This repository has been archived by the owner on Jul 20, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 3
/
VestingEscrowWalletProxy.sol.mythril.out
130 lines (105 loc) · 5.25 KB
/
VestingEscrowWalletProxy.sol.mythril.out
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
==== Exception State ====
SWC ID: 110
Severity: Low
Contract: VestingEscrowWalletStorage
Function name: [schedules(address,uint256), schedules(address,uint256)] (ambiguous)
PC address: 552
Estimated Gas Usage: 763 - 1048
A reachable exception has been detected.
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
--------------------
In file: modules/VestingEscrowWalletProxy.sol:269
mapping(address => Schedule[]) public schedules
--------------------
==== Exception State ====
SWC ID: 110
Severity: Low
Contract: VestingEscrowWalletStorage
Function name: [templateNames(uint256), templateNames(uint256)] (ambiguous)
PC address: 608
Estimated Gas Usage: 689 - 784
A reachable exception has been detected.
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
--------------------
In file: modules/VestingEscrowWalletProxy.sol:284
bytes32[] public templateNames
--------------------
==== Exception State ====
SWC ID: 110
Severity: Low
Contract: VestingEscrowWalletStorage
Function name: [beneficiaries(uint256), beneficiaries(uint256)] (ambiguous)
PC address: 641
Estimated Gas Usage: 711 - 806
A reachable exception has been detected.
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
--------------------
In file: modules/VestingEscrowWalletProxy.sol:264
address[] public beneficiaries
--------------------
==== Delegatecall Proxy ====
SWC ID: 112
Severity: Low
Contract: OwnedUpgradeabilityProxy
Function name: fallback
PC address: 2172
Estimated Gas Usage: 714 - 3443
The contract implements a delegatecall proxy.
The smart contract forwards the received calldata via delegatecall. Note that callers can execute arbitrary functions in the callee contract and that the callee contract can access the storage of the calling contract. Make sure that the callee contract is audited properly.DELEGATECALL target: 0x0
--------------------
In file: modules/VestingEscrowWalletProxy.sol:35
delegatecall(gas, implementation, 0, calldatasize, 0, 0)
--------------------
==== Exception State ====
SWC ID: 110
Severity: Low
Contract: VestingEscrowWalletProxy
Function name: [schedules(address,uint256), schedules(address,uint256)] (ambiguous)
PC address: 2664
Estimated Gas Usage: 786 - 1071
A reachable exception has been detected.
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
--------------------
In file: modules/VestingEscrowWalletProxy.sol:269
mapping(address => Schedule[]) public schedules
--------------------
==== Exception State ====
SWC ID: 110
Severity: Low
Contract: VestingEscrowWalletProxy
Function name: [templateNames(uint256), templateNames(uint256)] (ambiguous)
PC address: 3059
Estimated Gas Usage: 711 - 806
A reachable exception has been detected.
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
--------------------
In file: modules/VestingEscrowWalletProxy.sol:284
bytes32[] public templateNames
--------------------
==== Exception State ====
SWC ID: 110
Severity: Low
Contract: VestingEscrowWalletProxy
Function name: [beneficiaries(uint256), beneficiaries(uint256)] (ambiguous)
PC address: 3092
Estimated Gas Usage: 733 - 828
A reachable exception has been detected.
It is possible to trigger an exception (opcode 0xfe). Exceptions can be caused by type errors, division by zero, out-of-bounds array access, or assert violations. Note that explicit `assert()` should only be used to check invariants. Use `require()` for regular input checking.
--------------------
In file: modules/VestingEscrowWalletProxy.sol:264
address[] public beneficiaries
--------------------
==== Delegatecall Proxy ====
SWC ID: 112
Severity: Low
Contract: VestingEscrowWalletProxy
Function name: fallback
PC address: 3602
Estimated Gas Usage: 747 - 3476
The contract implements a delegatecall proxy.
The smart contract forwards the received calldata via delegatecall. Note that callers can execute arbitrary functions in the callee contract and that the callee contract can access the storage of the calling contract. Make sure that the callee contract is audited properly.DELEGATECALL target: Concat(0,
Extract(159, 0, 9_code_224(VestingEscrowWalletProxy)))
--------------------
In file: modules/VestingEscrowWalletProxy.sol:35
delegatecall(gas, implementation, 0, calldatasize, 0, 0)
--------------------