Open nmushegian opened 7 years ago
I think not because I use bytes32
for precisely this reason, such that in case of a would-be collision we would be still comparing these distinct values:
0xffffffff00000000000000000000000000000000000000000000000000000000 # sig
0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff # ANY
Nice, I think that works as long as the previous bug where it wouldn't zero your bytes <32 args (because args are word aligned) isn't accidentally reverted with the loosey goosey solidity reference implentation
Looks like ANY trick is fine for src/dest, but is there some fuckery that could happen with a malicious function signature
bytes4(uint32(-1))
? @dbrock