|
1 | 1 | ;;RUN: cargo run check | filecheck %s |
2 | 2 |
|
3 | 3 | (define-public (tainted (amount uint)) |
4 | | -;; CHECK: taint:[[# @LINE + 6 ]]:20: warning: use of potentially unchecked data |
| 4 | +;; CHECK: checker:[[# @LINE + 6 ]]:20: warning: use of potentially unchecked data |
5 | 5 | ;; CHECK-NEXT: (stx-transfer? amount (as-contract tx-sender) tx-sender) |
6 | 6 | ;; CHECK-NEXT: ^~~~~~ |
7 | | -;; CHECK-NEXT: taint:[[# @LINE - 4 ]]:25: note: source of untrusted input here |
| 7 | +;; CHECK-NEXT: checker:[[# @LINE - 4 ]]:25: note: source of untrusted input here |
8 | 8 | ;; CHECK-NEXT: (define-public (tainted (amount uint)) |
9 | 9 | ;; CHECK-NEXT: ^~~~~~ |
10 | 10 | (stx-transfer? amount (as-contract tx-sender) tx-sender) |
11 | 11 | ) |
12 | 12 |
|
13 | 13 | (define-public (expr-tainted (amount uint)) |
14 | | -;; CHECK: taint:[[# @LINE + 6 ]]:20: warning: use of potentially unchecked data |
| 14 | +;; CHECK: checker:[[# @LINE + 6 ]]:20: warning: use of potentially unchecked data |
15 | 15 | ;; CHECK-NEXT: (stx-transfer? (+ u10 amount) (as-contract tx-sender) tx-sender) |
16 | 16 | ;; CHECK-NEXT: ^~~~~~~~~~~~~~ |
17 | | -;; CHECK-NEXT: taint:[[# @LINE - 4 ]]:30: note: source of untrusted input here |
| 17 | +;; CHECK-NEXT: checker:[[# @LINE - 4 ]]:30: note: source of untrusted input here |
18 | 18 | ;; CHECK-NEXT: (define-public (expr-tainted (amount uint)) |
19 | 19 | ;; CHECK-NEXT: ^~~~~~ |
20 | 20 | (stx-transfer? (+ u10 amount) (as-contract tx-sender) tx-sender) |
21 | 21 | ) |
22 | 22 |
|
23 | 23 | (define-public (let-tainted (amount uint)) |
24 | 24 | (let ((x amount)) |
25 | | -;; CHECK: taint:[[# @LINE + 6 ]]:24: warning: use of potentially unchecked data |
| 25 | +;; CHECK: checker:[[# @LINE + 6 ]]:24: warning: use of potentially unchecked data |
26 | 26 | ;; CHECK-NEXT: (stx-transfer? x (as-contract tx-sender) tx-sender) |
27 | 27 | ;; CHECK-NEXT: ^ |
28 | | -;; CHECK-NEXT: taint:[[# @LINE - 5 ]]:29: note: source of untrusted input here |
| 28 | +;; CHECK-NEXT: checker:[[# @LINE - 5 ]]:29: note: source of untrusted input here |
29 | 29 | ;; CHECK-NEXT: (define-public (let-tainted (amount uint)) |
30 | 30 | ;; CHECK-NEXT: ^~~~~~ |
31 | 31 | (stx-transfer? x (as-contract tx-sender) tx-sender) |
|
35 | 35 | (define-public (filtered (amount uint)) |
36 | 36 | (begin |
37 | 37 | (asserts! (< amount u100) (err u100)) |
38 | | -;; CHECK-NOT: taint:[[# @LINE + 1 ]]:24: warning: |
| 38 | +;; CHECK-NOT: checker:[[# @LINE + 1 ]]:24: warning: |
39 | 39 | (stx-transfer? amount (as-contract tx-sender) tx-sender) |
40 | 40 | ) |
41 | 41 | ) |
42 | 42 |
|
43 | 43 | (define-public (filtered-expr (amount uint)) |
44 | 44 | (begin |
45 | 45 | (asserts! (< (+ amount u10) u100) (err u100)) |
46 | | -;; CHECK-NOT: taint:[[# @LINE + 1 ]]:24: warning: |
| 46 | +;; CHECK-NOT: checker:[[# @LINE + 1 ]]:24: warning: |
47 | 47 | (stx-transfer? amount (as-contract tx-sender) tx-sender) |
48 | 48 | ) |
49 | 49 | ) |
50 | 50 |
|
51 | 51 | (define-public (let-filtered (amount uint)) |
52 | 52 | (let ((x amount)) |
53 | 53 | (asserts! (< x u100) (err u100)) |
54 | | -;; CHECK-NOT: taint:[[# @LINE + 1 ]]:24: warning: |
| 54 | +;; CHECK-NOT: checker:[[# @LINE + 1 ]]:24: warning: |
55 | 55 | (stx-transfer? x (as-contract tx-sender) tx-sender) |
56 | 56 | ) |
57 | 57 | ) |
58 | 58 |
|
59 | 59 | (define-public (let-filtered-parent (amount uint)) |
60 | 60 | (let ((x amount)) |
61 | 61 | (asserts! (< amount u100) (err u100)) |
62 | | -;; CHECK-NOT: taint:[[# @LINE + 1 ]]:24: warning: |
| 62 | +;; CHECK-NOT: checker:[[# @LINE + 1 ]]:24: warning: |
63 | 63 | (stx-transfer? x (as-contract tx-sender) tx-sender) |
64 | 64 | ) |
65 | 65 | ) |
66 | 66 |
|
67 | 67 | (define-public (let-tainted-twice (amount1 uint) (amount2 uint)) |
68 | 68 | (let ((x (+ amount1 amount2))) |
69 | | -;; CHECK: taint:[[# @LINE + 9 ]]:24: warning: use of potentially unchecked data |
| 69 | +;; CHECK: checker:[[# @LINE + 9 ]]:24: warning: use of potentially unchecked data |
70 | 70 | ;; CHECK-NEXT: (stx-transfer? x (as-contract tx-sender) tx-sender) |
71 | 71 | ;; CHECK-NEXT: ^ |
72 | | -;; CHECK-NEXT: taint:[[# @LINE - 5 ]]:35: note: source of untrusted input here |
| 72 | +;; CHECK-NEXT: checker:[[# @LINE - 5 ]]:35: note: source of untrusted input here |
73 | 73 | ;; CHECK-NEXT: (define-public (let-tainted-twice (amount1 uint) (amount2 uint)) |
74 | 74 | ;; CHECK-NEXT: ^~~~~~~ |
75 | | -;; CHECK-NEXT: taint:[[# @LINE - 8 ]]:50: note: source of untrusted input here |
| 75 | +;; CHECK-NEXT: checker:[[# @LINE - 8 ]]:50: note: source of untrusted input here |
76 | 76 | ;; CHECK-NEXT: (define-public (let-tainted-twice (amount1 uint) (amount2 uint)) |
77 | 77 | ;; CHECK-NEXT: ^~~~~~~ |
78 | 78 | (stx-transfer? x (as-contract tx-sender) tx-sender) |
|
82 | 82 | (define-public (let-tainted-twice-filtered-once (amount1 uint) (amount2 uint)) |
83 | 83 | (let ((x (+ amount1 amount2))) |
84 | 84 | (asserts! (< amount1 u100) (err u100)) |
85 | | -;; CHECK: taint:[[# @LINE + 6 ]]:24: warning: use of potentially unchecked data |
| 85 | +;; CHECK: checker:[[# @LINE + 6 ]]:24: warning: use of potentially unchecked data |
86 | 86 | ;; CHECK-NEXT: (stx-transfer? x (as-contract tx-sender) tx-sender) |
87 | 87 | ;; CHECK-NEXT: ^ |
88 | | -;; CHECK-NEXT: taint:[[# @LINE - 6 ]]:64: note: source of untrusted input here |
| 88 | +;; CHECK-NEXT: checker:[[# @LINE - 6 ]]:64: note: source of untrusted input here |
89 | 89 | ;; CHECK-NEXT: (define-public (let-tainted-twice-filtered-once (amount1 uint) (amount2 uint)) |
90 | 90 | ;; CHECK-NEXT: ^~~~~~~ |
91 | 91 | (stx-transfer? x (as-contract tx-sender) tx-sender) |
|
96 | 96 | (let ((x (+ amount1 amount2))) |
97 | 97 | (asserts! (< amount1 u100) (err u100)) |
98 | 98 | (asserts! (< amount2 u100) (err u101)) |
99 | | -;; CHECK-NOT: taint:[[# @LINE + 1 ]]:24: warning: |
| 99 | +;; CHECK-NOT: checker:[[# @LINE + 1 ]]:24: warning: |
100 | 100 | (stx-transfer? x (as-contract tx-sender) tx-sender) |
101 | 101 | ) |
102 | 102 | ) |
103 | 103 |
|
104 | 104 | (define-public (let-tainted-twice-filtered-together (amount1 uint) (amount2 uint)) |
105 | 105 | (let ((x (+ amount1 amount2))) |
106 | 106 | (asserts! (< (+ amount1 amount2) u100) (err u100)) |
107 | | -;; CHECK-NOT: taint:[[# @LINE + 1 ]]:24: warning: |
| 107 | +;; CHECK-NOT: checker:[[# @LINE + 1 ]]:24: warning: |
108 | 108 | (stx-transfer? x (as-contract tx-sender) tx-sender) |
109 | 109 | ) |
110 | 110 | ) |
111 | 111 |
|
112 | 112 | (define-public (if-filter (amount uint)) |
113 | | -;; CHECK-NOT: taint:[[# @LINE + 1 ]]:40: warning: |
| 113 | +;; CHECK-NOT: checker:[[# @LINE + 1 ]]:40: warning: |
114 | 114 | (stx-transfer? (if (< amount u100) amount u100) (as-contract tx-sender) tx-sender) |
115 | 115 | ) |
116 | 116 |
|
117 | 117 | (define-public (if-not-filtered (amount uint)) |
118 | | -;; CHECK: taint:[[# @LINE + 6 ]]:20: warning: use of potentially unchecked data |
| 118 | +;; CHECK: checker:[[# @LINE + 6 ]]:20: warning: use of potentially unchecked data |
119 | 119 | ;; CHECK-NEXT: (stx-transfer? (if (< u50 u100) amount u100) (as-contract tx-sender) tx-sender) |
120 | 120 | ;; CHECK-NEXT: ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
121 | | -;; CHECK-NEXT: taint:[[# @LINE - 4 ]]:33: note: source of untrusted input here |
| 121 | +;; CHECK-NEXT: checker:[[# @LINE - 4 ]]:33: note: source of untrusted input here |
122 | 122 | ;; CHECK-NEXT: (define-public (if-not-filtered (amount uint)) |
123 | 123 | ;; CHECK-NEXT: ^~~~~~ |
124 | 124 | (stx-transfer? (if (< u50 u100) amount u100) (as-contract tx-sender) tx-sender) |
125 | 125 | ) |
126 | 126 |
|
127 | 127 | (define-public (and-tainted (amount uint)) |
128 | 128 | (ok (and |
129 | | -;; CHECK: taint:[[# @LINE + 6 ]]:38: warning: use of potentially unchecked data |
| 129 | +;; CHECK: checker:[[# @LINE + 6 ]]:38: warning: use of potentially unchecked data |
130 | 130 | ;; CHECK-NEXT: (unwrap-panic (stx-transfer? amount (as-contract tx-sender) tx-sender)) |
131 | 131 | ;; CHECK-NEXT: ^~~~~~ |
132 | | -;; CHECK-NEXT: taint:[[# @LINE - 5 ]]:29: note: source of untrusted input here |
| 132 | +;; CHECK-NEXT: checker:[[# @LINE - 5 ]]:29: note: source of untrusted input here |
133 | 133 | ;; CHECK-NEXT: (define-public (and-tainted (amount uint)) |
134 | 134 | ;; CHECK-NEXT: ^~~~~~ |
135 | 135 | (unwrap-panic (stx-transfer? amount (as-contract tx-sender) tx-sender)) |
|
139 | 139 | (define-public (and-filter (amount uint)) |
140 | 140 | (ok (and |
141 | 141 | (< amount u100) |
142 | | -;; CHECK-NOT: taint:[[# @LINE + 1 ]]:38: warning: |
| 142 | +;; CHECK-NOT: checker:[[# @LINE + 1 ]]:38: warning: |
143 | 143 | (unwrap-panic (stx-transfer? amount (as-contract tx-sender) tx-sender)) |
144 | 144 | )) |
145 | 145 | ) |
146 | 146 |
|
147 | 147 | (define-public (and-filter-after (amount uint)) |
148 | 148 | (ok (and |
149 | | -;; CHECK: taint:[[# @LINE + 6 ]]:38: warning: use of potentially unchecked data |
| 149 | +;; CHECK: checker:[[# @LINE + 6 ]]:38: warning: use of potentially unchecked data |
150 | 150 | ;; CHECK-NEXT: (unwrap-panic (stx-transfer? amount (as-contract tx-sender) tx-sender)) |
151 | 151 | ;; CHECK-NEXT: ^~~~~~ |
152 | | -;; CHECK-NEXT: taint:[[# @LINE - 5 ]]:34: note: source of untrusted input here |
| 152 | +;; CHECK-NEXT: checker:[[# @LINE - 5 ]]:34: note: source of untrusted input here |
153 | 153 | ;; CHECK-NEXT: (define-public (and-filter-after (amount uint)) |
154 | 154 | ;; CHECK-NEXT: ^~~~~~ |
155 | 155 | (unwrap-panic (stx-transfer? amount (as-contract tx-sender) tx-sender)) |
|
159 | 159 |
|
160 | 160 | (define-public (or-tainted (amount uint)) |
161 | 161 | (ok (or |
162 | | -;; CHECK: taint:[[# @LINE + 6 ]]:38: warning: use of potentially unchecked data |
| 162 | +;; CHECK: checker:[[# @LINE + 6 ]]:38: warning: use of potentially unchecked data |
163 | 163 | ;; CHECK-NEXT: (unwrap-panic (stx-transfer? amount (as-contract tx-sender) tx-sender)) |
164 | 164 | ;; CHECK-NEXT: ^~~~~~ |
165 | | -;; CHECK-NEXT: taint:[[# @LINE - 5 ]]:28: note: source of untrusted input here |
| 165 | +;; CHECK-NEXT: checker:[[# @LINE - 5 ]]:28: note: source of untrusted input here |
166 | 166 | ;; CHECK-NEXT: (define-public (or-tainted (amount uint)) |
167 | 167 | ;; CHECK-NEXT: ^~~~~~ |
168 | 168 | (unwrap-panic (stx-transfer? amount (as-contract tx-sender) tx-sender)) |
|
172 | 172 | (define-public (or-filter (amount uint)) |
173 | 173 | (ok (or |
174 | 174 | (>= amount u100) |
175 | | -;; CHECK-NOT: taint:[[# @LINE + 1 ]]:38: warning: |
| 175 | +;; CHECK-NOT: checker:[[# @LINE + 1 ]]:38: warning: |
176 | 176 | (unwrap-panic (stx-transfer? amount (as-contract tx-sender) tx-sender)) |
177 | 177 | )) |
178 | 178 | ) |
179 | 179 |
|
180 | 180 | (define-public (or-filter-after (amount uint)) |
181 | 181 | (ok (or |
182 | | -;; CHECK: taint:[[# @LINE + 6 ]]:38: warning: use of potentially unchecked data |
| 182 | +;; CHECK: checker:[[# @LINE + 6 ]]:38: warning: use of potentially unchecked data |
183 | 183 | ;; CHECK-NEXT: (unwrap-panic (stx-transfer? amount (as-contract tx-sender) tx-sender)) |
184 | 184 | ;; CHECK-NEXT: ^~~~~~ |
185 | | -;; CHECK-NEXT: taint:[[# @LINE - 5 ]]:33: note: source of untrusted input here |
| 185 | +;; CHECK-NEXT: checker:[[# @LINE - 5 ]]:33: note: source of untrusted input here |
186 | 186 | ;; CHECK-NEXT: (define-public (or-filter-after (amount uint)) |
187 | 187 | ;; CHECK-NEXT: ^~~~~~ |
188 | 188 | (unwrap-panic (stx-transfer? amount (as-contract tx-sender) tx-sender)) |
|
191 | 191 | ) |
192 | 192 |
|
193 | 193 | (define-public (tainted-stx-burn (amount uint)) |
194 | | -;; CHECK: taint:[[# @LINE + 6 ]]:16: warning: use of potentially unchecked data |
| 194 | +;; CHECK: checker:[[# @LINE + 6 ]]:16: warning: use of potentially unchecked data |
195 | 195 | ;; CHECK-NEXT: (stx-burn? amount (as-contract tx-sender)) |
196 | 196 | ;; CHECK-NEXT: ^~~~~~ |
197 | | -;; CHECK-NEXT: taint:[[# @LINE - 4 ]]:34: note: source of untrusted input here |
| 197 | +;; CHECK-NEXT: checker:[[# @LINE - 4 ]]:34: note: source of untrusted input here |
198 | 198 | ;; CHECK-NEXT: (define-public (tainted-stx-burn (amount uint)) |
199 | 199 | ;; CHECK-NEXT: ^~~~~~ |
200 | 200 | (stx-burn? amount (as-contract tx-sender)) |
|
203 | 203 | (define-fungible-token stackaroo) |
204 | 204 |
|
205 | 205 | (define-public (tainted-ft-burn (amount uint)) |
206 | | -;; CHECK: taint:[[# @LINE + 6 ]]:25: warning: use of potentially unchecked data |
| 206 | +;; CHECK: checker:[[# @LINE + 6 ]]:25: warning: use of potentially unchecked data |
207 | 207 | ;; CHECK-NEXT: (ft-burn? stackaroo amount (as-contract tx-sender)) |
208 | 208 | ;; CHECK-NEXT: ^~~~~~ |
209 | | -;; CHECK-NEXT: taint:[[# @LINE - 4 ]]:33: note: source of untrusted input here |
| 209 | +;; CHECK-NEXT: checker:[[# @LINE - 4 ]]:33: note: source of untrusted input here |
210 | 210 | ;; CHECK-NEXT: (define-public (tainted-ft-burn (amount uint)) |
211 | 211 | ;; CHECK-NEXT: ^~~~~~ |
212 | 212 | (ft-burn? stackaroo amount (as-contract tx-sender)) |
213 | 213 | ) |
214 | 214 |
|
215 | 215 | (define-public (tainted-ft-transfer (amount uint)) |
216 | | -;; CHECK: taint:[[# @LINE + 6 ]]:29: warning: use of potentially unchecked data |
| 216 | +;; CHECK: checker:[[# @LINE + 6 ]]:29: warning: use of potentially unchecked data |
217 | 217 | ;; CHECK-NEXT: (ft-transfer? stackaroo amount (as-contract tx-sender) tx-sender) |
218 | 218 | ;; CHECK-NEXT: ^~~~~~ |
219 | | -;; CHECK-NEXT: taint:[[# @LINE - 4 ]]:37: note: source of untrusted input here |
| 219 | +;; CHECK-NEXT: checker:[[# @LINE - 4 ]]:37: note: source of untrusted input here |
220 | 220 | ;; CHECK-NEXT: (define-public (tainted-ft-transfer (amount uint)) |
221 | 221 | ;; CHECK-NEXT: ^~~~~~ |
222 | 222 | (ft-transfer? stackaroo amount (as-contract tx-sender) tx-sender) |
223 | 223 | ) |
224 | 224 |
|
225 | 225 | (define-public (tainted-ft-mint (amount uint)) |
226 | | -;; CHECK: taint:[[# @LINE + 6 ]]:25: warning: use of potentially unchecked data |
| 226 | +;; CHECK: checker:[[# @LINE + 6 ]]:25: warning: use of potentially unchecked data |
227 | 227 | ;; CHECK-NEXT: (ft-mint? stackaroo amount (as-contract tx-sender)) |
228 | 228 | ;; CHECK-NEXT: ^~~~~~ |
229 | | -;; CHECK-NEXT: taint:[[# @LINE - 4 ]]:33: note: source of untrusted input here |
| 229 | +;; CHECK-NEXT: checker:[[# @LINE - 4 ]]:33: note: source of untrusted input here |
230 | 230 | ;; CHECK-NEXT: (define-public (tainted-ft-mint (amount uint)) |
231 | 231 | ;; CHECK-NEXT: ^~~~~~ |
232 | 232 | (ft-mint? stackaroo amount (as-contract tx-sender)) |
|
235 | 235 | (define-non-fungible-token stackaroo2 uint) |
236 | 236 |
|
237 | 237 | (define-public (tainted-nft-burn (amount uint)) |
238 | | -;; CHECK: taint:[[# @LINE + 6 ]]:27: warning: use of potentially unchecked data |
| 238 | +;; CHECK: checker:[[# @LINE + 6 ]]:27: warning: use of potentially unchecked data |
239 | 239 | ;; CHECK-NEXT: (nft-burn? stackaroo2 amount (as-contract tx-sender)) |
240 | 240 | ;; CHECK-NEXT: ^~~~~~ |
241 | | -;; CHECK-NEXT: taint:[[# @LINE -4 ]]:34: note: source of untrusted input here |
| 241 | +;; CHECK-NEXT: checker:[[# @LINE -4 ]]:34: note: source of untrusted input here |
242 | 242 | ;; CHECK-NEXT: (define-public (tainted-nft-burn (amount uint)) |
243 | 243 | ;; CHECK-NEXT: ^~~~~~ |
244 | 244 | (nft-burn? stackaroo2 amount (as-contract tx-sender)) |
245 | 245 | ) |
246 | 246 |
|
247 | 247 | (define-public (tainted-nft-transfer (amount uint)) |
248 | | -;; CHECK: taint:[[# @LINE + 6 ]]:31: warning: use of potentially unchecked data |
| 248 | +;; CHECK: checker:[[# @LINE + 6 ]]:31: warning: use of potentially unchecked data |
249 | 249 | ;; CHECK-NEXT: (nft-transfer? stackaroo2 amount (as-contract tx-sender) tx-sender) |
250 | 250 | ;; CHECK-NEXT: ^~~~~~ |
251 | | -;; CHECK-NEXT: taint:[[# @LINE - 4 ]]:38: note: source of untrusted input here |
| 251 | +;; CHECK-NEXT: checker:[[# @LINE - 4 ]]:38: note: source of untrusted input here |
252 | 252 | ;; CHECK-NEXT: (define-public (tainted-nft-transfer (amount uint)) |
253 | 253 | ;; CHECK-NEXT: ^~~~~~ |
254 | 254 | (nft-transfer? stackaroo2 amount (as-contract tx-sender) tx-sender) |
255 | 255 | ) |
256 | 256 |
|
257 | 257 | (define-public (tainted-nft-mint (amount uint)) |
258 | | -;; CHECK: taint:[[# @LINE + 6 ]]:27: warning: use of potentially unchecked data |
| 258 | +;; CHECK: checker:[[# @LINE + 6 ]]:27: warning: use of potentially unchecked data |
259 | 259 | ;; CHECK-NEXT: (nft-mint? stackaroo2 amount (as-contract tx-sender)) |
260 | 260 | ;; CHECK-NEXT: ^~~~~~ |
261 | | -;; CHECK-NEXT: taint:[[# @LINE - 4 ]]:34: note: source of untrusted input here |
| 261 | +;; CHECK-NEXT: checker:[[# @LINE - 4 ]]:34: note: source of untrusted input here |
262 | 262 | ;; CHECK-NEXT: (define-public (tainted-nft-mint (amount uint)) |
263 | 263 | ;; CHECK-NEXT: ^~~~~~ |
264 | 264 | (nft-mint? stackaroo2 amount (as-contract tx-sender)) |
|
267 | 267 | (define-data-var myvar uint u0) |
268 | 268 |
|
269 | 269 | (define-public (tainted-var-set (amount uint)) |
270 | | -;; CHECK: taint:[[# @LINE + 6 ]]:24: warning: use of potentially unchecked data |
| 270 | +;; CHECK: checker:[[# @LINE + 6 ]]:24: warning: use of potentially unchecked data |
271 | 271 | ;; CHECK-NEXT: (ok (var-set myvar amount)) |
272 | 272 | ;; CHECK-NEXT: ^~~~~~ |
273 | | -;; CHECK-NEXT: taint:[[# @LINE - 4 ]]:33: note: source of untrusted input here |
| 273 | +;; CHECK-NEXT: checker:[[# @LINE - 4 ]]:33: note: source of untrusted input here |
274 | 274 | ;; CHECK-NEXT: (define-public (tainted-var-set (amount uint)) |
275 | 275 | ;; CHECK-NEXT: ^~~~~~ |
276 | 276 | (ok (var-set myvar amount)) |
|
279 | 279 | (define-map mymap { key-name-1: uint } { val-name-1: int }) |
280 | 280 |
|
281 | 281 | (define-public (tainted-map-set (key uint) (value int)) |
282 | | -;; CHECK: taint:[[# @LINE + 12 ]]:37: warning: use of potentially unchecked data |
| 282 | +;; CHECK: checker:[[# @LINE + 12 ]]:37: warning: use of potentially unchecked data |
283 | 283 | ;; CHECK-NEXT: (ok (map-set mymap {key-name-1: key} {val-name-1: value})) |
284 | 284 | ;; CHECK-NEXT: ^~~ |
285 | | -;; CHECK-NEXT: taint:[[# @LINE - 4 ]]:33: note: source of untrusted input here |
| 285 | +;; CHECK-NEXT: checker:[[# @LINE - 4 ]]:33: note: source of untrusted input here |
286 | 286 | ;; CHECK-NEXT: (define-public (tainted-map-set (key uint) (value int)) |
287 | 287 | ;; CHECK-NEXT: ^~~ |
288 | | -;; CHECK-NEXT: taint:[[# @LINE + 6 ]]:55: warning: use of potentially unchecked data |
| 288 | +;; CHECK-NEXT: checker:[[# @LINE + 6 ]]:55: warning: use of potentially unchecked data |
289 | 289 | ;; CHECK-NEXT: (ok (map-set mymap {key-name-1: key} {val-name-1: value})) |
290 | 290 | ;; CHECK-NEXT: ^~~~~ |
291 | | -;; CHECK-NEXT: taint:[[# @LINE - 10 ]]:44: note: source of untrusted input here |
| 291 | +;; CHECK-NEXT: checker:[[# @LINE - 10 ]]:44: note: source of untrusted input here |
292 | 292 | ;; CHECK-NEXT: (define-public (tainted-map-set (key uint) (value int)) |
293 | 293 | ;; CHECK-NEXT: ^~~~~ |
294 | 294 | (ok (map-set mymap {key-name-1: key} {val-name-1: value})) |
295 | 295 | ) |
296 | 296 |
|
297 | 297 | (define-public (tainted-map-insert (key uint) (value int)) |
298 | | -;; CHECK: taint:[[# @LINE + 12 ]]:40: warning: use of potentially unchecked data |
| 298 | +;; CHECK: checker:[[# @LINE + 12 ]]:40: warning: use of potentially unchecked data |
299 | 299 | ;; CHECK-NEXT: (ok (map-insert mymap {key-name-1: key} {val-name-1: value})) |
300 | 300 | ;; CHECK-NEXT: ^~~ |
301 | | -;; CHECK-NEXT: taint:[[# @LINE - 4 ]]:36: note: source of untrusted input here |
| 301 | +;; CHECK-NEXT: checker:[[# @LINE - 4 ]]:36: note: source of untrusted input here |
302 | 302 | ;; CHECK-NEXT: (define-public (tainted-map-insert (key uint) (value int)) |
303 | 303 | ;; CHECK-NEXT: ^~~ |
304 | | -;; CHECK-NEXT: taint:[[# @LINE + 6 ]]:58: warning: use of potentially unchecked data |
| 304 | +;; CHECK-NEXT: checker:[[# @LINE + 6 ]]:58: warning: use of potentially unchecked data |
305 | 305 | ;; CHECK-NEXT: (ok (map-insert mymap {key-name-1: key} {val-name-1: value})) |
306 | 306 | ;; CHECK-NEXT: ^~~~~ |
307 | | -;; CHECK-NEXT: taint:[[# @LINE - 10 ]]:47: note: source of untrusted input here |
| 307 | +;; CHECK-NEXT: checker:[[# @LINE - 10 ]]:47: note: source of untrusted input here |
308 | 308 | ;; CHECK-NEXT: (define-public (tainted-map-insert (key uint) (value int)) |
309 | 309 | ;; CHECK-NEXT: ^~~~~ |
310 | 310 | (ok (map-insert mymap {key-name-1: key} {val-name-1: value})) |
311 | 311 | ) |
312 | 312 |
|
313 | 313 | (define-public (tainted-map-delete (key uint)) |
314 | | -;; CHECK: taint:[[# @LINE + 6 ]]:40: warning: use of potentially unchecked data |
| 314 | +;; CHECK: checker:[[# @LINE + 6 ]]:40: warning: use of potentially unchecked data |
315 | 315 | ;; CHECK-NEXT: (ok (map-delete mymap {key-name-1: key})) |
316 | 316 | ;; CHECK-NEXT: ^~~ |
317 | | -;; CHECK-NEXT: taint:[[# @LINE - 4 ]]:36: note: source of untrusted input here |
| 317 | +;; CHECK-NEXT: checker:[[# @LINE - 4 ]]:36: note: source of untrusted input here |
318 | 318 | ;; CHECK-NEXT: (define-public (tainted-map-delete (key uint)) |
319 | 319 | ;; CHECK-NEXT: ^~~ |
320 | 320 | (ok (map-delete mymap {key-name-1: key})) |
|
0 commit comments