Skip to content

Commit c5dc802

Browse files
docs: Unify bridge category and add Solidity highlighting (#99)
1 parent 98b9f42 commit c5dc802

File tree

3 files changed

+6
-6
lines changed

3 files changed

+6
-6
lines changed

test/Access_Control/DAOMaker/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ The exploited contract is simply a universal-proxy-like, which delegates call to
4545

4646
The `init` method sets as `owner` anyone who calls it. You can check [the decompilation](https://etherscan.io/bytecode-decompiler?a=0xf17ca0e0f24a5fa27944275fa0cedec24fbf8ee2) and look for the `unknown84304ad7` method, as the decompiler calls it. Look at the bottom, you will see `owner = caller`.
4747

48-
```
48+
```solidity
4949
def unknown84304ad7() payable:
5050
require calldata.size - 4 >= 128
5151
require cd <= 4294967296

test/Bridges/ArbitrumInbox/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ network: [ethereum]
66
date: 2022-09-19
77
loss_usd: 400000
88
returned_usd: 0
9-
tags: [access control, bridge, reinitialization]
9+
tags: [access control, bridges, reinitialization]
1010
subcategory: []
1111
vulnerable_contracts:
1212
- "0x3e2198a77fc6b266082b92859092170763548730"

test/Business_Logic/TornadoCash_Governance/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -37,13 +37,13 @@ sources: []
3737
3838
Make sure to update your foundry version with:
3939

40-
```
40+
```bash
4141
$ foundryup
4242
```
4343

4444
Ensure that the installed version is the following or newer:
4545

46-
```
46+
```bash
4747
foundryup: installed - forge 0.2.0 (33f3fee 2023-05-26T00:09:41.611811000Z)
4848
```
4949

@@ -156,7 +156,7 @@ $ cast sig 'lockedBalance(address)'
156156

157157
Using a [Solidity decompiler](https://ethervm.io/decompile), we find the dispatch entry for that method in the bytecode:
158158

159-
```
159+
```solidity
160160
} else if (var0 == 0x9ae697bf) {
161161
// Dispatch table entry for lockedBalance(address)
162162
var1 = msg.value;
@@ -174,7 +174,7 @@ Using a [Solidity decompiler](https://ethervm.io/decompile), we find the dispatc
174174

175175
After some digging, we realize `func_063B` must be our candidate, and `var2` must be the `address` used as input.
176176

177-
```
177+
```solidity
178178
function func_063B(var arg0) returns (var arg0) {
179179
memory[0x20:0x40] = 0x3b;
180180
memory[0x00:0x20] = arg0;

0 commit comments

Comments
 (0)