Add memory side effects notes when using function pointers (#5174)

Signed-off-by: Hadrien Croubois <hadrien.croubois@gmail.com>
pull/5124/head
Ernesto García 5 months ago committed by Hadrien Croubois
parent 0f09ebad09
commit aba42a07da
No known key found for this signature in database
GPG Key ID: B53810561A746A06
  1. 6
      contracts/utils/Arrays.sol
  2. 3
      contracts/utils/cryptography/MerkleProof.sol
  3. 2
      scripts/generate/templates/Arrays.js
  4. 3
      scripts/generate/templates/MerkleProof.js

@ -26,6 +26,8 @@ library Arrays {
* array. Using it in view functions that are executed through `eth_call` is safe, but one should be very careful
* when executing this as part of a transaction. If the array being sorted is too large, the sort operation may
* consume more gas than is available in a block, leading to potential DoS.
*
* IMPORTANT: Consider memory side-effects when using custom comparator functions that access memory in an unsafe way.
*/
function sort(
uint256[] memory array,
@ -53,6 +55,8 @@ library Arrays {
* array. Using it in view functions that are executed through `eth_call` is safe, but one should be very careful
* when executing this as part of a transaction. If the array being sorted is too large, the sort operation may
* consume more gas than is available in a block, leading to potential DoS.
*
* IMPORTANT: Consider memory side-effects when using custom comparator functions that access memory in an unsafe way.
*/
function sort(
address[] memory array,
@ -80,6 +84,8 @@ library Arrays {
* array. Using it in view functions that are executed through `eth_call` is safe, but one should be very careful
* when executing this as part of a transaction. If the array being sorted is too large, the sort operation may
* consume more gas than is available in a block, leading to potential DoS.
*
* IMPORTANT: Consider memory side-effects when using custom comparator functions that access memory in an unsafe way.
*/
function sort(
bytes32[] memory array,

@ -20,6 +20,9 @@ import {Hashes} from "./Hashes.sol";
* OpenZeppelin's JavaScript library generates Merkle trees that are safe
* against this attack out of the box.
*
* IMPORTANT: Consider memory side-effects when using custom hashing functions
* that access memory in an unsafe way.
*
* NOTE: This library supports proof verification for merkle trees built using
* custom _commutative_ hashing functions (i.e. `H(a, b) == H(b, a)`). Proving
* leaf inclusion in trees built using non-commutative hashing functions requires

@ -26,6 +26,8 @@ const sort = type => `\
* array. Using it in view functions that are executed through \`eth_call\` is safe, but one should be very careful
* when executing this as part of a transaction. If the array being sorted is too large, the sort operation may
* consume more gas than is available in a block, leading to potential DoS.
*
* IMPORTANT: Consider memory side-effects when using custom comparator functions that access memory in an unsafe way.
*/
function sort(
${type}[] memory array,

@ -26,6 +26,9 @@ import {Hashes} from "./Hashes.sol";
* OpenZeppelin's JavaScript library generates Merkle trees that are safe
* against this attack out of the box.
*
* IMPORTANT: Consider memory side-effects when using custom hashing functions
* that access memory in an unsafe way.
*
* NOTE: This library supports proof verification for merkle trees built using
* custom _commutative_ hashing functions (i.e. \`H(a, b) == H(b, a)\`). Proving
* leaf inclusion in trees built using non-commutative hashing functions requires

Loading…
Cancel
Save