": 0,
"length": 1309,
"filename_used": "/GENERIC_PATH",
"filename_relative": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"filename_absolute": "/GENERIC_PATH",
"filename_short": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"is_dependency": false,
"lines": [
1,
2,
3,
4,
5,
6,
7,
8,
9,
10,
11,
12,
13,
14,
15,
16,
17,
18,
19,
20,
21,
22,
23,
24,
25,
26,
27,
28,
29,
30,
31,
32,
33,
34,
35,
36,
37,
38,
39,
40,
41,
42,
43,
44,
45,
46,
47,
48,
49,
50,
51,
52
],
"starting_column": 1,
"ending_column": 2
}
},
"signature": "bad1(address)"
}
},
{
"type": "node",
"name": "owner = newOwner",
"source_mapping": {
"start": 421,
"length": 16,
"filename_used": "/GENERIC_PATH",
"filename_relative": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"filename_absolute": "/GENERIC_PATH",
"filename_short": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"is_dependency": false,
"lines": [
20
],
"starting_column": 5,
"ending_column": 21
},
"type_specific_fields": {
"parent": {
"type": "function",
"name": "bad1",
"source_mapping": {
"start": 364,
"length": 90,
"filename_used": "/GENERIC_PATH",
"filename_relative": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"filename_absolute": "/GENERIC_PATH",
"filename_short": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"is_dependency": false,
"lines": [
19,
20,
21
],
"starting_column": 3,
"ending_column": 4
},
"type_specific_fields": {
"parent": {
"type": "contract",
"name": "Bug",
"source_mapping": {
"start": 0,
"length": 1309,
"filename_used": "/GENERIC_PATH",
"filename_relative": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"filename_absolute": "/GENERIC_PATH",
"filename_short": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"is_dependency": false,
"lines": [
1,
2,
3,
4,
5,
6,
7,
8,
9,
10,
11,
12,
13,
14,
15,
16,
17,
18,
19,
20,
21,
22,
23,
24,
25,
26,
27,
28,
29,
30,
31,
32,
33,
34,
35,
36,
37,
38,
39,
40,
41,
42,
43,
44,
45,
46,
47,
48,
49,
50,
51,
52
],
"starting_column": 1,
"ending_column": 2
}
},
"signature": "bad1(address)"
}
}
}
}
],
"description": "Bug.bad1(address) (tests/detectors/events-access/0.6.11/missing_events_access_control.sol#19-21) should emit an event for: \n\t- owner = newOwner (tests/detectors/events-access/0.6.11/missing_events_access_control.sol#20) \n",
"markdown": "[Bug.bad1(address)](tests/detectors/events-access/0.6.11/missing_events_access_control.sol#L19-L21) should emit an event for: \n\t- [owner = newOwner](tests/detectors/events-access/0.6.11/missing_events_access_control.sol#L20) \n",
"first_markdown_element": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol#L19-L21",
"id": "7dd824ee9b2f6100abf2b1e95d84c1b1393a4ab27a06676b2a5d7da164788a00",
"check": "events-access",
"impact": "Low",
"confidence": "Medium"
},
{
"elements": [
{
"type": "function",
"name": "bad0",
"source_mapping": {
"start": 284,
"length": 76,
"filename_used": "/GENERIC_PATH",
"filename_relative": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"filename_absolute": "/GENERIC_PATH",
"filename_short": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"is_dependency": false,
"lines": [
15,
16,
17
],
"starting_column": 3,
"ending_column": 4
},
"type_specific_fields": {
"parent": {
"type": "contract",
"name": "Bug",
"source_mapping": {
"start": 0,
"length": 1309,
"filename_used": "/GENERIC_PATH",
"filename_relative": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"filename_absolute": "/GENERIC_PATH",
"filename_short": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"is_dependency": false,
"lines": [
1,
2,
3,
4,
5,
6,
7,
8,
9,
10,
11,
12,
13,
14,
15,
16,
17,
18,
19,
20,
21,
22,
23,
24,
25,
26,
27,
28,
29,
30,
31,
32,
33,
34,
35,
36,
37,
38,
39,
40,
41,
42,
43,
44,
45,
46,
47,
48,
49,
50,
51,
52
],
"starting_column": 1,
"ending_column": 2
}
},
"signature": "bad0()"
}
},
{
"type": "node",
"name": "owner = msg.sender",
"source_mapping": {
"start": 325,
"length": 18,
"filename_used": "/GENERIC_PATH",
"filename_relative": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"filename_absolute": "/GENERIC_PATH",
"filename_short": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"is_dependency": false,
"lines": [
16
],
"starting_column": 5,
"ending_column": 23
},
"type_specific_fields": {
"parent": {
"type": "function",
"name": "bad0",
"source_mapping": {
"start": 284,
"length": 76,
"filename_used": "/GENERIC_PATH",
"filename_relative": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"filename_absolute": "/GENERIC_PATH",
"filename_short": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"is_dependency": false,
"lines": [
15,
16,
17
],
"starting_column": 3,
"ending_column": 4
},
"type_specific_fields": {
"parent": {
"type": "contract",
"name": "Bug",
"source_mapping": {
"start": 0,
"length": 1309,
"filename_used": "/GENERIC_PATH",
"filename_relative": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"filename_absolute": "/GENERIC_PATH",
"filename_short": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"is_dependency": false,
"lines": [
1,
2,
3,
4,
5,
6,
7,
8,
9,
10,
11,
12,
13,
14,
15,
16,
17,
18,
19,
20,
21,
22,
23,
24,
25,
26,
27,
28,
29,
30,
31,
32,
33,
34,
35,
36,
37,
38,
39,
40,
41,
42,
43,
44,
45,
46,
47,
48,
49,
50,
51,
52
],
"starting_column": 1,
"ending_column": 2
}
},
"signature": "bad0()"
}
}
}
}
],
"description": "Bug.bad0() (tests/detectors/events-access/0.6.11/missing_events_access_control.sol#15-17) should emit an event for: \n\t- owner = msg.sender (tests/detectors/events-access/0.6.11/missing_events_access_control.sol#16) \n",
"markdown": "[Bug.bad0()](tests/detectors/events-access/0.6.11/missing_events_access_control.sol#L15-L17) should emit an event for: \n\t- [owner = msg.sender](tests/detectors/events-access/0.6.11/missing_events_access_control.sol#L16) \n",
"first_markdown_element": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol#L15-L17",
"id": "81ef3707d2eed91cd30ba6e7368fa40206ec32eec757bb0af632c4b7885bd92c",
"check": "events-access",
"impact": "Low",
"confidence": "Medium"
},
{
"elements": [
{
"type": "function",
"name": "bad2",
"source_mapping": {
"start": 458,
"length": 127,
"filename_used": "/GENERIC_PATH",
"filename_relative": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"filename_absolute": "/GENERIC_PATH",
"filename_short": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"is_dependency": false,
"lines": [
23,
24,
25,
26
],
"starting_column": 3,
"ending_column": 4
},
"type_specific_fields": {
"parent": {
"type": "contract",
"name": "Bug",
"source_mapping": {
"start": 0,
"length": 1309,
"filename_used": "/GENERIC_PATH",
"filename_relative": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"filename_absolute": "/GENERIC_PATH",
"filename_short": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"is_dependency": false,
"lines": [
1,
2,
3,
4,
5,
6,
7,
8,
9,
10,
11,
12,
13,
14,
15,
16,
17,
18,
19,
20,
21,
22,
23,
24,
25,
26,
27,
28,
29,
30,
31,
32,
33,
34,
35,
36,
37,
38,
39,
40,
41,
42,
43,
44,
45,
46,
47,
48,
49,
50,
51,
52
],
"starting_column": 1,
"ending_column": 2
}
},
"signature": "bad2(address)"
}
},
{
"type": "node",
"name": "owner = newOwner",
"source_mapping": {
"start": 552,
"length": 16,
"filename_used": "/GENERIC_PATH",
"filename_relative": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"filename_absolute": "/GENERIC_PATH",
"filename_short": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"is_dependency": false,
"lines": [
25
],
"starting_column": 5,
"ending_column": 21
},
"type_specific_fields": {
"parent": {
"type": "function",
"name": "bad2",
"source_mapping": {
"start": 458,
"length": 127,
"filename_used": "/GENERIC_PATH",
"filename_relative": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"filename_absolute": "/GENERIC_PATH",
"filename_short": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"is_dependency": false,
"lines": [
23,
24,
25,
26
],
"starting_column": 3,
"ending_column": 4
},
"type_specific_fields": {
"parent": {
"type": "contract",
"name": "Bug",
"source_mapping": {
"start": 0,
"length": 1309,
"filename_used": "/GENERIC_PATH",
"filename_relative": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"filename_absolute": "/GENERIC_PATH",
"filename_short": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol",
"is_dependency": false,
"lines": [
1,
2,
3,
4,
5,
6,
7,
8,
9,
10,
11,
12,
13,
14,
15,
16,
17,
18,
19,
20,
21,
22,
23,
24,
25,
26,
27,
28,
29,
30,
31,
32,
33,
34,
35,
36,
37,
38,
39,
40,
41,
42,
43,
44,
45,
46,
47,
48,
49,
50,
51,
52
],
"starting_column": 1,
"ending_column": 2
}
},
"signature": "bad2(address)"
}
}
}
}
],
"description": "Bug.bad2(address) (tests/detectors/events-access/0.6.11/missing_events_access_control.sol#23-26) should emit an event for: \n\t- owner = newOwner (tests/detectors/events-access/0.6.11/missing_events_access_control.sol#25) \n",
"markdown": "[Bug.bad2(address)](tests/detectors/events-access/0.6.11/missing_events_access_control.sol#L23-L26) should emit an event for: \n\t- [owner = newOwner](tests/detectors/events-access/0.6.11/missing_events_access_control.sol#L25) \n",
"first_markdown_element": "tests/detectors/events-access/0.6.11/missing_events_access_control.sol#L23-L26",
"id": "a1b2818a2d7f222d9f8e8d8f7730fe9e8b24c9863637b9ecd2f395eb68fa3511",
"check": "events-access",
"impact": "Low",
"confidence": "Medium"
}
]
]