From 58083aab1d8bb1fe90dcd9a24d9fa225abe3d868 Mon Sep 17 00:00:00 2001 From: Monica Jin Date: Mon, 20 Jan 2025 14:53:24 +0100 Subject: [PATCH] fix: functional check test name --- .../0.4.x/scripts/CustomReporter.js | 6 +- .../0.4.x/scripts/test-results.json | 614 ++++++++++++++++++ .../access_control/FibonacciBalance_test.js | 2 +- .../arbitrary_location_write_simple_test.js | 2 +- .../incorrect_constructor_name1_test.js | 2 +- .../incorrect_constructor_name2_test.js | 2 +- .../incorrect_constructor_name3_test.js | 2 +- .../test/access_control/mapping_write_test.js | 2 +- .../multiowned_vulnerable_test.js | 2 +- .../test/access_control/mycontract_test.js | 2 +- .../parity_wallet_bug_2_test.js | 2 +- .../test/access_control/phishable_test.js | 2 +- .../0.4.x/test/access_control/proxy_test.js | 2 +- .../access_control/simple_suicide_test.js | 2 +- .../test/access_control/unprotected0_test.js | 2 +- .../wallet_02_refund_nosub_test.js | 2 +- .../wallet_03_wrong_constructor_test.js | 2 +- .../wallet_04_confused_sign_test.js | 2 +- .../0.4.x/test/arithmetic/BECToken_test.js | 2 +- .../arithmetic/integer_overflow_1_test.js | 2 +- .../arithmetic/integer_overflow_add_test.js | 2 +- .../integer_overflow_mapping_sym_1_test.js | 2 +- .../integer_overflow_minimal_test.js | 2 +- .../arithmetic/integer_overflow_mul_test.js | 2 +- ...verflow_multitx_multifunc_feasible_test.js | 2 +- ..._overflow_multitx_onefunc_feasible_test.js | 2 +- .../arithmetic/overflow_simple_add_test.js | 2 +- .../arithmetic/overflow_single_tx_test.js | 6 +- .../0.4.x/test/arithmetic/timelock_test.js | 2 +- .../0.4.x/test/arithmetic/token_test.js | 2 +- .../arithmetic/tokensalechallenge_test.js | 2 +- .../test/bad_randomness/blackjack_test.js | 2 +- .../test/bad_randomness/etheraffle_test.js | 2 +- .../guess_the_random_number_test.js | 2 +- .../test/bad_randomness/old_blockhash_test.js | 2 +- .../test/denial_of_service/auction_test.js | 2 +- .../denial_of_service/dos_address_test.js | 2 +- .../test/denial_of_service/dos_number_test.js | 2 +- .../test/denial_of_service/dos_simple_test.js | 2 +- .../0.4.x/test/front_running/ERC20_test.js | 2 +- .../eth_tx_order_dependence_minimal_test.js | 2 +- .../test/front_running/odds_and_evens_test.js | 2 +- .../0.4.x/test/other/crypto_roulette_test.js | 2 +- .../0.4.x/test/other/name_registrar_test.js | 2 +- ...e3fa3edeb29e514cba738d87ce8c091d3f_test.js | 2 +- ...59fdc9579a9fbd0edc5f2ea0bfdb70deb4_test.js | 2 +- ...f8c05b27ab4707cd1f6d5ce6f3e4b3a5a1_test.js | 2 +- ...2ed6c35f570686b89848e5f39f20ecc106_test.js | 2 +- ...93c92360949ab1f1403323e6db345cbf31_test.js | 2 +- ...6cb60f4c60af330c208b0623b7f54bf615_test.js | 2 +- ...a9d64c74da899424c1b52acbf58ddc9782_test.js | 2 +- ...4e805c3870b6c49a3f1f49f69af8662cf3_test.js | 2 +- ...c45481dba411450c228cb692ac3d550344_test.js | 2 +- ...45fae42c83a70e5f06214c8433665c2ab5_test.js | 2 +- ...5236464a25eb18076df7da6a91d0f95e9e_test.js | 2 +- ...868531bd23a6c05e9d0c424ea64fb1b78b_test.js | 2 +- ...1cf3339f18b6d3f3bdc75a5facd744b0b8_test.js | 2 +- ...ee15c6fa0e48fce100125569d430f1bd12_test.js | 2 +- ...ce38ac4a6bb47fb1fc085ea669353fd89e_test.js | 2 +- ...761510c1a11bf48dd87c0307ac8a8c8a4f_test.js | 2 +- ...d55db380c5ae9d4a9b9703f1ed4e7e3888_test.js | 2 +- ...1ef5b11f1a7b530171aab69b16c5e66b6e_test.js | 2 +- ...5649c82f5467c9c74b7f28ee67665aad68_test.js | 2 +- .../0.4.x/test/reentrancy/etherstore_test.js | 2 +- .../reentrancy/modifier_reentrancy_test.js | 2 +- .../0.4.x/test/reentrancy/reentrance_test.js | 2 +- .../test/reentrancy/reentrancy_bonus_test.js | 2 +- .../test/reentrancy/reentrancy_dao_test.js | 2 +- .../test/reentrancy/reentrancy_simple_test.js | 2 +- .../0.4.x/test/reentrancy/simple_dao_test.js | 2 +- .../time_manipulation/ether_lotto_test.js | 2 +- .../test/time_manipulation/roulette_test.js | 2 +- .../time_manipulation/timed_crowdsale_test.js | 2 +- ...b66d788ab01dc93b9b71a88401de7d0f2e_test.js | 2 +- ...48497286d18e92b5fa1f8f9139e5653fd2_test.js | 2 +- ...54c85023648bf003bea2dd498c5612abfa_test.js | 2 +- ...cd953ffc0dd18d63603488846a6b8b2b01_test.js | 2 +- ...4adc52057aca763453820cb0e045076ef3_test.js | 2 +- ...9c1a84b9b643aa54fdd66e2dec96e8b152_test.js | 2 +- ...f9b01101a59b38a3d05c80b7618aeed984_test.js | 2 +- ...2ccbb1c1b04ffaecd72a53e37fc0e17839_test.js | 2 +- ...29142a27f00bafb5d087e1e730648314c3_test.js | 4 +- ...b07d23acb532a82be3da5c17d9d85806b4_test.js | 2 +- ...807d4c67df034fffb62f3509561218d30b_test.js | 4 +- ...27396ddb511533cf9abdbebd0a7e08da35_test.js | 2 +- ...ff3acc57d257b917e30c4df661401d6431_test.js | 2 +- ...6a9a93feec36576ee5048146870ea2c3ae_test.js | 2 +- ...ed6c9354f7aa2f658d3b4d7b31d8a13b77_test.js | 2 +- ...aa4d42967efe906e1b66cb8df9cebf04f7_test.js | 2 +- ...6504690efb064420d89e871c27065cdd52_test.js | 2 +- ...5b549f5db6e6c78ca97cac19d1fb03082c_test.js | 2 +- ...ed03e85d1cce44cab284695b41bc675b5c_test.js | 2 +- ...4dca59cb53fe9cbc5155093605c7068220_test.js | 2 +- smartbugs-curated/0.8.x/test-results.json | 4 +- .../arithmetic/integer_overflow_1_test.js | 2 +- .../integer_overflow_mapping_sym_1.js | 2 +- .../integer_overflow_minimal_test.js | 2 +- 97 files changed, 717 insertions(+), 103 deletions(-) create mode 100644 smartbugs-curated/0.4.x/scripts/test-results.json diff --git a/smartbugs-curated/0.4.x/scripts/CustomReporter.js b/smartbugs-curated/0.4.x/scripts/CustomReporter.js index c5e22ed..e2a9956 100644 --- a/smartbugs-curated/0.4.x/scripts/CustomReporter.js +++ b/smartbugs-curated/0.4.x/scripts/CustomReporter.js @@ -53,7 +53,7 @@ class CustomReporter extends Spec { error: err.message, stack: err.stack, }; - if (test.title.includes("sanity check")) { + if (test.title.includes("functional check")) { failedSanity += 1; failedSanityTests.push(result); } else { @@ -71,7 +71,7 @@ class CustomReporter extends Spec { contractFile: contractFile, state: test.state, }; - if (test.title.includes("sanity check")) { + if (test.title.includes("functional check")) { passedSanity += 1; } else { passedResults.push(result); @@ -101,7 +101,7 @@ class CustomReporter extends Spec { ); const formattedMessage3 = Base.color( "fail", - `Total failed sanity tests: ${failedSanity}/${allFiles}`, + `Total failed functional tests: ${failedSanity}/${allFiles}`, ); // // Log the formatted message console.log(`${formattedMessage}`); diff --git a/smartbugs-curated/0.4.x/scripts/test-results.json b/smartbugs-curated/0.4.x/scripts/test-results.json new file mode 100644 index 0000000..1f88b1a --- /dev/null +++ b/smartbugs-curated/0.4.x/scripts/test-results.json @@ -0,0 +1,614 @@ +{ + "totalTests": 195, + "passingTests": 195, + "failingTests": 0, + "totalFiles": 91, + "passingFiles": 91, + "failingFiles": 0, + "failedSanity": 0, + "passedSanity": 95, + "failedSanityTests": [], + "passedResults": [ + { + "title": "exploit access control vulnerability", + "file": "access_control/FibonacciBalance_test.js", + "contractFile": "access_control/FibonacciBalance.sol", + "state": "passed" + }, + { + "title": "exploit access control vulnerability", + "file": "access_control/arbitrary_location_write_simple_test.js", + "contractFile": "access_control/arbitrary_location_write_simple.sol", + "state": "passed" + }, + { + "title": "exploit access control vulnerability", + "file": "access_control/incorrect_constructor_name1_test.js", + "contractFile": "access_control/incorrect_constructor_name1.sol", + "state": "passed" + }, + { + "title": "exploit access control vulnerability", + "file": "access_control/incorrect_constructor_name2_test.js", + "contractFile": "access_control/incorrect_constructor_name2.sol", + "state": "passed" + }, + { + "title": "exploit access control vulnerability", + "file": "access_control/incorrect_constructor_name3_test.js", + "contractFile": "access_control/incorrect_constructor_name3.sol", + "state": "passed" + }, + { + "title": "exploit access control vulnerability", + "file": "access_control/mapping_write_test.js", + "contractFile": "access_control/mapping_write.sol", + "state": "passed" + }, + { + "title": "exploit access control vulnerability", + "file": "access_control/multiowned_vulnerable_test.js", + "contractFile": "access_control/multiowned_vulnerable.sol", + "state": "passed" + }, + { + "title": "exploit access control vulnerability", + "file": "access_control/mycontract_test.js", + "contractFile": "access_control/mycontract.sol", + "state": "passed" + }, + { + "title": "exploit access control vulnerability", + "file": "access_control/parity_wallet_bug_2_test.js", + "contractFile": "access_control/parity_wallet_bug_2.sol", + "state": "passed" + }, + { + "title": "exploit access control vulnerability", + "file": "access_control/phishable_test.js", + "contractFile": "access_control/phishable.sol", + "state": "passed" + }, + { + "title": "exploit access control vulnerability", + "file": "access_control/proxy_test.js", + "contractFile": "access_control/proxy.sol", + "state": "passed" + }, + { + "title": "exploit access control vulnerability", + "file": "access_control/simple_suicide_test.js", + "contractFile": "access_control/simple_suicide.sol", + "state": "passed" + }, + { + "title": "exploit access control vulnerability", + "file": "access_control/unprotected0_test.js", + "contractFile": "access_control/unprotected0.sol", + "state": "passed" + }, + { + "title": "exploit access control vulnerability", + "file": "access_control/wallet_02_refund_nosub_test.js", + "contractFile": "access_control/wallet_02_refund_nosub.sol", + "state": "passed" + }, + { + "title": "exploit access control vulnerability", + "file": "access_control/wallet_03_wrong_constructor_test.js", + "contractFile": "access_control/wallet_03_wrong_constructor.sol", + "state": "passed" + }, + { + "title": "exploit access control vulnerability", + "file": "access_control/wallet_04_confused_sign_test.js", + "contractFile": "access_control/wallet_04_confused_sign.sol", + "state": "passed" + }, + { + "title": "exploit overflow vulnerability", + "file": "arithmetic/BECToken_test.js", + "contractFile": "arithmetic/BECToken.sol", + "state": "passed" + }, + { + "title": "exploit overflow vulnerability", + "file": "arithmetic/integer_overflow_1_test.js", + "contractFile": "arithmetic/integer_overflow_1.sol", + "state": "passed" + }, + { + "title": "exploit overflow vulnerability", + "file": "arithmetic/integer_overflow_add_test.js", + "contractFile": "arithmetic/integer_overflow_add.sol", + "state": "passed" + }, + { + "title": "exploit overflow vulnerability", + "file": "arithmetic/integer_overflow_mapping_sym_1_test.js", + "contractFile": "arithmetic/integer_overflow_mapping_sym_1.sol", + "state": "passed" + }, + { + "title": "exploit underflow vulnerability", + "file": "arithmetic/integer_overflow_minimal_test.js", + "contractFile": "arithmetic/integer_overflow_minimal.sol", + "state": "passed" + }, + { + "title": "exploit overflow vulnerability", + "file": "arithmetic/integer_overflow_mul_test.js", + "contractFile": "arithmetic/integer_overflow_mul.sol", + "state": "passed" + }, + { + "title": "exploit underflow vulnerability", + "file": "arithmetic/integer_overflow_multitx_multifunc_feasible_test.js", + "contractFile": "arithmetic/integer_overflow_multitx_multifunc_feasible.sol", + "state": "passed" + }, + { + "title": "exploit underflow vulnerability", + "file": "arithmetic/integer_overflow_multitx_onefunc_feasible_test.js", + "contractFile": "arithmetic/integer_overflow_multitx_onefunc_feasible.sol", + "state": "passed" + }, + { + "title": "exploit overflow vulnerability", + "file": "arithmetic/overflow_simple_add_test.js", + "contractFile": "arithmetic/overflow_simple_add.sol", + "state": "passed" + }, + { + "title": "exploit overflow add vulnerability", + "file": "arithmetic/overflow_single_tx_test.js", + "contractFile": "arithmetic/overflow_single_tx.sol", + "state": "passed" + }, + { + "title": "exploit overflow mul vulnerability", + "file": "arithmetic/overflow_single_tx_test.js", + "contractFile": "arithmetic/overflow_single_tx.sol", + "state": "passed" + }, + { + "title": "exploit underflow vulnerability", + "file": "arithmetic/overflow_single_tx_test.js", + "contractFile": "arithmetic/overflow_single_tx.sol", + "state": "passed" + }, + { + "title": "exploit overflow vulnerability", + "file": "arithmetic/timelock_test.js", + "contractFile": "arithmetic/timelock.sol", + "state": "passed" + }, + { + "title": "exploit underflow vulnerability", + "file": "arithmetic/token_test.js", + "contractFile": "arithmetic/token.sol", + "state": "passed" + }, + { + "title": "exploit buy overflow vulnerability line 23", + "file": "arithmetic/tokensalechallenge_test.js", + "contractFile": "arithmetic/tokensalechallenge.sol", + "state": "passed" + }, + { + "title": "exploit the catch the ether vulnerability", + "file": "arithmetic/tokensalechallenge_test.js", + "contractFile": "arithmetic/tokensalechallenge.sol", + "state": "passed" + }, + { + "title": "exploit bad randomness vulnerability", + "file": "bad_randomness/blackjack_test.js", + "contractFile": "bad_randomness/blackjack.sol", + "state": "passed" + }, + { + "title": "exploit bad randomness vulnerability", + "file": "bad_randomness/etheraffle_test.js", + "contractFile": "bad_randomness/etheraffle.sol", + "state": "passed" + }, + { + "title": "exploit bad randomness vulnerability", + "file": "bad_randomness/guess_the_random_number_test.js", + "contractFile": "bad_randomness/guess_the_random_number.sol", + "state": "passed" + }, + { + "title": "exploit bad randomness vulnerability", + "file": "bad_randomness/old_blockhash_test.js", + "contractFile": "bad_randomness/old_blockhash.sol", + "state": "passed" + }, + { + "title": "exploit denial of service vulnerability", + "file": "denial_of_service/auction_test.js", + "contractFile": "denial_of_service/auction.sol", + "state": "passed" + }, + { + "title": "exploit denial of service vulnerability", + "file": "denial_of_service/dos_address_test.js", + "contractFile": "denial_of_service/dos_address.sol", + "state": "passed" + }, + { + "title": "exploit denial of service vulnerability", + "file": "denial_of_service/dos_number_test.js", + "contractFile": "denial_of_service/dos_number.sol", + "state": "passed" + }, + { + "title": "exploit denial of service vulnerability", + "file": "denial_of_service/dos_simple_test.js", + "contractFile": "denial_of_service/dos_simple.sol", + "state": "passed" + }, + { + "title": "front running vulnerability", + "file": "front_running/ERC20_test.js", + "contractFile": "front_running/ERC20.sol", + "state": "passed" + }, + { + "title": "front running vulnerability in setReward() function", + "file": "front_running/eth_tx_order_dependence_minimal_test.js", + "contractFile": "front_running/eth_tx_order_dependence_minimal.sol", + "state": "passed" + }, + { + "title": "front running vulnerability in claimReward() function", + "file": "front_running/eth_tx_order_dependence_minimal_test.js", + "contractFile": "front_running/eth_tx_order_dependence_minimal.sol", + "state": "passed" + }, + { + "title": "front running vulnerability", + "file": "front_running/odds_and_evens_test.js", + "contractFile": "front_running/odds_and_evens.sol", + "state": "passed" + }, + { + "title": "exploit uninitialized storage vulnerability", + "file": "other/crypto_roulette_test.js", + "contractFile": "other/crypto_roulette.sol", + "state": "passed" + }, + { + "title": "exploit uninitialized storage vulnerability", + "file": "other/name_registrar_test.js", + "contractFile": "other/name_registrar.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/0x01f8c4e3fa3edeb29e514cba738d87ce8c091d3f_test.js", + "contractFile": "reentrancy/0x01f8c4e3fa3edeb29e514cba738d87ce8c091d3f.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/0x23a91059fdc9579a9fbd0edc5f2ea0bfdb70deb4_test.js", + "contractFile": "reentrancy/0x23a91059fdc9579a9fbd0edc5f2ea0bfdb70deb4.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/0x4320e6f8c05b27ab4707cd1f6d5ce6f3e4b3a5a1_test.js", + "contractFile": "reentrancy/0x4320e6f8c05b27ab4707cd1f6d5ce6f3e4b3a5a1.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/0x4e73b32ed6c35f570686b89848e5f39f20ecc106_test.js", + "contractFile": "reentrancy/0x4e73b32ed6c35f570686b89848e5f39f20ecc106.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/0x561eac93c92360949ab1f1403323e6db345cbf31_test.js", + "contractFile": "reentrancy/0x561eac93c92360949ab1f1403323e6db345cbf31.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/0x7541b76cb60f4c60af330c208b0623b7f54bf615_test.js", + "contractFile": "reentrancy/0x7541b76cb60f4c60af330c208b0623b7f54bf615.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/0x7a8721a9d64c74da899424c1b52acbf58ddc9782_test.js", + "contractFile": "reentrancy/0x7a8721a9d64c74da899424c1b52acbf58ddc9782.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/0x7b368c4e805c3870b6c49a3f1f49f69af8662cf3_test.js", + "contractFile": "reentrancy/0x7b368c4e805c3870b6c49a3f1f49f69af8662cf3.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/0x8c7777c45481dba411450c228cb692ac3d550344_test.js", + "contractFile": "reentrancy/0x8c7777c45481dba411450c228cb692ac3d550344.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/0x93c32845fae42c83a70e5f06214c8433665c2ab5_test.js", + "contractFile": "reentrancy/0x93c32845fae42c83a70e5f06214c8433665c2ab5.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/0x941d225236464a25eb18076df7da6a91d0f95e9e_test.js", + "contractFile": "reentrancy/0x941d225236464a25eb18076df7da6a91d0f95e9e.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/0x96edbe868531bd23a6c05e9d0c424ea64fb1b78b_test.js", + "contractFile": "reentrancy/0x96edbe868531bd23a6c05e9d0c424ea64fb1b78b.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/0xaae1f51cf3339f18b6d3f3bdc75a5facd744b0b8_test.js", + "contractFile": "reentrancy/0xaae1f51cf3339f18b6d3f3bdc75a5facd744b0b8.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/0xb5e1b1ee15c6fa0e48fce100125569d430f1bd12_test.js", + "contractFile": "reentrancy/0xb5e1b1ee15c6fa0e48fce100125569d430f1bd12.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/0xb93430ce38ac4a6bb47fb1fc085ea669353fd89e_test.js", + "contractFile": "reentrancy/0xb93430ce38ac4a6bb47fb1fc085ea669353fd89e.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/0xbaf51e761510c1a11bf48dd87c0307ac8a8c8a4f_test.js", + "contractFile": "reentrancy/0xbaf51e761510c1a11bf48dd87c0307ac8a8c8a4f.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/0xbe4041d55db380c5ae9d4a9b9703f1ed4e7e3888_test.js", + "contractFile": "reentrancy/0xbe4041d55db380c5ae9d4a9b9703f1ed4e7e3888.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/0xcead721ef5b11f1a7b530171aab69b16c5e66b6e_test.js", + "contractFile": "reentrancy/0xcead721ef5b11f1a7b530171aab69b16c5e66b6e.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/0xf015c35649c82f5467c9c74b7f28ee67665aad68_test.js", + "contractFile": "reentrancy/0xf015c35649c82f5467c9c74b7f28ee67665aad68.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/etherstore_test.js", + "contractFile": "reentrancy/etherstore.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/modifier_reentrancy_test.js", + "contractFile": "reentrancy/modifier_reentrancy.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/reentrance_test.js", + "contractFile": "reentrancy/reentrance.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/reentrancy_bonus_test.js", + "contractFile": "reentrancy/reentrancy_bonus.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/reentrancy_dao_test.js", + "contractFile": "reentrancy/reentrancy_dao.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/reentrancy_simple_test.js", + "contractFile": "reentrancy/reentrancy_simple.sol", + "state": "passed" + }, + { + "title": "should successfully drain funds through reentrancy attack", + "file": "reentrancy/simple_dao_test.js", + "contractFile": "reentrancy/simple_dao.sol", + "state": "passed" + }, + { + "title": "exploit time manipulation vulnerability", + "file": "time_manipulation/ether_lotto_test.js", + "contractFile": "time_manipulation/ether_lotto.sol", + "state": "passed" + }, + { + "title": "exploit time manipulation vulnerability", + "file": "time_manipulation/roulette_test.js", + "contractFile": "time_manipulation/roulette.sol", + "state": "passed" + }, + { + "title": "exploit time manipulation vulnerability", + "file": "time_manipulation/timed_crowdsale_test.js", + "contractFile": "time_manipulation/timed_crowdsale.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability", + "file": "unchecked_low_level_calls/0x07f7ecb66d788ab01dc93b9b71a88401de7d0f2e_test.js", + "contractFile": "unchecked_low_level_calls/0x07f7ecb66d788ab01dc93b9b71a88401de7d0f2e.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability", + "file": "unchecked_low_level_calls/0x2972d548497286d18e92b5fa1f8f9139e5653fd2_test.js", + "contractFile": "unchecked_low_level_calls/0x2972d548497286d18e92b5fa1f8f9139e5653fd2.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability in WithdrawToken()", + "file": "unchecked_low_level_calls/0x39cfd754c85023648bf003bea2dd498c5612abfa_test.js", + "contractFile": "unchecked_low_level_calls/0x39cfd754c85023648bf003bea2dd498c5612abfa.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability in WithdrawToHolder()", + "file": "unchecked_low_level_calls/0x39cfd754c85023648bf003bea2dd498c5612abfa_test.js", + "contractFile": "unchecked_low_level_calls/0x39cfd754c85023648bf003bea2dd498c5612abfa.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability in WithdrawToken()", + "file": "unchecked_low_level_calls/0x3a0e9acd953ffc0dd18d63603488846a6b8b2b01_test.js", + "contractFile": "unchecked_low_level_calls/0x3a0e9acd953ffc0dd18d63603488846a6b8b2b01.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability in WithdrawToHolder()", + "file": "unchecked_low_level_calls/0x3a0e9acd953ffc0dd18d63603488846a6b8b2b01_test.js", + "contractFile": "unchecked_low_level_calls/0x3a0e9acd953ffc0dd18d63603488846a6b8b2b01.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability", + "file": "unchecked_low_level_calls/0x4051334adc52057aca763453820cb0e045076ef3_test.js", + "contractFile": "unchecked_low_level_calls/0x4051334adc52057aca763453820cb0e045076ef3.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability", + "file": "unchecked_low_level_calls/0x4b71ad9c1a84b9b643aa54fdd66e2dec96e8b152_test.js", + "contractFile": "unchecked_low_level_calls/0x4b71ad9c1a84b9b643aa54fdd66e2dec96e8b152.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability", + "file": "unchecked_low_level_calls/0x52d2e0f9b01101a59b38a3d05c80b7618aeed984_test.js", + "contractFile": "unchecked_low_level_calls/0x52d2e0f9b01101a59b38a3d05c80b7618aeed984.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability in WithdrawToken()", + "file": "unchecked_low_level_calls/0x627fa62ccbb1c1b04ffaecd72a53e37fc0e17839_test.js", + "contractFile": "unchecked_low_level_calls/0x627fa62ccbb1c1b04ffaecd72a53e37fc0e17839.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability in function withdrawAuctionBalances()", + "file": "unchecked_low_level_calls/0x663e4229142a27f00bafb5d087e1e730648314c3_test.js", + "contractFile": "unchecked_low_level_calls/0x663e4229142a27f00bafb5d087e1e730648314c3.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability in function giveBirth()", + "file": "unchecked_low_level_calls/0x663e4229142a27f00bafb5d087e1e730648314c3_test.js", + "contractFile": "unchecked_low_level_calls/0x663e4229142a27f00bafb5d087e1e730648314c3.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability", + "file": "unchecked_low_level_calls/0x7d09edb07d23acb532a82be3da5c17d9d85806b4_test.js", + "contractFile": "unchecked_low_level_calls/0x7d09edb07d23acb532a82be3da5c17d9d85806b4.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability in line 192", + "file": "unchecked_low_level_calls/0x89c1b3807d4c67df034fffb62f3509561218d30b_test.js", + "contractFile": "unchecked_low_level_calls/0x89c1b3807d4c67df034fffb62f3509561218d30b.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability in line 180", + "file": "unchecked_low_level_calls/0x89c1b3807d4c67df034fffb62f3509561218d30b_test.js", + "contractFile": "unchecked_low_level_calls/0x89c1b3807d4c67df034fffb62f3509561218d30b.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability in WithdrawToken()", + "file": "unchecked_low_level_calls/0x8fd1e427396ddb511533cf9abdbebd0a7e08da35_test.js", + "contractFile": "unchecked_low_level_calls/0x8fd1e427396ddb511533cf9abdbebd0a7e08da35.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability in WithdrawToHolder()", + "file": "unchecked_low_level_calls/0x8fd1e427396ddb511533cf9abdbebd0a7e08da35_test.js", + "contractFile": "unchecked_low_level_calls/0x8fd1e427396ddb511533cf9abdbebd0a7e08da35.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability", + "file": "unchecked_low_level_calls/0xa1fceeff3acc57d257b917e30c4df661401d6431_test.js", + "contractFile": "unchecked_low_level_calls/0xa1fceeff3acc57d257b917e30c4df661401d6431.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability", + "file": "unchecked_low_level_calls/0xa46edd6a9a93feec36576ee5048146870ea2c3ae_test.js", + "contractFile": "unchecked_low_level_calls/0xa46edd6a9a93feec36576ee5048146870ea2c3ae.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability", + "file": "unchecked_low_level_calls/0xb11b2fed6c9354f7aa2f658d3b4d7b31d8a13b77_test.js", + "contractFile": "unchecked_low_level_calls/0xb11b2fed6c9354f7aa2f658d3b4d7b31d8a13b77.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability", + "file": "unchecked_low_level_calls/0xb7c5c5aa4d42967efe906e1b66cb8df9cebf04f7_test.js", + "contractFile": "unchecked_low_level_calls/0xb7c5c5aa4d42967efe906e1b66cb8df9cebf04f7.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability", + "file": "unchecked_low_level_calls/0xbaa3de6504690efb064420d89e871c27065cdd52_test.js", + "contractFile": "unchecked_low_level_calls/0xbaa3de6504690efb064420d89e871c27065cdd52.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability", + "file": "unchecked_low_level_calls/0xbebbfe5b549f5db6e6c78ca97cac19d1fb03082c_test.js", + "contractFile": "unchecked_low_level_calls/0xbebbfe5b549f5db6e6c78ca97cac19d1fb03082c.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability", + "file": "unchecked_low_level_calls/0xd5967fed03e85d1cce44cab284695b41bc675b5c_test.js", + "contractFile": "unchecked_low_level_calls/0xd5967fed03e85d1cce44cab284695b41bc675b5c.sol", + "state": "passed" + }, + { + "title": "exploit unchecked low level call vulnerability", + "file": "unchecked_low_level_calls/0xe894d54dca59cb53fe9cbc5155093605c7068220_test.js", + "contractFile": "unchecked_low_level_calls/0xe894d54dca59cb53fe9cbc5155093605c7068220.sol", + "state": "passed" + } + ], + "failedResults": [] +} \ No newline at end of file diff --git a/smartbugs-curated/0.4.x/test/access_control/FibonacciBalance_test.js b/smartbugs-curated/0.4.x/test/access_control/FibonacciBalance_test.js index 67cb3b8..05ee49d 100644 --- a/smartbugs-curated/0.4.x/test/access_control/FibonacciBalance_test.js +++ b/smartbugs-curated/0.4.x/test/access_control/FibonacciBalance_test.js @@ -49,7 +49,7 @@ describe("attack access_control/FibonacciBalance.sol", function () { return { lib, victim, attacker }; } - it("sanity check: access_control/FibonacciBalance.sol", async function () { + it("functional check: access_control/FibonacciBalance.sol", async function () { const [v] = await ethers.getSigners(); const { lib, victim } = await loadFixture(deployContracts); const fibonacciLibrary = await victim.fibonacciLibrary(); diff --git a/smartbugs-curated/0.4.x/test/access_control/arbitrary_location_write_simple_test.js b/smartbugs-curated/0.4.x/test/access_control/arbitrary_location_write_simple_test.js index fa3222d..39a9add 100644 --- a/smartbugs-curated/0.4.x/test/access_control/arbitrary_location_write_simple_test.js +++ b/smartbugs-curated/0.4.x/test/access_control/arbitrary_location_write_simple_test.js @@ -24,7 +24,7 @@ describe("attack access_control/arbitrary_location_write_simple.sol", function ( return { victim, attacker }; } - it("sanity check: access_control/arbitrary_location_write_simple.sol", async function () { + it("functional check: access_control/arbitrary_location_write_simple.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); await expect(victim.connect(a).PushBonusCode(1)).to.not.be.reverted; diff --git a/smartbugs-curated/0.4.x/test/access_control/incorrect_constructor_name1_test.js b/smartbugs-curated/0.4.x/test/access_control/incorrect_constructor_name1_test.js index 454c85a..00b4bd2 100644 --- a/smartbugs-curated/0.4.x/test/access_control/incorrect_constructor_name1_test.js +++ b/smartbugs-curated/0.4.x/test/access_control/incorrect_constructor_name1_test.js @@ -26,7 +26,7 @@ describe("attack access_control/incorrect_constructor_name1.sol", function () { return { victim, attacker }; } - it("sanity check: access_control/incorrect_constructor_name1.sol", async function () { + it("functional check: access_control/incorrect_constructor_name1.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); await expect(a.sendTransaction({ to: victim.target, value: 1 })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/access_control/incorrect_constructor_name2_test.js b/smartbugs-curated/0.4.x/test/access_control/incorrect_constructor_name2_test.js index 59fe3f9..4b2dfb9 100644 --- a/smartbugs-curated/0.4.x/test/access_control/incorrect_constructor_name2_test.js +++ b/smartbugs-curated/0.4.x/test/access_control/incorrect_constructor_name2_test.js @@ -26,7 +26,7 @@ describe("attack access_control/incorrect_constructor_name2.sol", function () { return { victim, attacker }; } - it("sanity check: access_control/incorrect_constructor_name2.sol", async function () { + it("functional check: access_control/incorrect_constructor_name2.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); await expect(a.sendTransaction({ to: victim.target, value: 1 })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/access_control/incorrect_constructor_name3_test.js b/smartbugs-curated/0.4.x/test/access_control/incorrect_constructor_name3_test.js index 39dd679..f8579b8 100644 --- a/smartbugs-curated/0.4.x/test/access_control/incorrect_constructor_name3_test.js +++ b/smartbugs-curated/0.4.x/test/access_control/incorrect_constructor_name3_test.js @@ -26,7 +26,7 @@ describe("attack access_control/incorrect_constructor_name3.sol", function () { return { victim, attacker }; } - it("sanity check: access_control/incorrect_constructor_name3.sol", async function () { + it("functional check: access_control/incorrect_constructor_name3.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); await expect(a.sendTransaction({ to: victim.target, value: 1 })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/access_control/mapping_write_test.js b/smartbugs-curated/0.4.x/test/access_control/mapping_write_test.js index 01caf33..bcbfb2c 100644 --- a/smartbugs-curated/0.4.x/test/access_control/mapping_write_test.js +++ b/smartbugs-curated/0.4.x/test/access_control/mapping_write_test.js @@ -24,7 +24,7 @@ describe("attack access_control/mapping_write.sol", function () { return { victim, attacker }; } - it("sanity check: access_control/mapping_write.sol", async function () { + it("functional check: access_control/mapping_write.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); await expect(victim.connect(a).set(1, 1)).to.not.be.reverted; diff --git a/smartbugs-curated/0.4.x/test/access_control/multiowned_vulnerable_test.js b/smartbugs-curated/0.4.x/test/access_control/multiowned_vulnerable_test.js index 3ed116d..20d70a1 100644 --- a/smartbugs-curated/0.4.x/test/access_control/multiowned_vulnerable_test.js +++ b/smartbugs-curated/0.4.x/test/access_control/multiowned_vulnerable_test.js @@ -28,7 +28,7 @@ describe("attack access_control/multiowned_vulnerable.sol", function () { return { victim, attacker }; } - it("sanity check: access_control/multiowned_vulnerable.sol", async function () { + it("functional check: access_control/multiowned_vulnerable.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a, b] = await ethers.getSigners(); await expect(victim.connect(owner).newOwner(a.address)).to.not.be.reverted; diff --git a/smartbugs-curated/0.4.x/test/access_control/mycontract_test.js b/smartbugs-curated/0.4.x/test/access_control/mycontract_test.js index d551933..2914e34 100644 --- a/smartbugs-curated/0.4.x/test/access_control/mycontract_test.js +++ b/smartbugs-curated/0.4.x/test/access_control/mycontract_test.js @@ -42,7 +42,7 @@ describe("attack access_control/mycontract.sol", function () { return { victim, attacker }; } - it("sanity check: access_control/mycontract.sol", async function () { + it("functional check: access_control/mycontract.sol", async function () { const { victim } = await loadFixture(deployContracts); await expect(victim.connect(victim_sig).sendTo(victim_sig.address, 1)).to .not.be.reverted; diff --git a/smartbugs-curated/0.4.x/test/access_control/parity_wallet_bug_2_test.js b/smartbugs-curated/0.4.x/test/access_control/parity_wallet_bug_2_test.js index 264e321..bb44027 100644 --- a/smartbugs-curated/0.4.x/test/access_control/parity_wallet_bug_2_test.js +++ b/smartbugs-curated/0.4.x/test/access_control/parity_wallet_bug_2_test.js @@ -28,7 +28,7 @@ describe("attack access_control/parity_wallet_bug_2.sol", function () { return { victim, attacker }; } - it("sanity check: access_control/parity_wallet_bug_2.sol", async function () { + it("functional check: access_control/parity_wallet_bug_2.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); await expect(victim.connect(owner).initWallet([owner.address], 1, 1)).to.not diff --git a/smartbugs-curated/0.4.x/test/access_control/phishable_test.js b/smartbugs-curated/0.4.x/test/access_control/phishable_test.js index a55b103..367ef17 100644 --- a/smartbugs-curated/0.4.x/test/access_control/phishable_test.js +++ b/smartbugs-curated/0.4.x/test/access_control/phishable_test.js @@ -32,7 +32,7 @@ describe("attack access_control/phishable.sol", function () { return { victim, attacker }; } - it("sanity check: access_control/phishable.sol", async function () { + it("functional check: access_control/phishable.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("1.0"); diff --git a/smartbugs-curated/0.4.x/test/access_control/proxy_test.js b/smartbugs-curated/0.4.x/test/access_control/proxy_test.js index d1b9f4a..ca40a34 100644 --- a/smartbugs-curated/0.4.x/test/access_control/proxy_test.js +++ b/smartbugs-curated/0.4.x/test/access_control/proxy_test.js @@ -40,7 +40,7 @@ describe("attack access_control/proxy.sol", function () { return { victim, attacker }; } - it("sanity check: access_control/proxy.sol", async function () { + it("functional check: access_control/proxy.sol", async function () { const { victim, attacker } = await loadFixture(deployContracts); const attackerInterface = new ethers.Interface(["function benign()"]); diff --git a/smartbugs-curated/0.4.x/test/access_control/simple_suicide_test.js b/smartbugs-curated/0.4.x/test/access_control/simple_suicide_test.js index 2f0ec93..b520b48 100644 --- a/smartbugs-curated/0.4.x/test/access_control/simple_suicide_test.js +++ b/smartbugs-curated/0.4.x/test/access_control/simple_suicide_test.js @@ -28,7 +28,7 @@ describe("attack access_control/simple_suicide.sol", function () { return { victim, attacker }; } - it("sanity check: access_control/simple_suicide.sol", async function () { + it("functional check: access_control/simple_suicide.sol", async function () { const { victim } = await loadFixture(deployContracts); await expect(victim.connect(owner).sudicideAnyone(owner)).to.not.be .reverted; diff --git a/smartbugs-curated/0.4.x/test/access_control/unprotected0_test.js b/smartbugs-curated/0.4.x/test/access_control/unprotected0_test.js index 6996aae..dc1a1e0 100644 --- a/smartbugs-curated/0.4.x/test/access_control/unprotected0_test.js +++ b/smartbugs-curated/0.4.x/test/access_control/unprotected0_test.js @@ -28,7 +28,7 @@ describe("attack access_control/unprotected0.sol", function () { return { victim, attacker }; } - it("sanity check: access_control/unprotected0.sol", async function () { + it("functional check: access_control/unprotected0.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); await expect(victim.connect(owner).changeOwner(a)).to.not.be.reverted; diff --git a/smartbugs-curated/0.4.x/test/access_control/wallet_02_refund_nosub_test.js b/smartbugs-curated/0.4.x/test/access_control/wallet_02_refund_nosub_test.js index d294d16..693516f 100644 --- a/smartbugs-curated/0.4.x/test/access_control/wallet_02_refund_nosub_test.js +++ b/smartbugs-curated/0.4.x/test/access_control/wallet_02_refund_nosub_test.js @@ -23,7 +23,7 @@ describe("attack access_control/wallet_02_refund_nosub.sol", function () { return { victim, attacker }; } - it("sanity check: access_control/wallet_02_refund_nosub.sol", async function () { + it("functional check: access_control/wallet_02_refund_nosub.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("1.0"); diff --git a/smartbugs-curated/0.4.x/test/access_control/wallet_03_wrong_constructor_test.js b/smartbugs-curated/0.4.x/test/access_control/wallet_03_wrong_constructor_test.js index a0d5934..e9ba0ce 100644 --- a/smartbugs-curated/0.4.x/test/access_control/wallet_03_wrong_constructor_test.js +++ b/smartbugs-curated/0.4.x/test/access_control/wallet_03_wrong_constructor_test.js @@ -24,7 +24,7 @@ describe("attack access_control/wallet_03_wrong_constructor.sol", function () { return { victim, attacker }; } - it("sanity check: access_control/wallet_03_wrong_constructor.sol", async function () { + it("functional check: access_control/wallet_03_wrong_constructor.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("2"); diff --git a/smartbugs-curated/0.4.x/test/access_control/wallet_04_confused_sign_test.js b/smartbugs-curated/0.4.x/test/access_control/wallet_04_confused_sign_test.js index 403a9c5..63387b2 100644 --- a/smartbugs-curated/0.4.x/test/access_control/wallet_04_confused_sign_test.js +++ b/smartbugs-curated/0.4.x/test/access_control/wallet_04_confused_sign_test.js @@ -26,7 +26,7 @@ describe("attack access_control/wallet_04_confused_sign.sol", function () { return { victim, attacker }; } - it("sanity check: access_control/wallet_04_confused_sign.sol", async function () { + it("functional check: access_control/wallet_04_confused_sign.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); diff --git a/smartbugs-curated/0.4.x/test/arithmetic/BECToken_test.js b/smartbugs-curated/0.4.x/test/arithmetic/BECToken_test.js index 38cb76c..5b0dbba 100644 --- a/smartbugs-curated/0.4.x/test/arithmetic/BECToken_test.js +++ b/smartbugs-curated/0.4.x/test/arithmetic/BECToken_test.js @@ -26,7 +26,7 @@ describe("attack arithmetic/BECToken.sol", function () { return { victim, attacker }; } - it("sanity check: arithmetic/BECToken.sol", async function () { + it("functional check: arithmetic/BECToken.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); const balance = await victim.balanceOf(victim.target); diff --git a/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_1_test.js b/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_1_test.js index 3a4c92f..d0b17b8 100644 --- a/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_1_test.js +++ b/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_1_test.js @@ -24,7 +24,7 @@ describe("attack arithmetic/integer_overflow_1.sol", function () { return { overflow, attacker }; } - it("sanity check: arithmetic/integer_overflow_1.sol", async function () { + it("functional check: arithmetic/integer_overflow_1.sol", async function () { const { overflow } = await loadFixture(deployContracts); let storage = await ethers.provider.getStorage(overflow.target, 0); let value = Number(storage); diff --git a/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_add_test.js b/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_add_test.js index 84a2a69..d97f3bd 100644 --- a/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_add_test.js +++ b/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_add_test.js @@ -26,7 +26,7 @@ describe("attack arithmetic/integer_overflow_add.sol", function () { return { overflow, attacker }; } - it("sanity check: arithmetic/integer_overflow_add.sol", async function () { + it("functional check: arithmetic/integer_overflow_add.sol", async function () { const { overflow } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); expect(await overflow.count()).to.equal(1); diff --git a/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_mapping_sym_1_test.js b/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_mapping_sym_1_test.js index d0465c3..5596d5c 100644 --- a/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_mapping_sym_1_test.js +++ b/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_mapping_sym_1_test.js @@ -19,7 +19,7 @@ describe("attack arithmetic/integer_overflow_mapping_sym_1.sol", function () { return { overflow }; } - it("sanity check: arithmetic/integer_overflow_mapping_sym_1.sol", async function () { + it("functional check: arithmetic/integer_overflow_mapping_sym_1.sol", async function () { const { overflow } = await loadFixture(deployContracts); const mappingSlot = BigInt(0); // map is at slot 0 const key = BigInt(0); // We want to find map[0] diff --git a/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_minimal_test.js b/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_minimal_test.js index 4c6374d..321c443 100644 --- a/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_minimal_test.js +++ b/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_minimal_test.js @@ -26,7 +26,7 @@ describe("attack arithmetic/integer_overflow_minimal.sol", function () { return { victim, attacker }; } - it("sanity check: arithmetic/integer_overflow_benign_1.sol", async function () { + it("functional check: arithmetic/integer_overflow_benign_1.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); expect(await victim.count()).to.equal(1); diff --git a/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_mul_test.js b/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_mul_test.js index 7968689..db7260e 100644 --- a/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_mul_test.js +++ b/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_mul_test.js @@ -26,7 +26,7 @@ describe("attack arithmetic/integer_overflow_mul.sol", function () { return { overflow, attacker }; } - it("sanity check: arithmetic/integer_overflow_mul.sol", async function () { + it("functional check: arithmetic/integer_overflow_mul.sol", async function () { const { overflow } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); expect(await overflow.count()).to.equal(2); diff --git a/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_multitx_multifunc_feasible_test.js b/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_multitx_multifunc_feasible_test.js index 761d3ac..7e989a8 100644 --- a/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_multitx_multifunc_feasible_test.js +++ b/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_multitx_multifunc_feasible_test.js @@ -27,7 +27,7 @@ describe("attack arithmetic/integer_overflow_multitx_multifunc_feasible.sol", fu return { victim, attacker }; } - it("sanity check: arithmetic/integer_overflow_multitx_multifunc_feasible.sol", async function () { + it("functional check: arithmetic/integer_overflow_multitx_multifunc_feasible.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); expect(await victim.count()).to.equal(1); diff --git a/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_multitx_onefunc_feasible_test.js b/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_multitx_onefunc_feasible_test.js index ebe00c0..e5c560e 100644 --- a/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_multitx_onefunc_feasible_test.js +++ b/smartbugs-curated/0.4.x/test/arithmetic/integer_overflow_multitx_onefunc_feasible_test.js @@ -26,7 +26,7 @@ describe("attack arithmetic/integer_overflow_multitx_onefunc_feasible.sol", func return { victim, attacker }; } - it("sanity check: arithmetic/integer_overflow_multitx_onefunc_feasible.sol", async function () { + it("functional check: arithmetic/integer_overflow_multitx_onefunc_feasible.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); expect(await victim.count()).to.equal(1); diff --git a/smartbugs-curated/0.4.x/test/arithmetic/overflow_simple_add_test.js b/smartbugs-curated/0.4.x/test/arithmetic/overflow_simple_add_test.js index 95c4d82..127d624 100644 --- a/smartbugs-curated/0.4.x/test/arithmetic/overflow_simple_add_test.js +++ b/smartbugs-curated/0.4.x/test/arithmetic/overflow_simple_add_test.js @@ -26,7 +26,7 @@ describe("attack arithmetic/overflow_simple_add.sol", function () { return { overflow, attacker }; } - it("sanity check: arithmetic/overflow_simple_add.sol", async function () { + it("functional check: arithmetic/overflow_simple_add.sol", async function () { const { overflow } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); expect(await overflow.balance()).to.equal(1); diff --git a/smartbugs-curated/0.4.x/test/arithmetic/overflow_single_tx_test.js b/smartbugs-curated/0.4.x/test/arithmetic/overflow_single_tx_test.js index 00d8b78..86c9f9b 100644 --- a/smartbugs-curated/0.4.x/test/arithmetic/overflow_single_tx_test.js +++ b/smartbugs-curated/0.4.x/test/arithmetic/overflow_single_tx_test.js @@ -30,21 +30,21 @@ describe("attack arithmetic/overflow_single_tx.sol", function () { return { victim, attacker }; } - it("sanity check: arithmetic/overflow_single_tx.sol add", async function () { + it("functional check: arithmetic/overflow_single_tx.sol add", async function () { const { victim } = await loadFixture(deployContracts); expect(await victim.count()).to.equal(1); await victim.connect(a).overflowaddtostate(1); expect(await victim.count()).to.equal(2); }); - it("sanity check: arithmetic/overflow_single_tx.sol mul", async function () { + it("functional check: arithmetic/overflow_single_tx.sol mul", async function () { const { victim } = await loadFixture(deployContracts); expect(await victim.count()).to.equal(1); await victim.connect(a).overflowmultostate(2); expect(await victim.count()).to.equal(2); }); - it("sanity check: arithmetic/overflow_single_tx.sol sub", async function () { + it("functional check: arithmetic/overflow_single_tx.sol sub", async function () { const { victim } = await loadFixture(deployContracts); expect(await victim.count()).to.equal(1); await victim.connect(a).underflowtostate(1); diff --git a/smartbugs-curated/0.4.x/test/arithmetic/timelock_test.js b/smartbugs-curated/0.4.x/test/arithmetic/timelock_test.js index e028142..712d717 100644 --- a/smartbugs-curated/0.4.x/test/arithmetic/timelock_test.js +++ b/smartbugs-curated/0.4.x/test/arithmetic/timelock_test.js @@ -26,7 +26,7 @@ describe("attack arithmetic/timeLock.sol", function () { return { victim, attacker }; } - it("sanity check: arithmetic/timeLock.sol", async function () { + it("functional check: arithmetic/timeLock.sol", async function () { const [v, a] = await ethers.getSigners(); const { victim } = await loadFixture(deployContracts); await expect(victim.connect(a).deposit({ value: 1 })).to.not.be.reverted; diff --git a/smartbugs-curated/0.4.x/test/arithmetic/token_test.js b/smartbugs-curated/0.4.x/test/arithmetic/token_test.js index 0513f7e..01aacab 100644 --- a/smartbugs-curated/0.4.x/test/arithmetic/token_test.js +++ b/smartbugs-curated/0.4.x/test/arithmetic/token_test.js @@ -28,7 +28,7 @@ describe("attack arithmetic/token.sol", function () { return { victim, attacker }; } - it("sanity check: arithmetic/token.sol", async function () { + it("functional check: arithmetic/token.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); expect(await victim.balanceOf(owner.address)).to.equal(1); diff --git a/smartbugs-curated/0.4.x/test/arithmetic/tokensalechallenge_test.js b/smartbugs-curated/0.4.x/test/arithmetic/tokensalechallenge_test.js index 01228fc..be3d129 100644 --- a/smartbugs-curated/0.4.x/test/arithmetic/tokensalechallenge_test.js +++ b/smartbugs-curated/0.4.x/test/arithmetic/tokensalechallenge_test.js @@ -29,7 +29,7 @@ describe("attack arithmetic/tokensalechallenge.sol", function () { return { victim, attacker }; } - it("sanity check: arithmetic/tokensalechallenge.sol", async function () { + it("functional check: arithmetic/tokensalechallenge.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); await expect(victim.connect(a).buy(1, { value: ethers.parseEther("1") })).to diff --git a/smartbugs-curated/0.4.x/test/bad_randomness/blackjack_test.js b/smartbugs-curated/0.4.x/test/bad_randomness/blackjack_test.js index 64f7642..0a1308b 100644 --- a/smartbugs-curated/0.4.x/test/bad_randomness/blackjack_test.js +++ b/smartbugs-curated/0.4.x/test/bad_randomness/blackjack_test.js @@ -38,7 +38,7 @@ describe("attack bad_randomness/blackjack.sol", function () { return { victim, attacker }; } - it("sanity check: bad_randomness/blackjack.sol", async function () { + it("functional check: bad_randomness/blackjack.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); expect(await ethers.provider.getBalance(victim.target)).to.equal( diff --git a/smartbugs-curated/0.4.x/test/bad_randomness/etheraffle_test.js b/smartbugs-curated/0.4.x/test/bad_randomness/etheraffle_test.js index 2095722..5e5c787 100644 --- a/smartbugs-curated/0.4.x/test/bad_randomness/etheraffle_test.js +++ b/smartbugs-curated/0.4.x/test/bad_randomness/etheraffle_test.js @@ -26,7 +26,7 @@ describe("attack bad_randomness/etheraffle.sol", function () { return { victim, attacker }; } - it("sanity check: bad_randomness/etheraffle.sol", async function () { + it("functional check: bad_randomness/etheraffle.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); await expect( diff --git a/smartbugs-curated/0.4.x/test/bad_randomness/guess_the_random_number_test.js b/smartbugs-curated/0.4.x/test/bad_randomness/guess_the_random_number_test.js index 2a0f86c..acb2d4b 100644 --- a/smartbugs-curated/0.4.x/test/bad_randomness/guess_the_random_number_test.js +++ b/smartbugs-curated/0.4.x/test/bad_randomness/guess_the_random_number_test.js @@ -45,7 +45,7 @@ describe("attack bad_randomness/guess_the_random_number.sol", function () { return { block, victim, attacker }; } - it("sanity check: bad_randomness/guess_the_random_number.sol", async function () { + it("functional check: bad_randomness/guess_the_random_number.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); await expect(victim.connect(a).guess(42, { value: ethers.parseEther("1") })) diff --git a/smartbugs-curated/0.4.x/test/bad_randomness/old_blockhash_test.js b/smartbugs-curated/0.4.x/test/bad_randomness/old_blockhash_test.js index b16195f..92bf5e9 100644 --- a/smartbugs-curated/0.4.x/test/bad_randomness/old_blockhash_test.js +++ b/smartbugs-curated/0.4.x/test/bad_randomness/old_blockhash_test.js @@ -45,7 +45,7 @@ describe("attack bad_randomness/old_blockhash.sol", function () { return { victim, attacker }; } - it("sanity check: bad_randomness/old_blockhash.sol", async function () { + it("functional check: bad_randomness/old_blockhash.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); const bytes = ethers.randomBytes(32); diff --git a/smartbugs-curated/0.4.x/test/denial_of_service/auction_test.js b/smartbugs-curated/0.4.x/test/denial_of_service/auction_test.js index e35179b..cf885dd 100644 --- a/smartbugs-curated/0.4.x/test/denial_of_service/auction_test.js +++ b/smartbugs-curated/0.4.x/test/denial_of_service/auction_test.js @@ -23,7 +23,7 @@ describe("attack denial_of_service/auction.sol", function () { return { victim, attacker }; } - it("sanity check: denial_of_service/auction.sol", async function () { + it("functional check: denial_of_service/auction.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a, b] = await ethers.getSigners(); const amount = ethers.parseEther("1"); diff --git a/smartbugs-curated/0.4.x/test/denial_of_service/dos_address_test.js b/smartbugs-curated/0.4.x/test/denial_of_service/dos_address_test.js index 358e628..82c912d 100644 --- a/smartbugs-curated/0.4.x/test/denial_of_service/dos_address_test.js +++ b/smartbugs-curated/0.4.x/test/denial_of_service/dos_address_test.js @@ -17,7 +17,7 @@ describe("attack denial_of_service/dos_address.sol", function () { return { victim }; } - it("sanity check: denial_of_service/dos_address.sol", async function () { + it("functional check: denial_of_service/dos_address.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); expect(await victim.connect(a).iWin()).to.be.false; diff --git a/smartbugs-curated/0.4.x/test/denial_of_service/dos_number_test.js b/smartbugs-curated/0.4.x/test/denial_of_service/dos_number_test.js index c200416..b59a2e9 100644 --- a/smartbugs-curated/0.4.x/test/denial_of_service/dos_number_test.js +++ b/smartbugs-curated/0.4.x/test/denial_of_service/dos_number_test.js @@ -19,7 +19,7 @@ describe("attack denial_of_service/dos_number.sol", function () { return { victim }; } - it("sanity check: denial_of_service/dos_number.sol", async function () { + it("functional check: denial_of_service/dos_number.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); for (let i = 0; i < 4; i++) { diff --git a/smartbugs-curated/0.4.x/test/denial_of_service/dos_simple_test.js b/smartbugs-curated/0.4.x/test/denial_of_service/dos_simple_test.js index 8409d21..4ac90b2 100644 --- a/smartbugs-curated/0.4.x/test/denial_of_service/dos_simple_test.js +++ b/smartbugs-curated/0.4.x/test/denial_of_service/dos_simple_test.js @@ -23,7 +23,7 @@ describe("attack denial_of_service/dos_simple.sol", function () { return { victim, attacker }; } - it("sanity check: denial_of_service/dos_simple.sol", async function () { + it("functional check: denial_of_service/dos_simple.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); await expect(victim.connect(a).ifillArray()).to.not.be.reverted; diff --git a/smartbugs-curated/0.4.x/test/front_running/ERC20_test.js b/smartbugs-curated/0.4.x/test/front_running/ERC20_test.js index ce47634..ba5e0f1 100644 --- a/smartbugs-curated/0.4.x/test/front_running/ERC20_test.js +++ b/smartbugs-curated/0.4.x/test/front_running/ERC20_test.js @@ -17,7 +17,7 @@ describe("attack front_running/ERC20.sol", function () { return { victim }; } - it("sanity check: front_running/ERC20.sol", async function () { + it("functional check: front_running/ERC20.sol", async function () { const { victim } = await loadFixture(deployContracts); await expect(victim.connect(owner).approve(attacker.address, 100)).to.not.be .reverted; diff --git a/smartbugs-curated/0.4.x/test/front_running/eth_tx_order_dependence_minimal_test.js b/smartbugs-curated/0.4.x/test/front_running/eth_tx_order_dependence_minimal_test.js index f84c953..3494bd3 100644 --- a/smartbugs-curated/0.4.x/test/front_running/eth_tx_order_dependence_minimal_test.js +++ b/smartbugs-curated/0.4.x/test/front_running/eth_tx_order_dependence_minimal_test.js @@ -20,7 +20,7 @@ describe("attack front_running/eth_tx_order_dependence_minimal.sol", function () return { victim }; } - it("sanity check: front_running/eth_tx_order_dependence_minimal.sol", async function () { + it("functional check: front_running/eth_tx_order_dependence_minimal.sol", async function () { const { victim } = await loadFixture(deployContracts); await expect(victim.connect(owner).setReward({ value: 2 })).to.not.be .reverted; diff --git a/smartbugs-curated/0.4.x/test/front_running/odds_and_evens_test.js b/smartbugs-curated/0.4.x/test/front_running/odds_and_evens_test.js index b456b1e..f21d83b 100644 --- a/smartbugs-curated/0.4.x/test/front_running/odds_and_evens_test.js +++ b/smartbugs-curated/0.4.x/test/front_running/odds_and_evens_test.js @@ -20,7 +20,7 @@ describe("attack front_running/odds_and_evens.sol", function () { return { victim }; } - it("sanity check: front_running/odds_and_evens.sol", async function () { + it("functional check: front_running/odds_and_evens.sol", async function () { const { victim } = await loadFixture(deployContracts); await expect( victim.connect(user).play(0, { value: ethers.parseEther("1") }), diff --git a/smartbugs-curated/0.4.x/test/other/crypto_roulette_test.js b/smartbugs-curated/0.4.x/test/other/crypto_roulette_test.js index d7bf881..1b21b76 100644 --- a/smartbugs-curated/0.4.x/test/other/crypto_roulette_test.js +++ b/smartbugs-curated/0.4.x/test/other/crypto_roulette_test.js @@ -21,7 +21,7 @@ describe("attack other/crypto_roulette.sol", function () { return { victim }; } - it("sanity check: other/crypto_roulette.sol", async function () { + it("functional check: other/crypto_roulette.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); await expect( diff --git a/smartbugs-curated/0.4.x/test/other/name_registrar_test.js b/smartbugs-curated/0.4.x/test/other/name_registrar_test.js index 099d8bd..4acdedb 100644 --- a/smartbugs-curated/0.4.x/test/other/name_registrar_test.js +++ b/smartbugs-curated/0.4.x/test/other/name_registrar_test.js @@ -26,7 +26,7 @@ describe("attack other/name_registrar.sol", function () { return { victim, attacker }; } - it("sanity check: other/name_registrar.sol", async function () { + it("functional check: other/name_registrar.sol", async function () { const { victim } = await loadFixture(deployContracts); const unlocked = await victim.unlocked(); expect(unlocked).to.be.false; diff --git a/smartbugs-curated/0.4.x/test/reentrancy/0x01f8c4e3fa3edeb29e514cba738d87ce8c091d3f_test.js b/smartbugs-curated/0.4.x/test/reentrancy/0x01f8c4e3fa3edeb29e514cba738d87ce8c091d3f_test.js index dc189ba..aad3b72 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/0x01f8c4e3fa3edeb29e514cba738d87ce8c091d3f_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/0x01f8c4e3fa3edeb29e514cba738d87ce8c091d3f_test.js @@ -38,7 +38,7 @@ describe("Reentrancy Attack for 0x01f8c4e3fa3edeb29e514cba738d87ce8c091d3f.sol", hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/0x01f8c4e3fa3edeb29e514cba738d87ce8c091d3f.sol", async function () { + it("functional check: reentrancy/0x01f8c4e3fa3edeb29e514cba738d87ce8c091d3f.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("1"); await expect(victim.connect(a).Deposit({ value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/0x23a91059fdc9579a9fbd0edc5f2ea0bfdb70deb4_test.js b/smartbugs-curated/0.4.x/test/reentrancy/0x23a91059fdc9579a9fbd0edc5f2ea0bfdb70deb4_test.js index d644e34..66c8ba3 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/0x23a91059fdc9579a9fbd0edc5f2ea0bfdb70deb4_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/0x23a91059fdc9579a9fbd0edc5f2ea0bfdb70deb4_test.js @@ -39,7 +39,7 @@ describe("Reentrancy Attack for 0x23a91059fdc9579a9fbd0edc5f2ea0bfdb70deb4.sol", hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/0x23a91059fdc9579a9fbd0edc5f2ea0bfdb70deb4.sol", async function () { + it("functional check: reentrancy/0x23a91059fdc9579a9fbd0edc5f2ea0bfdb70deb4.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("10"); await expect(victim.connect(a).Deposit({ value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/0x4320e6f8c05b27ab4707cd1f6d5ce6f3e4b3a5a1_test.js b/smartbugs-curated/0.4.x/test/reentrancy/0x4320e6f8c05b27ab4707cd1f6d5ce6f3e4b3a5a1_test.js index 35e7886..5c093a7 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/0x4320e6f8c05b27ab4707cd1f6d5ce6f3e4b3a5a1_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/0x4320e6f8c05b27ab4707cd1f6d5ce6f3e4b3a5a1_test.js @@ -39,7 +39,7 @@ describe("Reentrancy Attack for 0x4320e6f8c05b27ab4707cd1f6d5ce6f3e4b3a5a1.sol", hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/0x4320e6f8c05b27ab4707cd1f6d5ce6f3e4b3a5a1.sol", async function () { + it("functional check: reentrancy/0x4320e6f8c05b27ab4707cd1f6d5ce6f3e4b3a5a1.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("10"); await expect(victim.connect(a).Deposit({ value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/0x4e73b32ed6c35f570686b89848e5f39f20ecc106_test.js b/smartbugs-curated/0.4.x/test/reentrancy/0x4e73b32ed6c35f570686b89848e5f39f20ecc106_test.js index dcb4568..58cdd3e 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/0x4e73b32ed6c35f570686b89848e5f39f20ecc106_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/0x4e73b32ed6c35f570686b89848e5f39f20ecc106_test.js @@ -39,7 +39,7 @@ describe("Reentrancy Attack for 0x4e73b32ed6c35f570686b89848e5f39f20ecc106.sol", hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/0x4e73b32ed6c35f570686b89848e5f39f20ecc106.sol", async function () { + it("functional check: reentrancy/0x4e73b32ed6c35f570686b89848e5f39f20ecc106.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("10"); await expect(victim.connect(a).Deposit({ value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/0x561eac93c92360949ab1f1403323e6db345cbf31_test.js b/smartbugs-curated/0.4.x/test/reentrancy/0x561eac93c92360949ab1f1403323e6db345cbf31_test.js index f1e7514..020b8a5 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/0x561eac93c92360949ab1f1403323e6db345cbf31_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/0x561eac93c92360949ab1f1403323e6db345cbf31_test.js @@ -39,7 +39,7 @@ describe("Reentrancy Attack for 0x561eac93c92360949ab1f1403323e6db345cbf31.sol", hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/0x561eac93c92360949ab1f1403323e6db345cbf31.sol", async function () { + it("functional check: reentrancy/0x561eac93c92360949ab1f1403323e6db345cbf31.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("10"); await expect(victim.connect(a).Deposit({ value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/0x7541b76cb60f4c60af330c208b0623b7f54bf615_test.js b/smartbugs-curated/0.4.x/test/reentrancy/0x7541b76cb60f4c60af330c208b0623b7f54bf615_test.js index 9341942..18405ce 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/0x7541b76cb60f4c60af330c208b0623b7f54bf615_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/0x7541b76cb60f4c60af330c208b0623b7f54bf615_test.js @@ -38,7 +38,7 @@ describe("Reentrancy Attack for 0x7541b76cb60f4c60af330c208b0623b7f54bf615.sol", hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/0x7541b76cb60f4c60af330c208b0623b7f54bf615.sol", async function () { + it("functional check: reentrancy/0x7541b76cb60f4c60af330c208b0623b7f54bf615.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("10"); await expect(victim.connect(a).Put(0, { value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/0x7a8721a9d64c74da899424c1b52acbf58ddc9782_test.js b/smartbugs-curated/0.4.x/test/reentrancy/0x7a8721a9d64c74da899424c1b52acbf58ddc9782_test.js index 50d21e0..c65a588 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/0x7a8721a9d64c74da899424c1b52acbf58ddc9782_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/0x7a8721a9d64c74da899424c1b52acbf58ddc9782_test.js @@ -39,7 +39,7 @@ describe("Reentrancy Attack for 0x7a8721a9d64c74da899424c1b52acbf58ddc9782.sol", hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/0x7a8721a9d64c74da899424c1b52acbf58ddc9782.sol", async function () { + it("functional check: reentrancy/0x7a8721a9d64c74da899424c1b52acbf58ddc9782.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("10"); await expect(victim.connect(a).Deposit({ value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/0x7b368c4e805c3870b6c49a3f1f49f69af8662cf3_test.js b/smartbugs-curated/0.4.x/test/reentrancy/0x7b368c4e805c3870b6c49a3f1f49f69af8662cf3_test.js index 994dcdd..d132492 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/0x7b368c4e805c3870b6c49a3f1f49f69af8662cf3_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/0x7b368c4e805c3870b6c49a3f1f49f69af8662cf3_test.js @@ -38,7 +38,7 @@ describe("Reentrancy Attack for 0x7b368c4e805c3870b6c49a3f1f49f69af8662cf3.sol", hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/0x7b368c4e805c3870b6c49a3f1f49f69af8662cf3.sol", async function () { + it("functional check: reentrancy/0x7b368c4e805c3870b6c49a3f1f49f69af8662cf3.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("2"); await expect(victim.connect(a).Put(0, { value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/0x8c7777c45481dba411450c228cb692ac3d550344_test.js b/smartbugs-curated/0.4.x/test/reentrancy/0x8c7777c45481dba411450c228cb692ac3d550344_test.js index 3133904..c6822a5 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/0x8c7777c45481dba411450c228cb692ac3d550344_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/0x8c7777c45481dba411450c228cb692ac3d550344_test.js @@ -40,7 +40,7 @@ describe("Reentrancy Attack for 0x8c7777c45481dba411450c228cb692ac3d550344.sol", hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/0x8c7777c45481dba411450c228cb692ac3d550344.sol", async function () { + it("functional check: reentrancy/0x8c7777c45481dba411450c228cb692ac3d550344.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("10"); await expect(victim.connect(a).Deposit({ value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/0x93c32845fae42c83a70e5f06214c8433665c2ab5_test.js b/smartbugs-curated/0.4.x/test/reentrancy/0x93c32845fae42c83a70e5f06214c8433665c2ab5_test.js index 56667fa..6d1735d 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/0x93c32845fae42c83a70e5f06214c8433665c2ab5_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/0x93c32845fae42c83a70e5f06214c8433665c2ab5_test.js @@ -40,7 +40,7 @@ describe("Reentrancy Attack for 0x93c32845fae42c83a70e5f06214c8433665c2ab5.sol", hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/0x93c32845fae42c83a70e5f06214c8433665c2ab5.sol", async function () { + it("functional check: reentrancy/0x93c32845fae42c83a70e5f06214c8433665c2ab5.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("10"); await expect(victim.connect(a).Put(0, { value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/0x941d225236464a25eb18076df7da6a91d0f95e9e_test.js b/smartbugs-curated/0.4.x/test/reentrancy/0x941d225236464a25eb18076df7da6a91d0f95e9e_test.js index 8d8a0a1..63921ae 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/0x941d225236464a25eb18076df7da6a91d0f95e9e_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/0x941d225236464a25eb18076df7da6a91d0f95e9e_test.js @@ -38,7 +38,7 @@ describe("Reentrancy Attack for 0x941d225236464a25eb18076df7da6a91d0f95e9e.sol", hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/0x941d225236464a25eb18076df7da6a91d0f95e9e.sol", async function () { + it("functional check: reentrancy/0x941d225236464a25eb18076df7da6a91d0f95e9e.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("10"); await expect(victim.connect(a).Deposit({ value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/0x96edbe868531bd23a6c05e9d0c424ea64fb1b78b_test.js b/smartbugs-curated/0.4.x/test/reentrancy/0x96edbe868531bd23a6c05e9d0c424ea64fb1b78b_test.js index 33372f5..bf30f99 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/0x96edbe868531bd23a6c05e9d0c424ea64fb1b78b_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/0x96edbe868531bd23a6c05e9d0c424ea64fb1b78b_test.js @@ -39,7 +39,7 @@ describe("Reentrancy Attack for 0x96edbe868531bd23a6c05e9d0c424ea64fb1b78b.sol", hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/0x96edbe868531bd23a6c05e9d0c424ea64fb1b78b.sol", async function () { + it("functional check: reentrancy/0x96edbe868531bd23a6c05e9d0c424ea64fb1b78b.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("10"); await expect(victim.connect(a).Put(0, { value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/0xaae1f51cf3339f18b6d3f3bdc75a5facd744b0b8_test.js b/smartbugs-curated/0.4.x/test/reentrancy/0xaae1f51cf3339f18b6d3f3bdc75a5facd744b0b8_test.js index fa9c3ff..295fd1d 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/0xaae1f51cf3339f18b6d3f3bdc75a5facd744b0b8_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/0xaae1f51cf3339f18b6d3f3bdc75a5facd744b0b8_test.js @@ -39,7 +39,7 @@ describe("Reentrancy Attack for 0xaae1f51cf3339f18b6d3f3bdc75a5facd744b0b8.sol", hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/0xaae1f51cf3339f18b6d3f3bdc75a5facd744b0b8.sol", async function () { + it("functional check: reentrancy/0xaae1f51cf3339f18b6d3f3bdc75a5facd744b0b8.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("10"); await expect(victim.connect(a).Deposit({ value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/0xb5e1b1ee15c6fa0e48fce100125569d430f1bd12_test.js b/smartbugs-curated/0.4.x/test/reentrancy/0xb5e1b1ee15c6fa0e48fce100125569d430f1bd12_test.js index 0e47ce1..8f9ce90 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/0xb5e1b1ee15c6fa0e48fce100125569d430f1bd12_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/0xb5e1b1ee15c6fa0e48fce100125569d430f1bd12_test.js @@ -39,7 +39,7 @@ describe("Reentrancy Attack for 0xb5e1b1ee15c6fa0e48fce100125569d430f1bd12.sol", hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/0xb5e1b1ee15c6fa0e48fce100125569d430f1bd12.sol", async function () { + it("functional check: reentrancy/0xb5e1b1ee15c6fa0e48fce100125569d430f1bd12.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("10"); await expect(victim.connect(a).Deposit({ value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/0xb93430ce38ac4a6bb47fb1fc085ea669353fd89e_test.js b/smartbugs-curated/0.4.x/test/reentrancy/0xb93430ce38ac4a6bb47fb1fc085ea669353fd89e_test.js index 8fa9c9e..913d005 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/0xb93430ce38ac4a6bb47fb1fc085ea669353fd89e_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/0xb93430ce38ac4a6bb47fb1fc085ea669353fd89e_test.js @@ -39,7 +39,7 @@ describe("Reentrancy Attack for 0xb93430ce38ac4a6bb47fb1fc085ea669353fd89e.sol", hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/0xb93430ce38ac4a6bb47fb1fc085ea669353fd89e.sol", async function () { + it("functional check: reentrancy/0xb93430ce38ac4a6bb47fb1fc085ea669353fd89e.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("10"); await expect(victim.connect(a).Deposit({ value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/0xbaf51e761510c1a11bf48dd87c0307ac8a8c8a4f_test.js b/smartbugs-curated/0.4.x/test/reentrancy/0xbaf51e761510c1a11bf48dd87c0307ac8a8c8a4f_test.js index a84c5f9..71b4b6a 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/0xbaf51e761510c1a11bf48dd87c0307ac8a8c8a4f_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/0xbaf51e761510c1a11bf48dd87c0307ac8a8c8a4f_test.js @@ -39,7 +39,7 @@ describe("Reentrancy Attack for 0xbaf51e761510c1a11bf48dd87c0307ac8a8c8a4f.sol", hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/0xbaf51e761510c1a11bf48dd87c0307ac8a8c8a4f.sol", async function () { + it("functional check: reentrancy/0xbaf51e761510c1a11bf48dd87c0307ac8a8c8a4f.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("10"); await expect(victim.connect(a).Deposit({ value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/0xbe4041d55db380c5ae9d4a9b9703f1ed4e7e3888_test.js b/smartbugs-curated/0.4.x/test/reentrancy/0xbe4041d55db380c5ae9d4a9b9703f1ed4e7e3888_test.js index 325f8e6..5d7fe39 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/0xbe4041d55db380c5ae9d4a9b9703f1ed4e7e3888_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/0xbe4041d55db380c5ae9d4a9b9703f1ed4e7e3888_test.js @@ -39,7 +39,7 @@ describe("Reentrancy Attack for 0xbe4041d55db380c5ae9d4a9b9703f1ed4e7e3888.sol", hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/0xbe4041d55db380c5ae9d4a9b9703f1ed4e7e3888.sol", async function () { + it("functional check: reentrancy/0xbe4041d55db380c5ae9d4a9b9703f1ed4e7e3888.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("10"); await expect(victim.connect(a).Put(0, { value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/0xcead721ef5b11f1a7b530171aab69b16c5e66b6e_test.js b/smartbugs-curated/0.4.x/test/reentrancy/0xcead721ef5b11f1a7b530171aab69b16c5e66b6e_test.js index e0cd906..29a1186 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/0xcead721ef5b11f1a7b530171aab69b16c5e66b6e_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/0xcead721ef5b11f1a7b530171aab69b16c5e66b6e_test.js @@ -38,7 +38,7 @@ describe("Reentrancy Attack for 0xcead721ef5b11f1a7b530171aab69b16c5e66b6e.sol", hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/0xcead721ef5b11f1a7b530171aab69b16c5e66b6e.sol", async function () { + it("functional check: reentrancy/0xcead721ef5b11f1a7b530171aab69b16c5e66b6e.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("10"); await expect(victim.connect(a).Put(0, { value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/0xf015c35649c82f5467c9c74b7f28ee67665aad68_test.js b/smartbugs-curated/0.4.x/test/reentrancy/0xf015c35649c82f5467c9c74b7f28ee67665aad68_test.js index 060614d..fa7e3df 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/0xf015c35649c82f5467c9c74b7f28ee67665aad68_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/0xf015c35649c82f5467c9c74b7f28ee67665aad68_test.js @@ -38,7 +38,7 @@ describe("Reentrancy Attack for 0xf015c35649c82f5467c9c74b7f28ee67665aad68.sol", hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/0xf015c35649c82f5467c9c74b7f28ee67665aad68.sol", async function () { + it("functional check: reentrancy/0xf015c35649c82f5467c9c74b7f28ee67665aad68.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("10"); await expect(victim.connect(a).Put(0, { value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/etherstore_test.js b/smartbugs-curated/0.4.x/test/reentrancy/etherstore_test.js index c513671..fa18ebb 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/etherstore_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/etherstore_test.js @@ -31,7 +31,7 @@ describe("Reentrancy Attack for etherstore.sol", function () { hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/etherstore.sol", async function () { + it("functional check: reentrancy/etherstore.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("1"); await expect(victim.connect(a).depositFunds({ value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/modifier_reentrancy_test.js b/smartbugs-curated/0.4.x/test/reentrancy/modifier_reentrancy_test.js index 54e71fc..d9b890c 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/modifier_reentrancy_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/modifier_reentrancy_test.js @@ -34,7 +34,7 @@ describe("Reentrancy Attack for modifier_reentrancy.sol", function () { hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/modifier_reentrancy.sol", async function () { + it("functional check: reentrancy/modifier_reentrancy.sol", async function () { const [v, a] = await ethers.getSigners(); await expect(contract.connect(a).airDrop()).to.not.be.reverted; expect(await victim.tokenBalance(contract.target)).to.equal("20"); diff --git a/smartbugs-curated/0.4.x/test/reentrancy/reentrance_test.js b/smartbugs-curated/0.4.x/test/reentrancy/reentrance_test.js index 9d445e3..4f77711 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/reentrance_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/reentrance_test.js @@ -28,7 +28,7 @@ describe("Reentrancy Attack for reentrance.sol", function () { hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/reentrance.sol", async function () { + it("functional check: reentrancy/reentrance.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("1"); expect(await victim.balanceOf(a.address)).to.equal(0); diff --git a/smartbugs-curated/0.4.x/test/reentrancy/reentrancy_bonus_test.js b/smartbugs-curated/0.4.x/test/reentrancy/reentrancy_bonus_test.js index 59fb930..7ecb464 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/reentrancy_bonus_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/reentrancy_bonus_test.js @@ -28,7 +28,7 @@ describe("Reentrancy Attack for reentrancy_bonus.sol", function () { hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/reentrancy_bonus.sol", async function () { + it("functional check: reentrancy/reentrancy_bonus.sol", async function () { const [v, a] = await ethers.getSigners(); await network.provider.send("hardhat_setBalance", [victim.target, "0x64"]); const amount = 100; diff --git a/smartbugs-curated/0.4.x/test/reentrancy/reentrancy_dao_test.js b/smartbugs-curated/0.4.x/test/reentrancy/reentrancy_dao_test.js index e954007..695c1fc 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/reentrancy_dao_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/reentrancy_dao_test.js @@ -29,7 +29,7 @@ describe("Reentrancy Attack for reentrancy_dao.sol", function () { hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/reentrancy_dao.sol", async function () { + it("functional check: reentrancy/reentrancy_dao.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("1"); await expect(victim.connect(a).deposit({ value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/reentrancy_simple_test.js b/smartbugs-curated/0.4.x/test/reentrancy/reentrancy_simple_test.js index c20b10a..65675c4 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/reentrancy_simple_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/reentrancy_simple_test.js @@ -28,7 +28,7 @@ describe("Reentrancy Attack for reentrancy_simple.sol", function () { hacker = await MaliciousContract.deploy(victim.target); }); - it("sanity check: reentrancy/reentrancy_simple.sol", async function () { + it("functional check: reentrancy/reentrancy_simple.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("1"); await expect(victim.connect(a).addToBalance({ value: amount })).to.not.be diff --git a/smartbugs-curated/0.4.x/test/reentrancy/simple_dao_test.js b/smartbugs-curated/0.4.x/test/reentrancy/simple_dao_test.js index 8fbe3ad..3e359d5 100644 --- a/smartbugs-curated/0.4.x/test/reentrancy/simple_dao_test.js +++ b/smartbugs-curated/0.4.x/test/reentrancy/simple_dao_test.js @@ -32,7 +32,7 @@ describe("Reentrancy Attack for simpleDAO.sol", function () { return { simpleDAO, maliciousContract }; } - it("sanity check: reentrancy/simpleDAO.sol", async function () { + it("functional check: reentrancy/simpleDAO.sol", async function () { const [v, a] = await ethers.getSigners(); const amount = ethers.parseEther("1"); const { simpleDAO } = await loadFixture(deployContracts); diff --git a/smartbugs-curated/0.4.x/test/time_manipulation/ether_lotto_test.js b/smartbugs-curated/0.4.x/test/time_manipulation/ether_lotto_test.js index 7cd2786..0a3709c 100644 --- a/smartbugs-curated/0.4.x/test/time_manipulation/ether_lotto_test.js +++ b/smartbugs-curated/0.4.x/test/time_manipulation/ether_lotto_test.js @@ -24,7 +24,7 @@ describe("attack time_manipulation/ether_lotto.sol", function () { return { victim, attacker }; } - it("sanity check: time_manipulation/ether_lotto.sol", async function () { + it("functional check: time_manipulation/ether_lotto.sol", async function () { const { victim } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); const amount = 10; diff --git a/smartbugs-curated/0.4.x/test/time_manipulation/roulette_test.js b/smartbugs-curated/0.4.x/test/time_manipulation/roulette_test.js index dffe151..23e94ad 100644 --- a/smartbugs-curated/0.4.x/test/time_manipulation/roulette_test.js +++ b/smartbugs-curated/0.4.x/test/time_manipulation/roulette_test.js @@ -23,7 +23,7 @@ describe("attack time_manipulation/roulette.sol", function () { return { victim }; } - it("sanity check: time_manipulation/roulette.sol", async function () { + it("functional check: time_manipulation/roulette.sol", async function () { const { victim } = await loadFixture(deployContracts); await expect( sig1.sendTransaction({ diff --git a/smartbugs-curated/0.4.x/test/time_manipulation/timed_crowdsale_test.js b/smartbugs-curated/0.4.x/test/time_manipulation/timed_crowdsale_test.js index ee51be0..58ed237 100644 --- a/smartbugs-curated/0.4.x/test/time_manipulation/timed_crowdsale_test.js +++ b/smartbugs-curated/0.4.x/test/time_manipulation/timed_crowdsale_test.js @@ -23,7 +23,7 @@ describe("attack time_manipulation/timed_crowdsale.sol", function () { return { victim }; } - it("sanity check: time_manipulation/timed_crowdsale.sol", async function () { + it("functional check: time_manipulation/timed_crowdsale.sol", async function () { await hre.network.provider.send("hardhat_reset"); const { victim } = await deployContracts(); const [v, a] = await ethers.getSigners(); diff --git a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x07f7ecb66d788ab01dc93b9b71a88401de7d0f2e_test.js b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x07f7ecb66d788ab01dc93b9b71a88401de7d0f2e_test.js index 2b6df05..181d17d 100644 --- a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x07f7ecb66d788ab01dc93b9b71a88401de7d0f2e_test.js +++ b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x07f7ecb66d788ab01dc93b9b71a88401de7d0f2e_test.js @@ -38,7 +38,7 @@ describe("attack unchecked_low_level_calls/0x07f7ecb66d788ab01dc93b9b71a88401de7 return { contract, revertContract, successPoC, successContract }; } - it("sanity check: unchecked_low_level_calls/0x07f7ecb66d788ab01dc93b9b71a88401de7d0f2e.sol", async function () { + it("functional check: unchecked_low_level_calls/0x07f7ecb66d788ab01dc93b9b71a88401de7d0f2e.sol", async function () { const { successPoC, successContract } = await loadFixture(deployContracts); const [_, a] = await ethers.getSigners(); const donatedValue = await ethers.provider.getStorage(successPoC.target, 8); diff --git a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x2972d548497286d18e92b5fa1f8f9139e5653fd2_test.js b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x2972d548497286d18e92b5fa1f8f9139e5653fd2_test.js index 13a1069..60fb3ff 100644 --- a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x2972d548497286d18e92b5fa1f8f9139e5653fd2_test.js +++ b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x2972d548497286d18e92b5fa1f8f9139e5653fd2_test.js @@ -28,7 +28,7 @@ describe("attack unchecked_low_level_calls/0x2972d548497286d18e92b5fa1f8f9139e56 return { contract, token, success_contract }; } - it("sanity check: unchecked_low_level_calls/0x2972d548497286d18e92b5fa1f8f9139e5653fd2.sol", async function () { + it("functional check: unchecked_low_level_calls/0x2972d548497286d18e92b5fa1f8f9139e5653fd2.sol", async function () { const { contract, success_contract } = await loadFixture(deployContracts); const amount = ethers.parseEther("1"); await expect( diff --git a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x39cfd754c85023648bf003bea2dd498c5612abfa_test.js b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x39cfd754c85023648bf003bea2dd498c5612abfa_test.js index 90fffc5..9df5643 100644 --- a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x39cfd754c85023648bf003bea2dd498c5612abfa_test.js +++ b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x39cfd754c85023648bf003bea2dd498c5612abfa_test.js @@ -28,7 +28,7 @@ describe("attack unchecked_low_level_calls/0x39cfd754c85023648bf003bea2dd498c561 return { contract, revertContract, successContract }; } - it("sanity check: unchecked_low_level_calls/0x39cfd754c85023648bf003bea2dd498c5612abfa.sol in WithdrawToken()", async function () { + it("functional check: unchecked_low_level_calls/0x39cfd754c85023648bf003bea2dd498c5612abfa.sol in WithdrawToken()", async function () { const { contract, successContract } = await loadFixture(deployContracts); await expect(contract.connect(owner).initTokenBank()).to.not.be.reverted; const amount = ethers.parseEther("2"); diff --git a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x3a0e9acd953ffc0dd18d63603488846a6b8b2b01_test.js b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x3a0e9acd953ffc0dd18d63603488846a6b8b2b01_test.js index cdf54c3..ff02d99 100644 --- a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x3a0e9acd953ffc0dd18d63603488846a6b8b2b01_test.js +++ b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x3a0e9acd953ffc0dd18d63603488846a6b8b2b01_test.js @@ -28,7 +28,7 @@ describe("attack unchecked_low_level_calls/0x3a0e9acd953ffc0dd18d63603488846a6b8 return { contract, revertContract, token }; } - it("sanity check: unchecked_low_level_calls/0x3a0e9acd953ffc0dd18d63603488846a6b8b2b01.sol", async function () { + it("functional check: unchecked_low_level_calls/0x3a0e9acd953ffc0dd18d63603488846a6b8b2b01.sol", async function () { const { contract, token } = await loadFixture(deployContracts); const ownerBalance = await token.balanceOf(owner.address); const amount = ethers.parseEther("2"); diff --git a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x4051334adc52057aca763453820cb0e045076ef3_test.js b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x4051334adc52057aca763453820cb0e045076ef3_test.js index 05c12a2..49a30d6 100644 --- a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x4051334adc52057aca763453820cb0e045076ef3_test.js +++ b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x4051334adc52057aca763453820cb0e045076ef3_test.js @@ -28,7 +28,7 @@ describe("attack unchecked_low_level_calls/0x4051334adc52057aca763453820cb0e0450 return { contract, token, success_contract }; } - it("sanity check: unchecked_low_level_calls/0x4051334adc52057aca763453820cb0e045076ef3.sol", async function () { + it("functional check: unchecked_low_level_calls/0x4051334adc52057aca763453820cb0e045076ef3.sol", async function () { const { contract, success_contract } = await loadFixture(deployContracts); const amount = ethers.parseEther("1"); await expect( diff --git a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x4b71ad9c1a84b9b643aa54fdd66e2dec96e8b152_test.js b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x4b71ad9c1a84b9b643aa54fdd66e2dec96e8b152_test.js index ab5ec01..5e17e29 100644 --- a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x4b71ad9c1a84b9b643aa54fdd66e2dec96e8b152_test.js +++ b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x4b71ad9c1a84b9b643aa54fdd66e2dec96e8b152_test.js @@ -28,7 +28,7 @@ describe("attack unchecked_low_level_calls/0x4b71ad9c1a84b9b643aa54fdd66e2dec96e return { contract, token, success_contract }; } - it("sanity check: unchecked_low_level_calls/0x4b71ad9c1a84b9b643aa54fdd66e2dec96e8b152.sol", async function () { + it("functional check: unchecked_low_level_calls/0x4b71ad9c1a84b9b643aa54fdd66e2dec96e8b152.sol", async function () { const { contract, success_contract } = await loadFixture(deployContracts); await expect( contract diff --git a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x52d2e0f9b01101a59b38a3d05c80b7618aeed984_test.js b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x52d2e0f9b01101a59b38a3d05c80b7618aeed984_test.js index 0e1fe2c..7fde0ea 100644 --- a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x52d2e0f9b01101a59b38a3d05c80b7618aeed984_test.js +++ b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x52d2e0f9b01101a59b38a3d05c80b7618aeed984_test.js @@ -29,7 +29,7 @@ describe("attack unchecked_low_level_calls/0x52d2e0f9b01101a59b38a3d05c80b7618ae return { contract, revertContract, successContract }; } - it("sanity check: unchecked_low_level_calls/0x52d2e0f9b01101a59b38a3d05c80b7618aeed984.sol", async function () { + it("functional check: unchecked_low_level_calls/0x52d2e0f9b01101a59b38a3d05c80b7618aeed984.sol", async function () { const { contract, successContract } = await loadFixture(deployContracts); const [_, sig] = await ethers.getSigners(); await expect(contract.connect(sig).getTokens(2, successContract.target)).to diff --git a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x627fa62ccbb1c1b04ffaecd72a53e37fc0e17839_test.js b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x627fa62ccbb1c1b04ffaecd72a53e37fc0e17839_test.js index 40c8cb0..6baadc9 100644 --- a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x627fa62ccbb1c1b04ffaecd72a53e37fc0e17839_test.js +++ b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x627fa62ccbb1c1b04ffaecd72a53e37fc0e17839_test.js @@ -28,7 +28,7 @@ describe("attack unchecked_low_level_calls/0x627fa62ccbb1c1b04ffaecd72a53e37fc0e return { contract, revertContract, successContract }; } - it("sanity check: unchecked_low_level_calls/0x627fa62ccbb1c1b04ffaecd72a53e37fc0e17839.sol", async function () { + it("functional check: unchecked_low_level_calls/0x627fa62ccbb1c1b04ffaecd72a53e37fc0e17839.sol", async function () { const { contract, successContract } = await loadFixture(deployContracts); await expect(contract.connect(owner).initTokenBank()).to.not.be.reverted; const amount = ethers.parseEther("2"); diff --git a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x663e4229142a27f00bafb5d087e1e730648314c3_test.js b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x663e4229142a27f00bafb5d087e1e730648314c3_test.js index 1a009b9..b131767 100644 --- a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x663e4229142a27f00bafb5d087e1e730648314c3_test.js +++ b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x663e4229142a27f00bafb5d087e1e730648314c3_test.js @@ -111,7 +111,7 @@ describe("attack unchecked_low_level_calls/0x663e4229142a27f00bafb5d087e1e730648 }; } - it("sanity check: unchecked_low_level_calls/0x663e4229142a27f00bafb5d087e1e730648314c3.sol in function withdrawAuctionBalances()", async function () { + it("functional check: unchecked_low_level_calls/0x663e4229142a27f00bafb5d087e1e730648314c3.sol in function withdrawAuctionBalances()", async function () { const { contract, saleAuctionSuccess, siringAuction } = await loadFixture(deployContracts); await expect( @@ -141,7 +141,7 @@ describe("attack unchecked_low_level_calls/0x663e4229142a27f00bafb5d087e1e730648 ); }); - it("sanity check: unchecked_low_level_calls/0x663e4229142a27f00bafb5d087e1e730648314c3.sol in function giveBirth()", async function () { + it("functional check: unchecked_low_level_calls/0x663e4229142a27f00bafb5d087e1e730648314c3.sol in function giveBirth()", async function () { const { pandaCallerSuccess, contract, saleAuction, siringAuction } = await loadFixture(deployContracts); await contract.connect(owner).setCFO(pandaCallerSuccess.target); diff --git a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x7d09edb07d23acb532a82be3da5c17d9d85806b4_test.js b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x7d09edb07d23acb532a82be3da5c17d9d85806b4_test.js index c2f18fc..d833455 100644 --- a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x7d09edb07d23acb532a82be3da5c17d9d85806b4_test.js +++ b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x7d09edb07d23acb532a82be3da5c17d9d85806b4_test.js @@ -38,7 +38,7 @@ describe("attack unchecked_low_level_calls/0x7d09edb07d23acb532a82be3da5c17d9d85 return { contract, revertContract, successPoC, successContract }; } - it("sanity check: unchecked_low_level_calls/0x7d09edb07d23acb532a82be3da5c17d9d85806b4.sol", async function () { + it("functional check: unchecked_low_level_calls/0x7d09edb07d23acb532a82be3da5c17d9d85806b4.sol", async function () { const { successPoC, successContract } = await loadFixture(deployContracts); const [v, a] = await ethers.getSigners(); const donatedValue = await ethers.provider.getStorage(successPoC.target, 8); diff --git a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x89c1b3807d4c67df034fffb62f3509561218d30b_test.js b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x89c1b3807d4c67df034fffb62f3509561218d30b_test.js index 3572d1e..6ea99d9 100644 --- a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x89c1b3807d4c67df034fffb62f3509561218d30b_test.js +++ b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x89c1b3807d4c67df034fffb62f3509561218d30b_test.js @@ -28,7 +28,7 @@ describe("attack unchecked_low_level_calls/unchecked_return_value.sol", function return { contract, caller, successCaller }; } - it("sanity check: unchecked_low_level_calls/0x89c1b3807d4c67df034fffb62f3509561218d30b_attack.sol in line 180", async function () { + it("functional check: unchecked_low_level_calls/0x89c1b3807d4c67df034fffb62f3509561218d30b_attack.sol in line 180", async function () { const { contract, successCaller } = await loadFixture(deployContracts); const SGX_ADDRESS = "0x18513702cCd928F2A3eb63d900aDf03c9cc81593"; await network.provider.request({ @@ -74,7 +74,7 @@ describe("attack unchecked_low_level_calls/unchecked_return_value.sol", function expect(fee[1]).to.be.equal(0); }); - it("sanity check: unchecked_low_level_calls/0x89c1b3807d4c67df034fffb62f3509561218d30b_attack.sol in line 192", async function () { + it("functional check: unchecked_low_level_calls/0x89c1b3807d4c67df034fffb62f3509561218d30b_attack.sol in line 192", async function () { const { contract, successCaller } = await loadFixture(deployContracts); const SGX_ADDRESS = "0x18513702cCd928F2A3eb63d900aDf03c9cc81593"; await network.provider.request({ diff --git a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x8fd1e427396ddb511533cf9abdbebd0a7e08da35_test.js b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x8fd1e427396ddb511533cf9abdbebd0a7e08da35_test.js index 4bca096..b673da4 100644 --- a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x8fd1e427396ddb511533cf9abdbebd0a7e08da35_test.js +++ b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0x8fd1e427396ddb511533cf9abdbebd0a7e08da35_test.js @@ -28,7 +28,7 @@ describe("attack unchecked_low_level_calls/0x8fd1e427396ddb511533cf9abdbebd0a7e0 return { contract, revertContract, successContract }; } - it("sanity check: unchecked_low_level_calls/0x8fd1e427396ddb511533cf9abdbebd0a7e08da35.sol in WithdrawToken()", async function () { + it("functional check: unchecked_low_level_calls/0x8fd1e427396ddb511533cf9abdbebd0a7e08da35.sol in WithdrawToken()", async function () { const { contract, successContract } = await loadFixture(deployContracts); await expect(contract.connect(owner).initTokenBank()).to.not.be.reverted; const amount = ethers.parseEther("2"); diff --git a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xa1fceeff3acc57d257b917e30c4df661401d6431_test.js b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xa1fceeff3acc57d257b917e30c4df661401d6431_test.js index 3376ea9..89b3d2d 100644 --- a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xa1fceeff3acc57d257b917e30c4df661401d6431_test.js +++ b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xa1fceeff3acc57d257b917e30c4df661401d6431_test.js @@ -31,7 +31,7 @@ describe("attack unchecked_low_level_calls/0xa1fceeff3acc57d257b917e30c4df661401 return { contract, token, success_contract }; } - it("sanity check: unchecked_low_level_calls/0xa1fceeff3acc57d257b917e30c4df661401d6431.sol", async function () { + it("functional check: unchecked_low_level_calls/0xa1fceeff3acc57d257b917e30c4df661401d6431.sol", async function () { const { contract, success_contract } = await loadFixture(deployContracts); const amount = ethers.parseEther("1"); await success_contract.connect(owner).transfer(sig.address, amount); diff --git a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xa46edd6a9a93feec36576ee5048146870ea2c3ae_test.js b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xa46edd6a9a93feec36576ee5048146870ea2c3ae_test.js index cd85f03..a5e0cd0 100644 --- a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xa46edd6a9a93feec36576ee5048146870ea2c3ae_test.js +++ b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xa46edd6a9a93feec36576ee5048146870ea2c3ae_test.js @@ -28,7 +28,7 @@ describe("attack unchecked_low_level_calls/0xa46edd6a9a93feec36576ee5048146870ea return { contract, token, success_contract }; } - it("sanity check: unchecked_low_level_calls/0xa46edd6a9a93feec36576ee5048146870ea2c3ae.sol", async function () { + it("functional check: unchecked_low_level_calls/0xa46edd6a9a93feec36576ee5048146870ea2c3ae.sol", async function () { const { contract, success_contract } = await loadFixture(deployContracts); const amount = ethers.parseEther("1"); await success_contract.connect(owner).transfer(sig.address, amount); diff --git a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xb11b2fed6c9354f7aa2f658d3b4d7b31d8a13b77_test.js b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xb11b2fed6c9354f7aa2f658d3b4d7b31d8a13b77_test.js index 67acc46..c6619a7 100644 --- a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xb11b2fed6c9354f7aa2f658d3b4d7b31d8a13b77_test.js +++ b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xb11b2fed6c9354f7aa2f658d3b4d7b31d8a13b77_test.js @@ -32,7 +32,7 @@ describe("attack unchecked_low_level_calls/0xb11b2fed6c9354f7aa2f658d3b4d7b31d8a return { contract, revertContract, successContract }; } - it("sanity check: unchecked_low_level_calls/0xb11b2fed6c9354f7aa2f658d3b4d7b31d8a13b77.sol", async function () { + it("functional check: unchecked_low_level_calls/0xb11b2fed6c9354f7aa2f658d3b4d7b31d8a13b77.sol", async function () { const { contract, successContract } = await loadFixture(deployContracts); const amount = ethers.parseEther("1"); const [_, a] = await ethers.getSigners(); diff --git a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xb7c5c5aa4d42967efe906e1b66cb8df9cebf04f7_test.js b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xb7c5c5aa4d42967efe906e1b66cb8df9cebf04f7_test.js index c4685bd..0be35bc 100644 --- a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xb7c5c5aa4d42967efe906e1b66cb8df9cebf04f7_test.js +++ b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xb7c5c5aa4d42967efe906e1b66cb8df9cebf04f7_test.js @@ -32,7 +32,7 @@ describe("attack unchecked_low_level_calls/0xb7c5c5aa4d42967efe906e1b66cb8df9ceb return { contract, revertContract, successContract }; } - it("sanity check: unchecked_low_level_calls/0xb7c5c5aa4d42967efe906e1b66cb8df9cebf04f7.sol", async function () { + it("functional check: unchecked_low_level_calls/0xb7c5c5aa4d42967efe906e1b66cb8df9cebf04f7.sol", async function () { const { contract, successContract } = await loadFixture(deployContracts); const amount = ethers.parseEther("1"); await expect(successContract.sendEther(contract.target, { value: amount })) diff --git a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xbaa3de6504690efb064420d89e871c27065cdd52_test.js b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xbaa3de6504690efb064420d89e871c27065cdd52_test.js index 767c869..7664521 100644 --- a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xbaa3de6504690efb064420d89e871c27065cdd52_test.js +++ b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xbaa3de6504690efb064420d89e871c27065cdd52_test.js @@ -29,7 +29,7 @@ describe("attack unchecked_low_level_calls/0xbaa3de6504690efb064420d89e871c27065 return { contract, revertContract, successContract }; } - it("sanity check: unchecked_low_level_calls/0xbaa3de6504690efb064420d89e871c27065cdd52.sol", async function () { + it("functional check: unchecked_low_level_calls/0xbaa3de6504690efb064420d89e871c27065cdd52.sol", async function () { const { contract, successContract } = await loadFixture(deployContracts); const amount = ethers.parseEther("1"); const [_, a] = await ethers.getSigners(); diff --git a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xbebbfe5b549f5db6e6c78ca97cac19d1fb03082c_test.js b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xbebbfe5b549f5db6e6c78ca97cac19d1fb03082c_test.js index e84a6e4..d4ea611 100644 --- a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xbebbfe5b549f5db6e6c78ca97cac19d1fb03082c_test.js +++ b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xbebbfe5b549f5db6e6c78ca97cac19d1fb03082c_test.js @@ -29,7 +29,7 @@ describe("attack unchecked_low_level_calls/0xbebbfe5b549f5db6e6c78ca97cac19d1fb0 return { contract, revertContract, successContract }; } - it("sanity check: unchecked_low_level_calls/0xbebbfe5b549f5db6e6c78ca97cac19d1fb03082c.sol", async function () { + it("functional check: unchecked_low_level_calls/0xbebbfe5b549f5db6e6c78ca97cac19d1fb03082c.sol", async function () { const { contract, successContract } = await loadFixture(deployContracts); const amount = ethers.parseEther("1"); const [_, a] = await ethers.getSigners(); diff --git a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xd5967fed03e85d1cce44cab284695b41bc675b5c_test.js b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xd5967fed03e85d1cce44cab284695b41bc675b5c_test.js index c4a1f8b..16b8ea5 100644 --- a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xd5967fed03e85d1cce44cab284695b41bc675b5c_test.js +++ b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xd5967fed03e85d1cce44cab284695b41bc675b5c_test.js @@ -28,7 +28,7 @@ describe("attack unchecked_low_level_calls/0xd5967fed03e85d1cce44cab284695b41bc6 return { contract, token, success_contract }; } - it("sanity check: unchecked_low_level_calls/0xd5967fed03e85d1cce44cab284695b41bc675b5c.sol", async function () { + it("functional check: unchecked_low_level_calls/0xd5967fed03e85d1cce44cab284695b41bc675b5c.sol", async function () { const { contract, success_contract } = await loadFixture(deployContracts); const amount = ethers.parseEther("1"); await success_contract.connect(owner).transfer(sig.address, amount); diff --git a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xe894d54dca59cb53fe9cbc5155093605c7068220_test.js b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xe894d54dca59cb53fe9cbc5155093605c7068220_test.js index d9a534a..4f74036 100644 --- a/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xe894d54dca59cb53fe9cbc5155093605c7068220_test.js +++ b/smartbugs-curated/0.4.x/test/unchecked_low_level_calls/0xe894d54dca59cb53fe9cbc5155093605c7068220_test.js @@ -28,7 +28,7 @@ describe("attack unchecked_low_level_calls/0xe894d54dca59cb53fe9cbc5155093605c70 return { contract, token, success_contract }; } - it("sanity check: unchecked_low_level_calls/0xe894d54dca59cb53fe9cbc5155093605c7068220.sol", async function () { + it("functional check: unchecked_low_level_calls/0xe894d54dca59cb53fe9cbc5155093605c7068220.sol", async function () { const { contract, success_contract } = await loadFixture(deployContracts); const amount = ethers.parseEther("1"); await success_contract.connect(owner).transfer(sig.address, amount); diff --git a/smartbugs-curated/0.8.x/test-results.json b/smartbugs-curated/0.8.x/test-results.json index 4da8c9f..7c62fe4 100644 --- a/smartbugs-curated/0.8.x/test-results.json +++ b/smartbugs-curated/0.8.x/test-results.json @@ -15,7 +15,7 @@ "stack": "Error: VM Exception while processing transaction: reverted with panic code 0x11 (Arithmetic operation overflowed outside of an unchecked block)\n at BecToken.batchTransfer (contracts/dataset/arithmetic/BECToken.sol:264)\n at BecTokenAttacker.attack (contracts/arithmetic/BECToken_attack.sol:15)\n at EdrProviderWrapper.request (node_modules/hardhat/src/internal/hardhat-network/provider/provider.ts:446:41)\n at HardhatEthersSigner.sendTransaction (node_modules/@nomicfoundation/hardhat-ethers/src/signers.ts:125:18)\n at send (node_modules/ethers/src.ts/contract/contract.ts:313:20)\n at Proxy.attack (node_modules/ethers/src.ts/contract/contract.ts:352:16)\n at Context. (test/arithmetic/BECToken_test.js:29:7)" }, { - "title": "sanity check: arithmetic/integer_overflow_1.sol", + "title": "functional check: arithmetic/integer_overflow_1.sol", "file": "arithmetic/integer_overflow_1_test.js", "contractFile": "arithmetic/integer_overflow_1.sol", "state": "passed" @@ -37,7 +37,7 @@ "stack": "Error: VM Exception while processing transaction: reverted with panic code 0x11 (Arithmetic operation overflowed outside of an unchecked block)\n at IntegerOverflowAdd.run (contracts/dataset/arithmetic/integer_overflow_add.sol:17)\n at IntegerOverflowAddAttacker.attack (contracts/arithmetic/integer_overflow_add_attack.sol:17)\n at EdrProviderWrapper.request (node_modules/hardhat/src/internal/hardhat-network/provider/provider.ts:446:41)\n at HardhatEthersSigner.sendTransaction (node_modules/@nomicfoundation/hardhat-ethers/src/signers.ts:125:18)\n at send (node_modules/ethers/src.ts/contract/contract.ts:313:20)\n at Proxy.attack (node_modules/ethers/src.ts/contract/contract.ts:352:16)\n at Context. (test/arithmetic/integer_overflow_add_test.js:25:7)" }, { - "title": "sanity check: arithmetic/integer_overflow_mapping_sym_1.sol", + "title": "functional check: arithmetic/integer_overflow_mapping_sym_1.sol", "file": "arithmetic/integer_overflow_mapping_sym_1.js", "contractFile": "arithmetic/integer_overflow_mapping_sym_1.js", "state": "passed" diff --git a/smartbugs-curated/0.8.x/test/arithmetic/integer_overflow_1_test.js b/smartbugs-curated/0.8.x/test/arithmetic/integer_overflow_1_test.js index dd270d6..0a17f48 100644 --- a/smartbugs-curated/0.8.x/test/arithmetic/integer_overflow_1_test.js +++ b/smartbugs-curated/0.8.x/test/arithmetic/integer_overflow_1_test.js @@ -19,7 +19,7 @@ describe('attack arithmetic/integer_overflow_1.sol', function () { return {overflow, attacker}; } - it('sanity check: arithmetic/integer_overflow_1.sol', async function () { + it('functional check: arithmetic/integer_overflow_1.sol', async function () { const {overflow} = await loadFixture(deployContracts); let storage = await ethers.provider.getStorage(overflow.target, 0); let value = Number(storage); diff --git a/smartbugs-curated/0.8.x/test/arithmetic/integer_overflow_mapping_sym_1.js b/smartbugs-curated/0.8.x/test/arithmetic/integer_overflow_mapping_sym_1.js index 62fd5be..d13bc1f 100644 --- a/smartbugs-curated/0.8.x/test/arithmetic/integer_overflow_mapping_sym_1.js +++ b/smartbugs-curated/0.8.x/test/arithmetic/integer_overflow_mapping_sym_1.js @@ -13,7 +13,7 @@ describe('attack arithmetic/integer_overflow_mapping_sym_1.sol', function () { return {overflow}; } - it('sanity check: arithmetic/integer_overflow_mapping_sym_1.sol', async function () { + it('functional check: arithmetic/integer_overflow_mapping_sym_1.sol', async function () { const {overflow} = await loadFixture(deployContracts); const mappingSlot = BigInt(0); // map is at slot 0 const key = BigInt(0); // We want to find map[0] diff --git a/smartbugs-curated/0.8.x/test/arithmetic/integer_overflow_minimal_test.js b/smartbugs-curated/0.8.x/test/arithmetic/integer_overflow_minimal_test.js index 8273ca5..606d1e1 100644 --- a/smartbugs-curated/0.8.x/test/arithmetic/integer_overflow_minimal_test.js +++ b/smartbugs-curated/0.8.x/test/arithmetic/integer_overflow_minimal_test.js @@ -18,7 +18,7 @@ describe('attack arithmetic/integer_overflow_minimal.sol', function () { return {victim, attacker}; } - it('sanity check: arithmetic/integer_overflow_benign_1.sol', async function () { + it('functional check: arithmetic/integer_overflow_benign_1.sol', async function () { const {victim} = await loadFixture(deployContracts); expect(await victim.count()).to.equal(1); });