You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In li.fi case, the untrusted calldata passed into .call and could be successfully swapped, essentially caused by arbitray call of depositToGasZipERC20 , no permission controll.
In Slither scope, we could referece the implementation like arbitrary-send-erc20, however Slither is a static data flow audit tool.
So completeness is a advantage than soundness. Arbitray call issue about Slither
Describe the desired feature
A common way a contract can be made vulnerable is to make a call with attacker-controlled target and data. For example, see this Li.Fi exploit.
Slither could detect that the arguments to
.call
are untrusted and flag it as a warning.The text was updated successfully, but these errors were encountered: