This repository has been archived by the owner on Jul 20, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 3
/
VestingEscrowWalletFactory.sol.mythril.out
148 lines (120 loc) · 5.91 KB
/
VestingEscrowWalletFactory.sol.mythril.out
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
==== Exception State ====
SWC ID: 110
Severity: Low
Contract: VestingEscrowWalletStorage
Function name: [schedules(address,uint256), schedules(address,uint256)] (ambiguous)
PC address: 552
Estimated Gas Usage: 763 - 1048
A reachable exception has been detected.
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
--------------------
In file: modules/VestingEscrowWalletFactory.sol:269
mapping(address => Schedule[]) public schedules
--------------------
==== Exception State ====
SWC ID: 110
Severity: Low
Contract: VestingEscrowWalletStorage
Function name: [templateNames(uint256), templateNames(uint256)] (ambiguous)
PC address: 608
Estimated Gas Usage: 689 - 784
A reachable exception has been detected.
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
--------------------
In file: modules/VestingEscrowWalletFactory.sol:284
bytes32[] public templateNames
--------------------
==== Exception State ====
SWC ID: 110
Severity: Low
Contract: VestingEscrowWalletStorage
Function name: [beneficiaries(uint256), beneficiaries(uint256)] (ambiguous)
PC address: 641
Estimated Gas Usage: 711 - 806
A reachable exception has been detected.
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
--------------------
In file: modules/VestingEscrowWalletFactory.sol:264
address[] public beneficiaries
--------------------
==== Delegatecall Proxy ====
SWC ID: 112
Severity: Low
Contract: OwnedUpgradeabilityProxy
Function name: fallback
PC address: 2172
Estimated Gas Usage: 714 - 3443
The contract implements a delegatecall proxy.
The smart contract forwards the received calldata via delegatecall. Note that callers can execute arbitrary functions in the callee contract and that the callee contract can access the storage of the calling contract. Make sure that the callee contract is audited properly.DELEGATECALL target: 0x0
--------------------
In file: modules/VestingEscrowWalletFactory.sol:35
delegatecall(gas, implementation, 0, calldatasize, 0, 0)
--------------------
==== Exception State ====
SWC ID: 110
Severity: Low
Contract: VestingEscrowWalletProxy
Function name: [schedules(address,uint256), schedules(address,uint256)] (ambiguous)
PC address: 2664
Estimated Gas Usage: 786 - 1071
A reachable exception has been detected.
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
--------------------
In file: modules/VestingEscrowWalletFactory.sol:269
mapping(address => Schedule[]) public schedules
--------------------
==== Exception State ====
SWC ID: 110
Severity: Low
Contract: VestingEscrowWalletProxy
Function name: [templateNames(uint256), templateNames(uint256)] (ambiguous)
PC address: 3059
Estimated Gas Usage: 711 - 806
A reachable exception has been detected.
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
--------------------
In file: modules/VestingEscrowWalletFactory.sol:284
bytes32[] public templateNames
--------------------
==== Exception State ====
SWC ID: 110
Severity: Low
Contract: VestingEscrowWalletProxy
Function name: [beneficiaries(uint256), beneficiaries(uint256)] (ambiguous)
PC address: 3092
Estimated Gas Usage: 733 - 828
A reachable exception has been detected.
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
--------------------
In file: modules/VestingEscrowWalletFactory.sol:264
address[] public beneficiaries
--------------------
==== Delegatecall Proxy ====
SWC ID: 112
Severity: Low
Contract: VestingEscrowWalletProxy
Function name: fallback
PC address: 3602
Estimated Gas Usage: 747 - 3476
The contract implements a delegatecall proxy.
The smart contract forwards the received calldata via delegatecall. Note that callers can execute arbitrary functions in the callee contract and that the callee contract can access the storage of the calling contract. Make sure that the callee contract is audited properly.DELEGATECALL target: Concat(0,
Extract(159,
0,
19_code_224(VestingEscrowWalletProxy)))
--------------------
In file: modules/VestingEscrowWalletFactory.sol:35
delegatecall(gas, implementation, 0, calldatasize, 0, 0)
--------------------
==== Integer Underflow ====
SWC ID: 101
Severity: High
Contract: VestingEscrowWalletFactory
Function name: [description(), description(), description(), description()] (ambiguous)
PC address: 8945
Estimated Gas Usage: 2668 - 4787
The binary subtraction can underflow.
The operands of the subtraction operation are not sufficiently constrained. The subtraction could therefore result in an integer underflow. Prevent the underflow by checking inputs or ensure sure that the underflow is caught by an assertion.
--------------------
In file: modules/VestingEscrowWalletFactory.sol:885
string public description
--------------------