Replies: 1 comment 1 reply
-
@PatrickAlphaC |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hello Guys,
I have came up with an idea to fix our
Reentrancy.sol
contract as below:So basically we are using ReentrancyGuard here to prevent this vulnerability but after testing it with Slither it still says
Reentrancy in EtherStore.withdraw()
like nothing would changed. Any idea why is that? Slither is not implementing reentrancy guard or he is just pointing us that there is reentrancy in this function and we should cover it with ReentrancyGuard?I have also came up with Slither catching errors in
ERC721A
, which in my opinion is a bit ridiculous as a lot of protocols using it...Any idea why Slither is yelling like below on
ERC721A
? Is it safe to useERC721A
and Slither is just wrong or there are vulnerabilities for real?Beta Was this translation helpful? Give feedback.
All reactions