You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The amount transferred on withdrawal can (maybe) be influenced by reordering transactions.
At line 95 (if (!msg.sender.send(amount)) {):
A contract is exposed to this vulnerability if a miner (who executes and validates transactions) can reorder the transactions within a block in a way that affects the amount of ether transfered to the receiver.
The Safe Example contract on the left is not vulnerable to this vulnerability as the amount of ether transfered is price, which is a constant that cannot be modified by previously executed transactions. In contrast, the amount of ether transfered by the contract Unsafe Example can be modified via calls to method setPrice.
Note that these examples are only for illustration purposes. For value transfer, the solidity function transfer() should be used.
The amount transferred on withdrawal can (maybe) be influenced by reordering transactions.
At line 95 (
if (!msg.sender.send(amount)) {
):http://securify.ch/
The text was updated successfully, but these errors were encountered: