Gets the short identifier of the detector, used in analyzer warnings.
The unique identifier of the detector.
Gets the kind of the detector.
Defines the behavior of warnings generated by this detector when working with multiple projects within a single Tact configuration.
Here are the available options:
"union"
Leave this value if you don't care about warnings generated in other projects."intersect"
If the warning is generated for some source location of the imported file,
it should be generated by each of the projects. Example: Constants from an
imported file should not be reported iff they are unused in all the projects,
so you need "intersect".Checks whether this detector needs the Soufflé binary to be executed.
Executes the detector's logic to check for issues within the provided compilation unit.
The compilation unit to be analyzed.
List of warnings has highlighted by this detector.
ProtectedmakeProtectedskip
A detector that identifies unprotected calls or state modifications.
Why is it bad?
Without conditions or permission checks, some calls can be exploited to disrupt the contract's intended behavior or allow malicious actors to perform unauthorized actions. For example, a publicly accessible
setfunction in a mapping or an unguardedsendcall can enable draining contract's funds, denial-of-service (DoS) attacks or other malicious activities.Example
Use instead: