You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi, I'd be curious to hear in which cases this detector reports false positives. For a different use case*, I thought about implementing nearly the same logic. Hearing that it's already rather useless for the general case lowers my expectations on this other use case 🙃 .
We need to find how to improve its heuristics
For my use case I would have also tried to exclude functions, where the destination is used in conditions or require statements, because then it is a "checked" destination and not arbitrary anymore. Could this help to filter out the false positives you have encountered?
*My use case would be the niche of frontrunning for badly designed "Puzzles". For instance, if a contract directly sends you ether you for finding the preimage of a hash, then sending the solution as a transaction would be vulnerable to frontrunning (someone else could see the solution in the transaction pool and copy it to submit it faster). While experimenting with different tools, I've realized that the arbitrary-send detector is already able to detect this vulnerable behaviour.
I am not sure we should keep the
arbitrary-send
detector, from experience it does not give any meaningful results most of the time.We need to find how to improve its heuristics or remove it
The text was updated successfully, but these errors were encountered: