Open S3v3ru5 opened 1 year ago
Above approach works as follows:
May be it's better to do the second step in the detect_missing_tx_field_validations
itself for now.
Add an additional parameter to detect_missing_tx_field_validations
.
def detect_missing_tx_field_validations(
entry_block: "BasicBlock", checks_field: Callable[["BlockTransactionContext"], bool], satisfies_report_condition: Callable[[List["BasicBlock"], bool],
) -> List[List["BasicBlock"]]:
which takes a path and returns True if that path is considered vulnerable or else returns False.
detect_missing_tx_field_validations
andsearch_paths
already address the issues with the generation of execution paths. https://github.com/crytic/tealer/blob/c590caacfb33aa1f68498b2cb596701e7dd2fd18/tealer/detectors/utils.py#L51-L229group-size
detector implements a function to generate execution paths. This function does not address the recently uncovered issues.https://github.com/crytic/tealer/blob/c590caacfb33aa1f68498b2cb596701e7dd2fd18/tealer/detectors/groupsize.py#L119-L164
The
group-size
could be updated to use thedetect_missing_tx_field_validations