id int32 0 252k | repo stringlengths 7 55 | path stringlengths 4 127 | func_name stringlengths 1 88 | original_string stringlengths 75 19.8k | language stringclasses 1
value | code stringlengths 51 19.8k | code_tokens list | docstring stringlengths 3 17.3k | docstring_tokens list | sha stringlengths 40 40 | url stringlengths 87 242 |
|---|---|---|---|---|---|---|---|---|---|---|---|
244,600 | ansible/ansible-container | container/utils/_text.py | to_bytes | def to_bytes(obj, encoding='utf-8', errors=None, nonstring='simplerepr'):
"""Make sure that a string is a byte string
:arg obj: An object to make sure is a byte string. In most cases this
will be either a text string or a byte string. However, with
``nonstring='simplerepr'``, this can be used... | python | def to_bytes(obj, encoding='utf-8', errors=None, nonstring='simplerepr'):
if isinstance(obj, binary_type):
return obj
# We're given a text string
# If it has surrogates, we know because it will decode
original_errors = errors
if errors in _COMPOSED_ERROR_HANDLERS:
if HAS_SURROGATEES... | [
"def",
"to_bytes",
"(",
"obj",
",",
"encoding",
"=",
"'utf-8'",
",",
"errors",
"=",
"None",
",",
"nonstring",
"=",
"'simplerepr'",
")",
":",
"if",
"isinstance",
"(",
"obj",
",",
"binary_type",
")",
":",
"return",
"obj",
"# We're given a text string",
"# If i... | Make sure that a string is a byte string
:arg obj: An object to make sure is a byte string. In most cases this
will be either a text string or a byte string. However, with
``nonstring='simplerepr'``, this can be used as a traceback-free
version of ``str(obj)``.
:kwarg encoding: The en... | [
"Make",
"sure",
"that",
"a",
"string",
"is",
"a",
"byte",
"string"
] | d031c1a6133d5482a5d054fcbdbecafb923f8b4b | https://github.com/ansible/ansible-container/blob/d031c1a6133d5482a5d054fcbdbecafb923f8b4b/container/utils/_text.py#L52-L163 |
244,601 | ansible/ansible-container | container/utils/_text.py | to_text | def to_text(obj, encoding='utf-8', errors=None, nonstring='simplerepr'):
"""Make sure that a string is a text string
:arg obj: An object to make sure is a text string. In most cases this
will be either a text string or a byte string. However, with
``nonstring='simplerepr'``, this can be used ... | python | def to_text(obj, encoding='utf-8', errors=None, nonstring='simplerepr'):
if isinstance(obj, text_type):
return obj
if errors in _COMPOSED_ERROR_HANDLERS:
if HAS_SURROGATEESCAPE:
errors = 'surrogateescape'
elif errors == 'surrogate_or_strict':
errors = 'strict'
... | [
"def",
"to_text",
"(",
"obj",
",",
"encoding",
"=",
"'utf-8'",
",",
"errors",
"=",
"None",
",",
"nonstring",
"=",
"'simplerepr'",
")",
":",
"if",
"isinstance",
"(",
"obj",
",",
"text_type",
")",
":",
"return",
"obj",
"if",
"errors",
"in",
"_COMPOSED_ERRO... | Make sure that a string is a text string
:arg obj: An object to make sure is a text string. In most cases this
will be either a text string or a byte string. However, with
``nonstring='simplerepr'``, this can be used as a traceback-free
version of ``str(obj)``.
:kwarg encoding: The en... | [
"Make",
"sure",
"that",
"a",
"string",
"is",
"a",
"text",
"string"
] | d031c1a6133d5482a5d054fcbdbecafb923f8b4b | https://github.com/ansible/ansible-container/blob/d031c1a6133d5482a5d054fcbdbecafb923f8b4b/container/utils/_text.py#L166-L254 |
244,602 | ansible/ansible-container | container/core.py | push_images | def push_images(base_path, image_namespace, engine_obj, config, **kwargs):
""" Pushes images to a Docker registry. Returns dict containing attributes used to push images. """
config_path = kwargs.get('config_path', engine_obj.auth_config_path)
username = kwargs.get('username')
password = kwargs.get('pas... | python | def push_images(base_path, image_namespace, engine_obj, config, **kwargs):
config_path = kwargs.get('config_path', engine_obj.auth_config_path)
username = kwargs.get('username')
password = kwargs.get('password')
push_to = kwargs.get('push_to')
url = engine_obj.default_registry_url
registry_name ... | [
"def",
"push_images",
"(",
"base_path",
",",
"image_namespace",
",",
"engine_obj",
",",
"config",
",",
"*",
"*",
"kwargs",
")",
":",
"config_path",
"=",
"kwargs",
".",
"get",
"(",
"'config_path'",
",",
"engine_obj",
".",
"auth_config_path",
")",
"username",
... | Pushes images to a Docker registry. Returns dict containing attributes used to push images. | [
"Pushes",
"images",
"to",
"a",
"Docker",
"registry",
".",
"Returns",
"dict",
"containing",
"attributes",
"used",
"to",
"push",
"images",
"."
] | d031c1a6133d5482a5d054fcbdbecafb923f8b4b | https://github.com/ansible/ansible-container/blob/d031c1a6133d5482a5d054fcbdbecafb923f8b4b/container/core.py#L394-L467 |
244,603 | ansible/ansible-container | container/core.py | remove_existing_container | def remove_existing_container(engine_obj, service_name, remove_volumes=False):
"""
Remove a container for an existing service. Handy for removing an existing conductor.
"""
conductor_container_id = engine_obj.get_container_id_for_service(service_name)
if engine_obj.service_is_running(service_name):
... | python | def remove_existing_container(engine_obj, service_name, remove_volumes=False):
conductor_container_id = engine_obj.get_container_id_for_service(service_name)
if engine_obj.service_is_running(service_name):
engine_obj.stop_container(conductor_container_id, forcefully=True)
if conductor_container_id:
... | [
"def",
"remove_existing_container",
"(",
"engine_obj",
",",
"service_name",
",",
"remove_volumes",
"=",
"False",
")",
":",
"conductor_container_id",
"=",
"engine_obj",
".",
"get_container_id_for_service",
"(",
"service_name",
")",
"if",
"engine_obj",
".",
"service_is_ru... | Remove a container for an existing service. Handy for removing an existing conductor. | [
"Remove",
"a",
"container",
"for",
"an",
"existing",
"service",
".",
"Handy",
"for",
"removing",
"an",
"existing",
"conductor",
"."
] | d031c1a6133d5482a5d054fcbdbecafb923f8b4b | https://github.com/ansible/ansible-container/blob/d031c1a6133d5482a5d054fcbdbecafb923f8b4b/container/core.py#L510-L518 |
244,604 | ansible/ansible-container | container/core.py | resolve_push_to | def resolve_push_to(push_to, default_url, default_namespace):
'''
Given a push-to value, return the registry and namespace.
:param push_to: string: User supplied --push-to value.
:param default_url: string: Container engine's default_index value (e.g. docker.io).
:return: tuple: registry_url, names... | python | def resolve_push_to(push_to, default_url, default_namespace):
'''
Given a push-to value, return the registry and namespace.
:param push_to: string: User supplied --push-to value.
:param default_url: string: Container engine's default_index value (e.g. docker.io).
:return: tuple: registry_url, names... | [
"def",
"resolve_push_to",
"(",
"push_to",
",",
"default_url",
",",
"default_namespace",
")",
":",
"protocol",
"=",
"'http://'",
"if",
"push_to",
".",
"startswith",
"(",
"'http://'",
")",
"else",
"'https://'",
"url",
"=",
"push_to",
"=",
"REMOVE_HTTP",
".",
"su... | Given a push-to value, return the registry and namespace.
:param push_to: string: User supplied --push-to value.
:param default_url: string: Container engine's default_index value (e.g. docker.io).
:return: tuple: registry_url, namespace | [
"Given",
"a",
"push",
"-",
"to",
"value",
"return",
"the",
"registry",
"and",
"namespace",
"."
] | d031c1a6133d5482a5d054fcbdbecafb923f8b4b | https://github.com/ansible/ansible-container/blob/d031c1a6133d5482a5d054fcbdbecafb923f8b4b/container/core.py#L522-L546 |
244,605 | ansible/ansible-container | container/core.py | conductorcmd_push | def conductorcmd_push(engine_name, project_name, services, **kwargs):
""" Push images to a registry """
username = kwargs.pop('username')
password = kwargs.pop('password')
email = kwargs.pop('email')
url = kwargs.pop('url')
namespace = kwargs.pop('namespace')
tag = kwargs.pop('tag')
conf... | python | def conductorcmd_push(engine_name, project_name, services, **kwargs):
username = kwargs.pop('username')
password = kwargs.pop('password')
email = kwargs.pop('email')
url = kwargs.pop('url')
namespace = kwargs.pop('namespace')
tag = kwargs.pop('tag')
config_path = kwargs.pop('config_path')
... | [
"def",
"conductorcmd_push",
"(",
"engine_name",
",",
"project_name",
",",
"services",
",",
"*",
"*",
"kwargs",
")",
":",
"username",
"=",
"kwargs",
".",
"pop",
"(",
"'username'",
")",
"password",
"=",
"kwargs",
".",
"pop",
"(",
"'password'",
")",
"email",
... | Push images to a registry | [
"Push",
"images",
"to",
"a",
"registry"
] | d031c1a6133d5482a5d054fcbdbecafb923f8b4b | https://github.com/ansible/ansible-container/blob/d031c1a6133d5482a5d054fcbdbecafb923f8b4b/container/core.py#L1038-L1069 |
244,606 | ansible/ansible-container | container/openshift/deploy.py | Deploy.get_route_templates | def get_route_templates(self):
"""
Generate Openshift route templates or playbook tasks. Each port on a service definition found in container.yml
represents an externally exposed port.
"""
def _get_published_ports(service_config):
result = []
for port in s... | python | def get_route_templates(self):
def _get_published_ports(service_config):
result = []
for port in service_config.get('ports', []):
protocol = 'TCP'
if isinstance(port, string_types) and '/' in port:
port, protocol = port.split('/')
... | [
"def",
"get_route_templates",
"(",
"self",
")",
":",
"def",
"_get_published_ports",
"(",
"service_config",
")",
":",
"result",
"=",
"[",
"]",
"for",
"port",
"in",
"service_config",
".",
"get",
"(",
"'ports'",
",",
"[",
"]",
")",
":",
"protocol",
"=",
"'T... | Generate Openshift route templates or playbook tasks. Each port on a service definition found in container.yml
represents an externally exposed port. | [
"Generate",
"Openshift",
"route",
"templates",
"or",
"playbook",
"tasks",
".",
"Each",
"port",
"on",
"a",
"service",
"definition",
"found",
"in",
"container",
".",
"yml",
"represents",
"an",
"externally",
"exposed",
"port",
"."
] | d031c1a6133d5482a5d054fcbdbecafb923f8b4b | https://github.com/ansible/ansible-container/blob/d031c1a6133d5482a5d054fcbdbecafb923f8b4b/container/openshift/deploy.py#L56-L117 |
244,607 | ansible/ansible-container | container/docker/importer.py | DockerfileParser.preparse_iter | def preparse_iter(self):
"""
Comments can be anywhere. So break apart the Dockerfile into significant
lines and any comments that precede them. And if a line is a carryover
from the previous via an escaped-newline, bring the directive with it.
"""
to_yield = {}
la... | python | def preparse_iter(self):
to_yield = {}
last_directive = None
lines_processed = 0
for line in self.lines_iter():
if not line:
continue
if line.startswith(u'#'):
comment = line.lstrip('#').strip()
# Directives have to ... | [
"def",
"preparse_iter",
"(",
"self",
")",
":",
"to_yield",
"=",
"{",
"}",
"last_directive",
"=",
"None",
"lines_processed",
"=",
"0",
"for",
"line",
"in",
"self",
".",
"lines_iter",
"(",
")",
":",
"if",
"not",
"line",
":",
"continue",
"if",
"line",
"."... | Comments can be anywhere. So break apart the Dockerfile into significant
lines and any comments that precede them. And if a line is a carryover
from the previous via an escaped-newline, bring the directive with it. | [
"Comments",
"can",
"be",
"anywhere",
".",
"So",
"break",
"apart",
"the",
"Dockerfile",
"into",
"significant",
"lines",
"and",
"any",
"comments",
"that",
"precede",
"them",
".",
"And",
"if",
"a",
"line",
"is",
"a",
"carryover",
"from",
"the",
"previous",
"v... | d031c1a6133d5482a5d054fcbdbecafb923f8b4b | https://github.com/ansible/ansible-container/blob/d031c1a6133d5482a5d054fcbdbecafb923f8b4b/container/docker/importer.py#L120-L155 |
244,608 | ansible/ansible-container | container/docker/engine.py | Engine.run_container | def run_container(self, image_id, service_name, **kwargs):
"""Run a particular container. The kwargs argument contains individual
parameter overrides from the service definition."""
run_kwargs = self.run_kwargs_for_service(service_name)
run_kwargs.update(kwargs, relax=True)
logge... | python | def run_container(self, image_id, service_name, **kwargs):
run_kwargs = self.run_kwargs_for_service(service_name)
run_kwargs.update(kwargs, relax=True)
logger.debug('Running container in docker', image=image_id, params=run_kwargs)
container_obj = self.client.containers.run(
... | [
"def",
"run_container",
"(",
"self",
",",
"image_id",
",",
"service_name",
",",
"*",
"*",
"kwargs",
")",
":",
"run_kwargs",
"=",
"self",
".",
"run_kwargs_for_service",
"(",
"service_name",
")",
"run_kwargs",
".",
"update",
"(",
"kwargs",
",",
"relax",
"=",
... | Run a particular container. The kwargs argument contains individual
parameter overrides from the service definition. | [
"Run",
"a",
"particular",
"container",
".",
"The",
"kwargs",
"argument",
"contains",
"individual",
"parameter",
"overrides",
"from",
"the",
"service",
"definition",
"."
] | d031c1a6133d5482a5d054fcbdbecafb923f8b4b | https://github.com/ansible/ansible-container/blob/d031c1a6133d5482a5d054fcbdbecafb923f8b4b/container/docker/engine.py#L265-L281 |
244,609 | ansible/ansible-container | container/docker/engine.py | Engine.push | def push(self, image_id, service_name, tag=None, namespace=None, url=None, username=None, password=None,
repository_prefix=None, **kwargs):
"""
Push an image to a remote registry.
"""
auth_config = {
'username': username,
'password': password
... | python | def push(self, image_id, service_name, tag=None, namespace=None, url=None, username=None, password=None,
repository_prefix=None, **kwargs):
auth_config = {
'username': username,
'password': password
}
build_stamp = self.get_build_stamp_for_image(image_id)
... | [
"def",
"push",
"(",
"self",
",",
"image_id",
",",
"service_name",
",",
"tag",
"=",
"None",
",",
"namespace",
"=",
"None",
",",
"url",
"=",
"None",
",",
"username",
"=",
"None",
",",
"password",
"=",
"None",
",",
"repository_prefix",
"=",
"None",
",",
... | Push an image to a remote registry. | [
"Push",
"an",
"image",
"to",
"a",
"remote",
"registry",
"."
] | d031c1a6133d5482a5d054fcbdbecafb923f8b4b | https://github.com/ansible/ansible-container/blob/d031c1a6133d5482a5d054fcbdbecafb923f8b4b/container/docker/engine.py#L895-L941 |
244,610 | ansible/ansible-container | container/docker/engine.py | Engine.login | def login(self, username, password, email, url, config_path):
"""
If username and password are provided, authenticate with the registry.
Otherwise, check the config file for existing authentication data.
"""
if username and password:
try:
self.client.l... | python | def login(self, username, password, email, url, config_path):
if username and password:
try:
self.client.login(username=username, password=password, email=email,
registry=url, reauth=True)
except docker_errors.APIError as exc:
... | [
"def",
"login",
"(",
"self",
",",
"username",
",",
"password",
",",
"email",
",",
"url",
",",
"config_path",
")",
":",
"if",
"username",
"and",
"password",
":",
"try",
":",
"self",
".",
"client",
".",
"login",
"(",
"username",
"=",
"username",
",",
"... | If username and password are provided, authenticate with the registry.
Otherwise, check the config file for existing authentication data. | [
"If",
"username",
"and",
"password",
"are",
"provided",
"authenticate",
"with",
"the",
"registry",
".",
"Otherwise",
"check",
"the",
"config",
"file",
"for",
"existing",
"authentication",
"data",
"."
] | d031c1a6133d5482a5d054fcbdbecafb923f8b4b | https://github.com/ansible/ansible-container/blob/d031c1a6133d5482a5d054fcbdbecafb923f8b4b/container/docker/engine.py#L1186-L1208 |
244,611 | ansible/ansible-container | container/docker/engine.py | Engine._update_config_file | def _update_config_file(username, password, email, url, config_path):
"""Update the config file with the authorization."""
try:
# read the existing config
config = json.load(open(config_path, "r"))
except ValueError:
config = dict()
if not config.get(... | python | def _update_config_file(username, password, email, url, config_path):
try:
# read the existing config
config = json.load(open(config_path, "r"))
except ValueError:
config = dict()
if not config.get('auths'):
config['auths'] = dict()
if no... | [
"def",
"_update_config_file",
"(",
"username",
",",
"password",
",",
"email",
",",
"url",
",",
"config_path",
")",
":",
"try",
":",
"# read the existing config",
"config",
"=",
"json",
".",
"load",
"(",
"open",
"(",
"config_path",
",",
"\"r\"",
")",
")",
"... | Update the config file with the authorization. | [
"Update",
"the",
"config",
"file",
"with",
"the",
"authorization",
"."
] | d031c1a6133d5482a5d054fcbdbecafb923f8b4b | https://github.com/ansible/ansible-container/blob/d031c1a6133d5482a5d054fcbdbecafb923f8b4b/container/docker/engine.py#L1212-L1235 |
244,612 | ansible/ansible-container | container/docker/engine.py | Engine._get_registry_auth | def _get_registry_auth(registry_url, config_path):
"""
Retrieve from the config file the current authentication for a given URL, and
return the username, password
"""
username = None
password = None
try:
docker_config = json.load(open(config_path))
... | python | def _get_registry_auth(registry_url, config_path):
username = None
password = None
try:
docker_config = json.load(open(config_path))
except ValueError:
# The configuration file is empty
return username, password
if docker_config.get('auths'):
... | [
"def",
"_get_registry_auth",
"(",
"registry_url",
",",
"config_path",
")",
":",
"username",
"=",
"None",
"password",
"=",
"None",
"try",
":",
"docker_config",
"=",
"json",
".",
"load",
"(",
"open",
"(",
"config_path",
")",
")",
"except",
"ValueError",
":",
... | Retrieve from the config file the current authentication for a given URL, and
return the username, password | [
"Retrieve",
"from",
"the",
"config",
"file",
"the",
"current",
"authentication",
"for",
"a",
"given",
"URL",
"and",
"return",
"the",
"username",
"password"
] | d031c1a6133d5482a5d054fcbdbecafb923f8b4b | https://github.com/ansible/ansible-container/blob/d031c1a6133d5482a5d054fcbdbecafb923f8b4b/container/docker/engine.py#L1239-L1256 |
244,613 | ansible/ansible-container | container/utils/__init__.py | resolve_role_to_path | def resolve_role_to_path(role):
"""
Given a role definition from a service's list of roles, returns the file path to the role
"""
loader = DataLoader()
try:
variable_manager = VariableManager(loader=loader)
except TypeError:
# If Ansible prior to ansible/ansible@8f97aef1a365
... | python | def resolve_role_to_path(role):
loader = DataLoader()
try:
variable_manager = VariableManager(loader=loader)
except TypeError:
# If Ansible prior to ansible/ansible@8f97aef1a365
variable_manager = VariableManager()
role_obj = RoleInclude.load(data=role, play=None,
... | [
"def",
"resolve_role_to_path",
"(",
"role",
")",
":",
"loader",
"=",
"DataLoader",
"(",
")",
"try",
":",
"variable_manager",
"=",
"VariableManager",
"(",
"loader",
"=",
"loader",
")",
"except",
"TypeError",
":",
"# If Ansible prior to ansible/ansible@8f97aef1a365",
... | Given a role definition from a service's list of roles, returns the file path to the role | [
"Given",
"a",
"role",
"definition",
"from",
"a",
"service",
"s",
"list",
"of",
"roles",
"returns",
"the",
"file",
"path",
"to",
"the",
"role"
] | d031c1a6133d5482a5d054fcbdbecafb923f8b4b | https://github.com/ansible/ansible-container/blob/d031c1a6133d5482a5d054fcbdbecafb923f8b4b/container/utils/__init__.py#L225-L238 |
244,614 | ansible/ansible-container | container/utils/__init__.py | get_role_fingerprint | def get_role_fingerprint(role, service_name, config_vars):
"""
Given a role definition from a service's list of roles, returns a hexdigest based on the role definition,
the role contents, and the hexdigest of each dependency
"""
def hash_file(hash_obj, file_path):
blocksize = 64 * 1024
... | python | def get_role_fingerprint(role, service_name, config_vars):
def hash_file(hash_obj, file_path):
blocksize = 64 * 1024
with open(file_path, 'rb') as ifs:
while True:
data = ifs.read(blocksize)
if not data:
break
hash_obj.u... | [
"def",
"get_role_fingerprint",
"(",
"role",
",",
"service_name",
",",
"config_vars",
")",
":",
"def",
"hash_file",
"(",
"hash_obj",
",",
"file_path",
")",
":",
"blocksize",
"=",
"64",
"*",
"1024",
"with",
"open",
"(",
"file_path",
",",
"'rb'",
")",
"as",
... | Given a role definition from a service's list of roles, returns a hexdigest based on the role definition,
the role contents, and the hexdigest of each dependency | [
"Given",
"a",
"role",
"definition",
"from",
"a",
"service",
"s",
"list",
"of",
"roles",
"returns",
"a",
"hexdigest",
"based",
"on",
"the",
"role",
"definition",
"the",
"role",
"contents",
"and",
"the",
"hexdigest",
"of",
"each",
"dependency"
] | d031c1a6133d5482a5d054fcbdbecafb923f8b4b | https://github.com/ansible/ansible-container/blob/d031c1a6133d5482a5d054fcbdbecafb923f8b4b/container/utils/__init__.py#L256-L323 |
244,615 | litl/backoff | backoff/_decorator.py | on_predicate | def on_predicate(wait_gen,
predicate=operator.not_,
max_tries=None,
max_time=None,
jitter=full_jitter,
on_success=None,
on_backoff=None,
on_giveup=None,
logger='backoff',
... | python | def on_predicate(wait_gen,
predicate=operator.not_,
max_tries=None,
max_time=None,
jitter=full_jitter,
on_success=None,
on_backoff=None,
on_giveup=None,
logger='backoff',
... | [
"def",
"on_predicate",
"(",
"wait_gen",
",",
"predicate",
"=",
"operator",
".",
"not_",
",",
"max_tries",
"=",
"None",
",",
"max_time",
"=",
"None",
",",
"jitter",
"=",
"full_jitter",
",",
"on_success",
"=",
"None",
",",
"on_backoff",
"=",
"None",
",",
"... | Returns decorator for backoff and retry triggered by predicate.
Args:
wait_gen: A generator yielding successive wait times in
seconds.
predicate: A function which when called on the return value of
the target function will trigger backoff when considered
truthily... | [
"Returns",
"decorator",
"for",
"backoff",
"and",
"retry",
"triggered",
"by",
"predicate",
"."
] | 229d30adce4128f093550a1761c49594c78df4b4 | https://github.com/litl/backoff/blob/229d30adce4128f093550a1761c49594c78df4b4/backoff/_decorator.py#L20-L106 |
244,616 | litl/backoff | backoff/_wait_gen.py | expo | def expo(base=2, factor=1, max_value=None):
"""Generator for exponential decay.
Args:
base: The mathematical base of the exponentiation operation
factor: Factor to multiply the exponentation by.
max_value: The maximum value to yield. Once the value in the
true exponential s... | python | def expo(base=2, factor=1, max_value=None):
n = 0
while True:
a = factor * base ** n
if max_value is None or a < max_value:
yield a
n += 1
else:
yield max_value | [
"def",
"expo",
"(",
"base",
"=",
"2",
",",
"factor",
"=",
"1",
",",
"max_value",
"=",
"None",
")",
":",
"n",
"=",
"0",
"while",
"True",
":",
"a",
"=",
"factor",
"*",
"base",
"**",
"n",
"if",
"max_value",
"is",
"None",
"or",
"a",
"<",
"max_value... | Generator for exponential decay.
Args:
base: The mathematical base of the exponentiation operation
factor: Factor to multiply the exponentation by.
max_value: The maximum value to yield. Once the value in the
true exponential sequence exceeds this, the value
of max... | [
"Generator",
"for",
"exponential",
"decay",
"."
] | 229d30adce4128f093550a1761c49594c78df4b4 | https://github.com/litl/backoff/blob/229d30adce4128f093550a1761c49594c78df4b4/backoff/_wait_gen.py#L6-L23 |
244,617 | litl/backoff | backoff/_wait_gen.py | fibo | def fibo(max_value=None):
"""Generator for fibonaccial decay.
Args:
max_value: The maximum value to yield. Once the value in the
true fibonacci sequence exceeds this, the value
of max_value will forever after be yielded.
"""
a = 1
b = 1
while True:
if m... | python | def fibo(max_value=None):
a = 1
b = 1
while True:
if max_value is None or a < max_value:
yield a
a, b = b, a + b
else:
yield max_value | [
"def",
"fibo",
"(",
"max_value",
"=",
"None",
")",
":",
"a",
"=",
"1",
"b",
"=",
"1",
"while",
"True",
":",
"if",
"max_value",
"is",
"None",
"or",
"a",
"<",
"max_value",
":",
"yield",
"a",
"a",
",",
"b",
"=",
"b",
",",
"a",
"+",
"b",
"else",
... | Generator for fibonaccial decay.
Args:
max_value: The maximum value to yield. Once the value in the
true fibonacci sequence exceeds this, the value
of max_value will forever after be yielded. | [
"Generator",
"for",
"fibonaccial",
"decay",
"."
] | 229d30adce4128f093550a1761c49594c78df4b4 | https://github.com/litl/backoff/blob/229d30adce4128f093550a1761c49594c78df4b4/backoff/_wait_gen.py#L26-L41 |
244,618 | litl/backoff | backoff/_wait_gen.py | constant | def constant(interval=1):
"""Generator for constant intervals.
Args:
interval: A constant value to yield or an iterable of such values.
"""
try:
itr = iter(interval)
except TypeError:
itr = itertools.repeat(interval)
for val in itr:
yield val | python | def constant(interval=1):
try:
itr = iter(interval)
except TypeError:
itr = itertools.repeat(interval)
for val in itr:
yield val | [
"def",
"constant",
"(",
"interval",
"=",
"1",
")",
":",
"try",
":",
"itr",
"=",
"iter",
"(",
"interval",
")",
"except",
"TypeError",
":",
"itr",
"=",
"itertools",
".",
"repeat",
"(",
"interval",
")",
"for",
"val",
"in",
"itr",
":",
"yield",
"val"
] | Generator for constant intervals.
Args:
interval: A constant value to yield or an iterable of such values. | [
"Generator",
"for",
"constant",
"intervals",
"."
] | 229d30adce4128f093550a1761c49594c78df4b4 | https://github.com/litl/backoff/blob/229d30adce4128f093550a1761c49594c78df4b4/backoff/_wait_gen.py#L44-L56 |
244,619 | crytic/slither | slither/detectors/erc20/incorrect_interface.py | IncorrectERC20InterfaceDetection.detect_incorrect_erc20_interface | def detect_incorrect_erc20_interface(contract):
""" Detect incorrect ERC20 interface
Returns:
list(str) : list of incorrect function signatures
"""
functions = [f for f in contract.functions if f.contract == contract and \
IncorrectERC20InterfaceDetectio... | python | def detect_incorrect_erc20_interface(contract):
functions = [f for f in contract.functions if f.contract == contract and \
IncorrectERC20InterfaceDetection.incorrect_erc20_interface(f.signature)]
return functions | [
"def",
"detect_incorrect_erc20_interface",
"(",
"contract",
")",
":",
"functions",
"=",
"[",
"f",
"for",
"f",
"in",
"contract",
".",
"functions",
"if",
"f",
".",
"contract",
"==",
"contract",
"and",
"IncorrectERC20InterfaceDetection",
".",
"incorrect_erc20_interface... | Detect incorrect ERC20 interface
Returns:
list(str) : list of incorrect function signatures | [
"Detect",
"incorrect",
"ERC20",
"interface"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/erc20/incorrect_interface.py#L49-L57 |
244,620 | crytic/slither | slither/detectors/erc20/incorrect_interface.py | IncorrectERC20InterfaceDetection._detect | def _detect(self):
""" Detect incorrect erc20 interface
Returns:
dict: [contrat name] = set(str) events
"""
results = []
for c in self.contracts:
functions = IncorrectERC20InterfaceDetection.detect_incorrect_erc20_interface(c)
if functions:
... | python | def _detect(self):
results = []
for c in self.contracts:
functions = IncorrectERC20InterfaceDetection.detect_incorrect_erc20_interface(c)
if functions:
info = "{} ({}) has incorrect ERC20 function interface(s):\n"
info = info.format(c.name,
... | [
"def",
"_detect",
"(",
"self",
")",
":",
"results",
"=",
"[",
"]",
"for",
"c",
"in",
"self",
".",
"contracts",
":",
"functions",
"=",
"IncorrectERC20InterfaceDetection",
".",
"detect_incorrect_erc20_interface",
"(",
"c",
")",
"if",
"functions",
":",
"info",
... | Detect incorrect erc20 interface
Returns:
dict: [contrat name] = set(str) events | [
"Detect",
"incorrect",
"erc20",
"interface"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/erc20/incorrect_interface.py#L59-L78 |
244,621 | crytic/slither | slither/detectors/shadowing/local.py | LocalShadowing.detect_shadowing_definitions | def detect_shadowing_definitions(self, contract):
""" Detects if functions, access modifiers, events, state variables, and local variables are named after
reserved keywords. Any such definitions are returned in a list.
Returns:
list of tuple: (type, contract name, definition)"""
... | python | def detect_shadowing_definitions(self, contract):
result = []
# Loop through all functions + modifiers in this contract.
for function in contract.functions + contract.modifiers:
# We should only look for functions declared directly in this contract (not in a base contract).
... | [
"def",
"detect_shadowing_definitions",
"(",
"self",
",",
"contract",
")",
":",
"result",
"=",
"[",
"]",
"# Loop through all functions + modifiers in this contract.",
"for",
"function",
"in",
"contract",
".",
"functions",
"+",
"contract",
".",
"modifiers",
":",
"# We s... | Detects if functions, access modifiers, events, state variables, and local variables are named after
reserved keywords. Any such definitions are returned in a list.
Returns:
list of tuple: (type, contract name, definition) | [
"Detects",
"if",
"functions",
"access",
"modifiers",
"events",
"state",
"variables",
"and",
"local",
"variables",
"are",
"named",
"after",
"reserved",
"keywords",
".",
"Any",
"such",
"definitions",
"are",
"returned",
"in",
"a",
"list",
"."
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/shadowing/local.py#L51-L90 |
244,622 | crytic/slither | slither/detectors/shadowing/local.py | LocalShadowing._detect | def _detect(self):
""" Detect shadowing local variables
Recursively visit the calls
Returns:
list: {'vuln', 'filename,'contract','func', 'shadow'}
"""
results = []
for contract in self.contracts:
shadows = self.detect_shadowing_definitions(contr... | python | def _detect(self):
results = []
for contract in self.contracts:
shadows = self.detect_shadowing_definitions(contract)
if shadows:
for shadow in shadows:
local_parent_name = shadow[1]
local_variable = shadow[2]
... | [
"def",
"_detect",
"(",
"self",
")",
":",
"results",
"=",
"[",
"]",
"for",
"contract",
"in",
"self",
".",
"contracts",
":",
"shadows",
"=",
"self",
".",
"detect_shadowing_definitions",
"(",
"contract",
")",
"if",
"shadows",
":",
"for",
"shadow",
"in",
"sh... | Detect shadowing local variables
Recursively visit the calls
Returns:
list: {'vuln', 'filename,'contract','func', 'shadow'} | [
"Detect",
"shadowing",
"local",
"variables"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/shadowing/local.py#L92-L131 |
244,623 | crytic/slither | slither/detectors/variables/possible_const_state_variables.py | ConstCandidateStateVars._detect | def _detect(self):
""" Detect state variables that could be const
"""
results = []
all_info = ''
all_variables = [c.state_variables for c in self.slither.contracts]
all_variables = set([item for sublist in all_variables for item in sublist])
all_non_constant_elem... | python | def _detect(self):
results = []
all_info = ''
all_variables = [c.state_variables for c in self.slither.contracts]
all_variables = set([item for sublist in all_variables for item in sublist])
all_non_constant_elementary_variables = set([v for v in all_variables
... | [
"def",
"_detect",
"(",
"self",
")",
":",
"results",
"=",
"[",
"]",
"all_info",
"=",
"''",
"all_variables",
"=",
"[",
"c",
".",
"state_variables",
"for",
"c",
"in",
"self",
".",
"slither",
".",
"contracts",
"]",
"all_variables",
"=",
"set",
"(",
"[",
... | Detect state variables that could be const | [
"Detect",
"state",
"variables",
"that",
"could",
"be",
"const"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/variables/possible_const_state_variables.py#L66-L96 |
244,624 | crytic/slither | slither/detectors/functions/suicidal.py | Suicidal.detect_suicidal_func | def detect_suicidal_func(func):
""" Detect if the function is suicidal
Detect the public functions calling suicide/selfdestruct without protection
Returns:
(bool): True if the function is suicidal
"""
if func.is_constructor:
return False
if func... | python | def detect_suicidal_func(func):
if func.is_constructor:
return False
if func.visibility != 'public':
return False
calls = [c.name for c in func.internal_calls]
if not ('suicide(address)' in calls or 'selfdestruct(address)' in calls):
return False
... | [
"def",
"detect_suicidal_func",
"(",
"func",
")",
":",
"if",
"func",
".",
"is_constructor",
":",
"return",
"False",
"if",
"func",
".",
"visibility",
"!=",
"'public'",
":",
"return",
"False",
"calls",
"=",
"[",
"c",
".",
"name",
"for",
"c",
"in",
"func",
... | Detect if the function is suicidal
Detect the public functions calling suicide/selfdestruct without protection
Returns:
(bool): True if the function is suicidal | [
"Detect",
"if",
"the",
"function",
"is",
"suicidal"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/functions/suicidal.py#L37-L58 |
244,625 | crytic/slither | slither/detectors/functions/suicidal.py | Suicidal._detect | def _detect(self):
""" Detect the suicidal functions
"""
results = []
for c in self.contracts:
functions = self.detect_suicidal(c)
for func in functions:
txt = "{}.{} ({}) allows anyone to destruct the contract\n"
info = txt.format... | python | def _detect(self):
results = []
for c in self.contracts:
functions = self.detect_suicidal(c)
for func in functions:
txt = "{}.{} ({}) allows anyone to destruct the contract\n"
info = txt.format(func.contract.name,
... | [
"def",
"_detect",
"(",
"self",
")",
":",
"results",
"=",
"[",
"]",
"for",
"c",
"in",
"self",
".",
"contracts",
":",
"functions",
"=",
"self",
".",
"detect_suicidal",
"(",
"c",
")",
"for",
"func",
"in",
"functions",
":",
"txt",
"=",
"\"{}.{} ({}) allows... | Detect the suicidal functions | [
"Detect",
"the",
"suicidal",
"functions"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/functions/suicidal.py#L67-L84 |
244,626 | crytic/slither | slither/detectors/operations/unused_return_values.py | UnusedReturnValues._detect | def _detect(self):
""" Detect high level calls which return a value that are never used
"""
results = []
for c in self.slither.contracts:
for f in c.functions + c.modifiers:
if f.contract != c:
continue
unused_return = self.... | python | def _detect(self):
results = []
for c in self.slither.contracts:
for f in c.functions + c.modifiers:
if f.contract != c:
continue
unused_return = self.detect_unused_return_values(f)
if unused_return:
info... | [
"def",
"_detect",
"(",
"self",
")",
":",
"results",
"=",
"[",
"]",
"for",
"c",
"in",
"self",
".",
"slither",
".",
"contracts",
":",
"for",
"f",
"in",
"c",
".",
"functions",
"+",
"c",
".",
"modifiers",
":",
"if",
"f",
".",
"contract",
"!=",
"c",
... | Detect high level calls which return a value that are never used | [
"Detect",
"high",
"level",
"calls",
"which",
"return",
"a",
"value",
"that",
"are",
"never",
"used"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/operations/unused_return_values.py#L61-L83 |
244,627 | crytic/slither | slither/printers/inheritance/inheritance_graph.py | PrinterInheritanceGraph._summary | def _summary(self, contract):
"""
Build summary using HTML
"""
ret = ''
# Add arrows (number them if there is more than one path so we know order of declaration for inheritance).
if len(contract.immediate_inheritance) == 1:
ret += '%s -> %s;\n' % (contrac... | python | def _summary(self, contract):
ret = ''
# Add arrows (number them if there is more than one path so we know order of declaration for inheritance).
if len(contract.immediate_inheritance) == 1:
ret += '%s -> %s;\n' % (contract.name, contract.immediate_inheritance[0])
else:
... | [
"def",
"_summary",
"(",
"self",
",",
"contract",
")",
":",
"ret",
"=",
"''",
"# Add arrows (number them if there is more than one path so we know order of declaration for inheritance).",
"if",
"len",
"(",
"contract",
".",
"immediate_inheritance",
")",
"==",
"1",
":",
"ret... | Build summary using HTML | [
"Build",
"summary",
"using",
"HTML"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/printers/inheritance/inheritance_graph.py#L103-L165 |
244,628 | crytic/slither | slither/detectors/shadowing/builtin_symbols.py | BuiltinSymbolShadowing.detect_builtin_shadowing_definitions | def detect_builtin_shadowing_definitions(self, contract):
""" Detects if functions, access modifiers, events, state variables, or local variables are named after built-in
symbols. Any such definitions are returned in a list.
Returns:
list of tuple: (type, definition, [local vari... | python | def detect_builtin_shadowing_definitions(self, contract):
result = []
# Loop through all functions, modifiers, variables (state and local) to detect any built-in symbol keywords.
for function in contract.functions:
if function.contract == contract:
if self.is_builtin... | [
"def",
"detect_builtin_shadowing_definitions",
"(",
"self",
",",
"contract",
")",
":",
"result",
"=",
"[",
"]",
"# Loop through all functions, modifiers, variables (state and local) to detect any built-in symbol keywords.",
"for",
"function",
"in",
"contract",
".",
"functions",
... | Detects if functions, access modifiers, events, state variables, or local variables are named after built-in
symbols. Any such definitions are returned in a list.
Returns:
list of tuple: (type, definition, [local variable parent]) | [
"Detects",
"if",
"functions",
"access",
"modifiers",
"events",
"state",
"variables",
"or",
"local",
"variables",
"are",
"named",
"after",
"built",
"-",
"in",
"symbols",
".",
"Any",
"such",
"definitions",
"are",
"returned",
"in",
"a",
"list",
"."
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/shadowing/builtin_symbols.py#L83-L112 |
244,629 | crytic/slither | slither/detectors/shadowing/builtin_symbols.py | BuiltinSymbolShadowing._detect | def _detect(self):
""" Detect shadowing of built-in symbols
Recursively visit the calls
Returns:
list: {'vuln', 'filename,'contract','func', 'shadow'}
"""
results = []
for contract in self.contracts:
shadows = self.detect_builtin_shadowing_defin... | python | def _detect(self):
results = []
for contract in self.contracts:
shadows = self.detect_builtin_shadowing_definitions(contract)
if shadows:
for shadow in shadows:
# Obtain components
shadow_type = shadow[0]
... | [
"def",
"_detect",
"(",
"self",
")",
":",
"results",
"=",
"[",
"]",
"for",
"contract",
"in",
"self",
".",
"contracts",
":",
"shadows",
"=",
"self",
".",
"detect_builtin_shadowing_definitions",
"(",
"contract",
")",
"if",
"shadows",
":",
"for",
"shadow",
"in... | Detect shadowing of built-in symbols
Recursively visit the calls
Returns:
list: {'vuln', 'filename,'contract','func', 'shadow'} | [
"Detect",
"shadowing",
"of",
"built",
"-",
"in",
"symbols"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/shadowing/builtin_symbols.py#L114-L152 |
244,630 | crytic/slither | slither/utils/inheritance_analysis.py | detect_c3_function_shadowing | def detect_c3_function_shadowing(contract):
"""
Detects and obtains functions which are indirectly shadowed via multiple inheritance by C3 linearization
properties, despite not directly inheriting from each other.
:param contract: The contract to check for potential C3 linearization shadowing within.
... | python | def detect_c3_function_shadowing(contract):
# Loop through all contracts, and all underlying functions.
results = {}
for i in range(0, len(contract.immediate_inheritance) - 1):
inherited_contract1 = contract.immediate_inheritance[i]
for function1 in inherited_contract1.functions_and_modifie... | [
"def",
"detect_c3_function_shadowing",
"(",
"contract",
")",
":",
"# Loop through all contracts, and all underlying functions.",
"results",
"=",
"{",
"}",
"for",
"i",
"in",
"range",
"(",
"0",
",",
"len",
"(",
"contract",
".",
"immediate_inheritance",
")",
"-",
"1",
... | Detects and obtains functions which are indirectly shadowed via multiple inheritance by C3 linearization
properties, despite not directly inheriting from each other.
:param contract: The contract to check for potential C3 linearization shadowing within.
:return: A list of list of tuples: (contract, functio... | [
"Detects",
"and",
"obtains",
"functions",
"which",
"are",
"indirectly",
"shadowed",
"via",
"multiple",
"inheritance",
"by",
"C3",
"linearization",
"properties",
"despite",
"not",
"directly",
"inheriting",
"from",
"each",
"other",
"."
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/utils/inheritance_analysis.py#L6-L50 |
244,631 | crytic/slither | slither/detectors/variables/uninitialized_state_variables.py | UninitializedStateVarsDetection._detect | def _detect(self):
""" Detect uninitialized state variables
Recursively visit the calls
Returns:
dict: [contract name] = set(state variable uninitialized)
"""
results = []
for c in self.slither.contracts_derived:
ret = self.detect_uninitialized(c)... | python | def _detect(self):
results = []
for c in self.slither.contracts_derived:
ret = self.detect_uninitialized(c)
for variable, functions in ret:
info = "{}.{} ({}) is never initialized. It is used in:\n"
info = info.format(variable.contract.name,
... | [
"def",
"_detect",
"(",
"self",
")",
":",
"results",
"=",
"[",
"]",
"for",
"c",
"in",
"self",
".",
"slither",
".",
"contracts_derived",
":",
"ret",
"=",
"self",
".",
"detect_uninitialized",
"(",
"c",
")",
"for",
"variable",
",",
"functions",
"in",
"ret"... | Detect uninitialized state variables
Recursively visit the calls
Returns:
dict: [contract name] = set(state variable uninitialized) | [
"Detect",
"uninitialized",
"state",
"variables"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/variables/uninitialized_state_variables.py#L84-L110 |
244,632 | crytic/slither | slither/detectors/functions/external_function.py | ExternalFunction.detect_functions_called | def detect_functions_called(contract):
""" Returns a list of InternallCall, SolidityCall
calls made in a function
Returns:
(list): List of all InternallCall, SolidityCall
"""
result = []
# Obtain all functions reachable by this contract.
for func... | python | def detect_functions_called(contract):
result = []
# Obtain all functions reachable by this contract.
for func in contract.all_functions_called:
# Loop through all nodes in the function, add all calls to a list.
for node in func.nodes:
for ir in node.irs:... | [
"def",
"detect_functions_called",
"(",
"contract",
")",
":",
"result",
"=",
"[",
"]",
"# Obtain all functions reachable by this contract.",
"for",
"func",
"in",
"contract",
".",
"all_functions_called",
":",
"# Loop through all nodes in the function, add all calls to a list.",
"... | Returns a list of InternallCall, SolidityCall
calls made in a function
Returns:
(list): List of all InternallCall, SolidityCall | [
"Returns",
"a",
"list",
"of",
"InternallCall",
"SolidityCall",
"calls",
"made",
"in",
"a",
"function"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/functions/external_function.py#L27-L43 |
244,633 | crytic/slither | slither/detectors/functions/external_function.py | ExternalFunction._contains_internal_dynamic_call | def _contains_internal_dynamic_call(contract):
"""
Checks if a contract contains a dynamic call either in a direct definition, or through inheritance.
Returns:
(boolean): True if this contract contains a dynamic call (including through inheritance).
"""
for func in c... | python | def _contains_internal_dynamic_call(contract):
for func in contract.all_functions_called:
for node in func.nodes:
for ir in node.irs:
if isinstance(ir, (InternalDynamicCall)):
return True
return False | [
"def",
"_contains_internal_dynamic_call",
"(",
"contract",
")",
":",
"for",
"func",
"in",
"contract",
".",
"all_functions_called",
":",
"for",
"node",
"in",
"func",
".",
"nodes",
":",
"for",
"ir",
"in",
"node",
".",
"irs",
":",
"if",
"isinstance",
"(",
"ir... | Checks if a contract contains a dynamic call either in a direct definition, or through inheritance.
Returns:
(boolean): True if this contract contains a dynamic call (including through inheritance). | [
"Checks",
"if",
"a",
"contract",
"contains",
"a",
"dynamic",
"call",
"either",
"in",
"a",
"direct",
"definition",
"or",
"through",
"inheritance",
"."
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/functions/external_function.py#L46-L58 |
244,634 | crytic/slither | slither/detectors/functions/external_function.py | ExternalFunction.get_base_most_function | def get_base_most_function(function):
"""
Obtains the base function definition for the provided function. This could be used to obtain the original
definition of a function, if the provided function is an override.
Returns:
(function): Returns the base-most function of a pro... | python | def get_base_most_function(function):
# Loop through the list of inherited contracts and this contract, to find the first function instance which
# matches this function's signature. Note here that `inheritance` is in order from most basic to most extended.
for contract in function.contract.inhe... | [
"def",
"get_base_most_function",
"(",
"function",
")",
":",
"# Loop through the list of inherited contracts and this contract, to find the first function instance which",
"# matches this function's signature. Note here that `inheritance` is in order from most basic to most extended.",
"for",
"cont... | Obtains the base function definition for the provided function. This could be used to obtain the original
definition of a function, if the provided function is an override.
Returns:
(function): Returns the base-most function of a provided function. (The original definition). | [
"Obtains",
"the",
"base",
"function",
"definition",
"for",
"the",
"provided",
"function",
".",
"This",
"could",
"be",
"used",
"to",
"obtain",
"the",
"original",
"definition",
"of",
"a",
"function",
"if",
"the",
"provided",
"function",
"is",
"an",
"override",
... | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/functions/external_function.py#L61-L82 |
244,635 | crytic/slither | slither/detectors/functions/external_function.py | ExternalFunction.get_all_function_definitions | def get_all_function_definitions(base_most_function):
"""
Obtains all function definitions given a base-most function. This includes the provided function, plus any
overrides of that function.
Returns:
(list): Returns any the provided function and any overriding functions de... | python | def get_all_function_definitions(base_most_function):
# We assume the provided function is the base-most function, so we check all derived contracts
# for a redefinition
return [base_most_function] + [function for derived_contract in base_most_function.contract.derived_contracts
... | [
"def",
"get_all_function_definitions",
"(",
"base_most_function",
")",
":",
"# We assume the provided function is the base-most function, so we check all derived contracts",
"# for a redefinition",
"return",
"[",
"base_most_function",
"]",
"+",
"[",
"function",
"for",
"derived_contra... | Obtains all function definitions given a base-most function. This includes the provided function, plus any
overrides of that function.
Returns:
(list): Returns any the provided function and any overriding functions defined for it. | [
"Obtains",
"all",
"function",
"definitions",
"given",
"a",
"base",
"-",
"most",
"function",
".",
"This",
"includes",
"the",
"provided",
"function",
"plus",
"any",
"overrides",
"of",
"that",
"function",
"."
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/functions/external_function.py#L85-L97 |
244,636 | crytic/slither | slither/detectors/functions/complex_function.py | ComplexFunction.detect_complex_func | def detect_complex_func(func):
"""Detect the cyclomatic complexity of the contract functions
shouldn't be greater than 7
"""
result = []
code_complexity = compute_cyclomatic_complexity(func)
if code_complexity > ComplexFunction.MAX_CYCLOMATIC_COMPLEXITY:
r... | python | def detect_complex_func(func):
result = []
code_complexity = compute_cyclomatic_complexity(func)
if code_complexity > ComplexFunction.MAX_CYCLOMATIC_COMPLEXITY:
result.append({
"func": func,
"cause": ComplexFunction.CAUSE_CYCLOMATIC
})
... | [
"def",
"detect_complex_func",
"(",
"func",
")",
":",
"result",
"=",
"[",
"]",
"code_complexity",
"=",
"compute_cyclomatic_complexity",
"(",
"func",
")",
"if",
"code_complexity",
">",
"ComplexFunction",
".",
"MAX_CYCLOMATIC_COMPLEXITY",
":",
"result",
".",
"append",
... | Detect the cyclomatic complexity of the contract functions
shouldn't be greater than 7 | [
"Detect",
"the",
"cyclomatic",
"complexity",
"of",
"the",
"contract",
"functions",
"shouldn",
"t",
"be",
"greater",
"than",
"7"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/functions/complex_function.py#L36-L73 |
244,637 | crytic/slither | slither/detectors/variables/unused_state_variables.py | UnusedStateVars._detect | def _detect(self):
""" Detect unused state variables
"""
results = []
for c in self.slither.contracts_derived:
unusedVars = self.detect_unused(c)
if unusedVars:
info = ''
for var in unusedVars:
info += "{}.{} ({}... | python | def _detect(self):
results = []
for c in self.slither.contracts_derived:
unusedVars = self.detect_unused(c)
if unusedVars:
info = ''
for var in unusedVars:
info += "{}.{} ({}) is never used in {}\n".format(var.contract.name,
... | [
"def",
"_detect",
"(",
"self",
")",
":",
"results",
"=",
"[",
"]",
"for",
"c",
"in",
"self",
".",
"slither",
".",
"contracts_derived",
":",
"unusedVars",
"=",
"self",
".",
"detect_unused",
"(",
"c",
")",
"if",
"unusedVars",
":",
"info",
"=",
"''",
"f... | Detect unused state variables | [
"Detect",
"unused",
"state",
"variables"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/variables/unused_state_variables.py#L51-L70 |
244,638 | crytic/slither | slither/detectors/variables/uninitialized_local_variables.py | UninitializedLocalVars._detect | def _detect(self):
""" Detect uninitialized local variables
Recursively visit the calls
Returns:
dict: [contract name] = set(local variable uninitialized)
"""
results = []
self.results = []
self.visited_all_paths = {}
for contract in self.sl... | python | def _detect(self):
results = []
self.results = []
self.visited_all_paths = {}
for contract in self.slither.contracts:
for function in contract.functions:
if function.is_implemented and function.contract == contract:
if function.contains_a... | [
"def",
"_detect",
"(",
"self",
")",
":",
"results",
"=",
"[",
"]",
"self",
".",
"results",
"=",
"[",
"]",
"self",
".",
"visited_all_paths",
"=",
"{",
"}",
"for",
"contract",
"in",
"self",
".",
"slither",
".",
"contracts",
":",
"for",
"function",
"in"... | Detect uninitialized local variables
Recursively visit the calls
Returns:
dict: [contract name] = set(local variable uninitialized) | [
"Detect",
"uninitialized",
"local",
"variables"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/variables/uninitialized_local_variables.py#L79-L116 |
244,639 | crytic/slither | slither/detectors/erc20/unindexed_event_parameters.py | UnindexedERC20EventParameters._detect | def _detect(self):
"""
Detect un-indexed ERC20 event parameters in all contracts.
"""
results = []
for c in self.contracts:
unindexed_params = self.detect_erc20_unindexed_event_params(c)
if unindexed_params:
info = "{} ({}) does not mark im... | python | def _detect(self):
results = []
for c in self.contracts:
unindexed_params = self.detect_erc20_unindexed_event_params(c)
if unindexed_params:
info = "{} ({}) does not mark important ERC20 parameters as 'indexed':\n"
info = info.format(c.name, c.sour... | [
"def",
"_detect",
"(",
"self",
")",
":",
"results",
"=",
"[",
"]",
"for",
"c",
"in",
"self",
".",
"contracts",
":",
"unindexed_params",
"=",
"self",
".",
"detect_erc20_unindexed_event_params",
"(",
"c",
")",
"if",
"unindexed_params",
":",
"info",
"=",
"\"{... | Detect un-indexed ERC20 event parameters in all contracts. | [
"Detect",
"un",
"-",
"indexed",
"ERC20",
"event",
"parameters",
"in",
"all",
"contracts",
"."
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/erc20/unindexed_event_parameters.py#L67-L85 |
244,640 | crytic/slither | slither/core/slither_core.py | Slither.print_functions | def print_functions(self, d):
"""
Export all the functions to dot files
"""
for c in self.contracts:
for f in c.functions:
f.cfg_to_dot(os.path.join(d, '{}.{}.dot'.format(c.name, f.name))) | python | def print_functions(self, d):
for c in self.contracts:
for f in c.functions:
f.cfg_to_dot(os.path.join(d, '{}.{}.dot'.format(c.name, f.name))) | [
"def",
"print_functions",
"(",
"self",
",",
"d",
")",
":",
"for",
"c",
"in",
"self",
".",
"contracts",
":",
"for",
"f",
"in",
"c",
".",
"functions",
":",
"f",
".",
"cfg_to_dot",
"(",
"os",
".",
"path",
".",
"join",
"(",
"d",
",",
"'{}.{}.dot'",
"... | Export all the functions to dot files | [
"Export",
"all",
"the",
"functions",
"to",
"dot",
"files"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/core/slither_core.py#L155-L161 |
244,641 | crytic/slither | slither/printers/inheritance/inheritance.py | PrinterInheritance.output | def output(self, filename):
"""
Output the inheritance relation
_filename is not used
Args:
_filename(string)
"""
info = 'Inheritance\n'
if not self.contracts:
return
info += blue('Child_Contract -> ') + green('Im... | python | def output(self, filename):
info = 'Inheritance\n'
if not self.contracts:
return
info += blue('Child_Contract -> ') + green('Immediate_Base_Contracts')
info += green(' [Not_Immediate_Base_Contracts]')
for child in self.contracts:
info += blue(f'\n+ {chil... | [
"def",
"output",
"(",
"self",
",",
"filename",
")",
":",
"info",
"=",
"'Inheritance\\n'",
"if",
"not",
"self",
".",
"contracts",
":",
"return",
"info",
"+=",
"blue",
"(",
"'Child_Contract -> '",
")",
"+",
"green",
"(",
"'Immediate_Base_Contracts'",
")",
"inf... | Output the inheritance relation
_filename is not used
Args:
_filename(string) | [
"Output",
"the",
"inheritance",
"relation"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/printers/inheritance/inheritance.py#L23-L58 |
244,642 | crytic/slither | slither/detectors/variables/uninitialized_storage_variables.py | UninitializedStorageVars._detect | def _detect(self):
""" Detect uninitialized storage variables
Recursively visit the calls
Returns:
dict: [contract name] = set(storage variable uninitialized)
"""
results = []
self.results = []
self.visited_all_paths = {}
for contract in sel... | python | def _detect(self):
results = []
self.results = []
self.visited_all_paths = {}
for contract in self.slither.contracts:
for function in contract.functions:
if function.is_implemented:
uninitialized_storage_variables = [v for v in function.l... | [
"def",
"_detect",
"(",
"self",
")",
":",
"results",
"=",
"[",
"]",
"self",
".",
"results",
"=",
"[",
"]",
"self",
".",
"visited_all_paths",
"=",
"{",
"}",
"for",
"contract",
"in",
"self",
".",
"slither",
".",
"contracts",
":",
"for",
"function",
"in"... | Detect uninitialized storage variables
Recursively visit the calls
Returns:
dict: [contract name] = set(storage variable uninitialized) | [
"Detect",
"uninitialized",
"storage",
"variables"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/variables/uninitialized_storage_variables.py#L86-L117 |
244,643 | crytic/slither | slither/detectors/reentrancy/reentrancy.py | Reentrancy._can_callback | def _can_callback(self, irs):
"""
Detect if the node contains a call that can
be used to re-entrance
Consider as valid target:
- low level call
- high level call
Do not consider Send/Transfer as there is not enough gas
"""
... | python | def _can_callback(self, irs):
for ir in irs:
if isinstance(ir, LowLevelCall):
return True
if isinstance(ir, HighLevelCall) and not isinstance(ir, LibraryCall):
# If solidity >0.5, STATICCALL is used
if self.slither.solc_version and self.sli... | [
"def",
"_can_callback",
"(",
"self",
",",
"irs",
")",
":",
"for",
"ir",
"in",
"irs",
":",
"if",
"isinstance",
"(",
"ir",
",",
"LowLevelCall",
")",
":",
"return",
"True",
"if",
"isinstance",
"(",
"ir",
",",
"HighLevelCall",
")",
"and",
"not",
"isinstanc... | Detect if the node contains a call that can
be used to re-entrance
Consider as valid target:
- low level call
- high level call
Do not consider Send/Transfer as there is not enough gas | [
"Detect",
"if",
"the",
"node",
"contains",
"a",
"call",
"that",
"can",
"be",
"used",
"to",
"re",
"-",
"entrance"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/reentrancy/reentrancy.py#L37-L68 |
244,644 | crytic/slither | slither/detectors/reentrancy/reentrancy.py | Reentrancy._can_send_eth | def _can_send_eth(irs):
"""
Detect if the node can send eth
"""
for ir in irs:
if isinstance(ir, (HighLevelCall, LowLevelCall, Transfer, Send)):
if ir.call_value:
return True
return False | python | def _can_send_eth(irs):
for ir in irs:
if isinstance(ir, (HighLevelCall, LowLevelCall, Transfer, Send)):
if ir.call_value:
return True
return False | [
"def",
"_can_send_eth",
"(",
"irs",
")",
":",
"for",
"ir",
"in",
"irs",
":",
"if",
"isinstance",
"(",
"ir",
",",
"(",
"HighLevelCall",
",",
"LowLevelCall",
",",
"Transfer",
",",
"Send",
")",
")",
":",
"if",
"ir",
".",
"call_value",
":",
"return",
"Tr... | Detect if the node can send eth | [
"Detect",
"if",
"the",
"node",
"can",
"send",
"eth"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/reentrancy/reentrancy.py#L71-L79 |
244,645 | crytic/slither | slither/core/cfg/node.py | Node.remove_father | def remove_father(self, father):
""" Remove the father node. Do nothing if the node is not a father
Args:
fathers: list of fathers to add
"""
self._fathers = [x for x in self._fathers if x.node_id != father.node_id] | python | def remove_father(self, father):
self._fathers = [x for x in self._fathers if x.node_id != father.node_id] | [
"def",
"remove_father",
"(",
"self",
",",
"father",
")",
":",
"self",
".",
"_fathers",
"=",
"[",
"x",
"for",
"x",
"in",
"self",
".",
"_fathers",
"if",
"x",
".",
"node_id",
"!=",
"father",
".",
"node_id",
"]"
] | Remove the father node. Do nothing if the node is not a father
Args:
fathers: list of fathers to add | [
"Remove",
"the",
"father",
"node",
".",
"Do",
"nothing",
"if",
"the",
"node",
"is",
"not",
"a",
"father"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/core/cfg/node.py#L485-L491 |
244,646 | crytic/slither | slither/core/cfg/node.py | Node.remove_son | def remove_son(self, son):
""" Remove the son node. Do nothing if the node is not a son
Args:
fathers: list of fathers to add
"""
self._sons = [x for x in self._sons if x.node_id != son.node_id] | python | def remove_son(self, son):
self._sons = [x for x in self._sons if x.node_id != son.node_id] | [
"def",
"remove_son",
"(",
"self",
",",
"son",
")",
":",
"self",
".",
"_sons",
"=",
"[",
"x",
"for",
"x",
"in",
"self",
".",
"_sons",
"if",
"x",
".",
"node_id",
"!=",
"son",
".",
"node_id",
"]"
] | Remove the son node. Do nothing if the node is not a son
Args:
fathers: list of fathers to add | [
"Remove",
"the",
"son",
"node",
".",
"Do",
"nothing",
"if",
"the",
"node",
"is",
"not",
"a",
"son"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/core/cfg/node.py#L493-L499 |
244,647 | crytic/slither | slither/detectors/statements/deprecated_calls.py | DeprecatedStandards.detect_deprecated_references_in_node | def detect_deprecated_references_in_node(self, node):
""" Detects if a node makes use of any deprecated standards.
Returns:
list of tuple: (detecting_signature, original_text, recommended_text)"""
# Define our results list
results = []
# If this node has an expressi... | python | def detect_deprecated_references_in_node(self, node):
# Define our results list
results = []
# If this node has an expression, we check the underlying expression.
if node.expression:
results += self.detect_deprecation_in_expression(node.expression)
# Check if there ... | [
"def",
"detect_deprecated_references_in_node",
"(",
"self",
",",
"node",
")",
":",
"# Define our results list",
"results",
"=",
"[",
"]",
"# If this node has an expression, we check the underlying expression.",
"if",
"node",
".",
"expression",
":",
"results",
"+=",
"self",
... | Detects if a node makes use of any deprecated standards.
Returns:
list of tuple: (detecting_signature, original_text, recommended_text) | [
"Detects",
"if",
"a",
"node",
"makes",
"use",
"of",
"any",
"deprecated",
"standards",
"."
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/statements/deprecated_calls.py#L88-L105 |
244,648 | crytic/slither | slither/detectors/statements/deprecated_calls.py | DeprecatedStandards.detect_deprecated_references_in_contract | def detect_deprecated_references_in_contract(self, contract):
""" Detects the usage of any deprecated built-in symbols.
Returns:
list of tuple: (state_variable | node, (detecting_signature, original_text, recommended_text))"""
results = []
for state_variable in contract.var... | python | def detect_deprecated_references_in_contract(self, contract):
results = []
for state_variable in contract.variables:
if state_variable.contract != contract:
continue
if state_variable.expression:
deprecated_results = self.detect_deprecation_in_exp... | [
"def",
"detect_deprecated_references_in_contract",
"(",
"self",
",",
"contract",
")",
":",
"results",
"=",
"[",
"]",
"for",
"state_variable",
"in",
"contract",
".",
"variables",
":",
"if",
"state_variable",
".",
"contract",
"!=",
"contract",
":",
"continue",
"if... | Detects the usage of any deprecated built-in symbols.
Returns:
list of tuple: (state_variable | node, (detecting_signature, original_text, recommended_text)) | [
"Detects",
"the",
"usage",
"of",
"any",
"deprecated",
"built",
"-",
"in",
"symbols",
"."
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/statements/deprecated_calls.py#L107-L144 |
244,649 | crytic/slither | slither/__main__.py | process | def process(filename, args, detector_classes, printer_classes):
"""
The core high-level code for running Slither static analysis.
Returns:
list(result), int: Result list and number of contracts analyzed
"""
ast = '--ast-compact-json'
if args.legacy_ast:
ast = '--ast-json'
ar... | python | def process(filename, args, detector_classes, printer_classes):
ast = '--ast-compact-json'
if args.legacy_ast:
ast = '--ast-json'
args.filter_paths = parse_filter_paths(args)
slither = Slither(filename,
ast_format=ast,
**vars(args))
return _proces... | [
"def",
"process",
"(",
"filename",
",",
"args",
",",
"detector_classes",
",",
"printer_classes",
")",
":",
"ast",
"=",
"'--ast-compact-json'",
"if",
"args",
".",
"legacy_ast",
":",
"ast",
"=",
"'--ast-json'",
"args",
".",
"filter_paths",
"=",
"parse_filter_paths... | The core high-level code for running Slither static analysis.
Returns:
list(result), int: Result list and number of contracts analyzed | [
"The",
"core",
"high",
"-",
"level",
"code",
"for",
"running",
"Slither",
"static",
"analysis",
"."
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/__main__.py#L38-L53 |
244,650 | crytic/slither | slither/detectors/attributes/const_functions.py | ConstantFunctions._detect | def _detect(self):
""" Detect the constant function changing the state
Recursively visit the calls
Returns:
list: {'vuln', 'filename,'contract','func','#varsWritten'}
"""
results = []
for c in self.contracts:
for f in c.functions:
... | python | def _detect(self):
results = []
for c in self.contracts:
for f in c.functions:
if f.contract != c:
continue
if f.view or f.pure:
if f.contains_assembly:
attr = 'view' if f.view else 'pure'
... | [
"def",
"_detect",
"(",
"self",
")",
":",
"results",
"=",
"[",
"]",
"for",
"c",
"in",
"self",
".",
"contracts",
":",
"for",
"f",
"in",
"c",
".",
"functions",
":",
"if",
"f",
".",
"contract",
"!=",
"c",
":",
"continue",
"if",
"f",
".",
"view",
"o... | Detect the constant function changing the state
Recursively visit the calls
Returns:
list: {'vuln', 'filename,'contract','func','#varsWritten'} | [
"Detect",
"the",
"constant",
"function",
"changing",
"the",
"state"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/detectors/attributes/const_functions.py#L44-L84 |
244,651 | crytic/slither | slither/core/declarations/contract.py | Contract.constructor | def constructor(self):
'''
Return the contract's immediate constructor.
If there is no immediate constructor, returns the first constructor
executed, following the c3 linearization
Return None if there is no constructor.
'''
cst = self.constructor_... | python | def constructor(self):
'''
Return the contract's immediate constructor.
If there is no immediate constructor, returns the first constructor
executed, following the c3 linearization
Return None if there is no constructor.
'''
cst = self.constructor_... | [
"def",
"constructor",
"(",
"self",
")",
":",
"cst",
"=",
"self",
".",
"constructor_not_inherited",
"if",
"cst",
":",
"return",
"cst",
"for",
"inherited_contract",
"in",
"self",
".",
"inheritance",
":",
"cst",
"=",
"inherited_contract",
".",
"constructor_not_inhe... | Return the contract's immediate constructor.
If there is no immediate constructor, returns the first constructor
executed, following the c3 linearization
Return None if there is no constructor. | [
"Return",
"the",
"contract",
"s",
"immediate",
"constructor",
".",
"If",
"there",
"is",
"no",
"immediate",
"constructor",
"returns",
"the",
"first",
"constructor",
"executed",
"following",
"the",
"c3",
"linearization",
"Return",
"None",
"if",
"there",
"is",
"no"... | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/core/declarations/contract.py#L168-L182 |
244,652 | crytic/slither | slither/core/declarations/contract.py | Contract.get_functions_reading_from_variable | def get_functions_reading_from_variable(self, variable):
'''
Return the functions reading the variable
'''
return [f for f in self.functions if f.is_reading(variable)] | python | def get_functions_reading_from_variable(self, variable):
'''
Return the functions reading the variable
'''
return [f for f in self.functions if f.is_reading(variable)] | [
"def",
"get_functions_reading_from_variable",
"(",
"self",
",",
"variable",
")",
":",
"return",
"[",
"f",
"for",
"f",
"in",
"self",
".",
"functions",
"if",
"f",
".",
"is_reading",
"(",
"variable",
")",
"]"
] | Return the functions reading the variable | [
"Return",
"the",
"functions",
"reading",
"the",
"variable"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/core/declarations/contract.py#L339-L343 |
244,653 | crytic/slither | slither/core/declarations/contract.py | Contract.get_functions_writing_to_variable | def get_functions_writing_to_variable(self, variable):
'''
Return the functions writting the variable
'''
return [f for f in self.functions if f.is_writing(variable)] | python | def get_functions_writing_to_variable(self, variable):
'''
Return the functions writting the variable
'''
return [f for f in self.functions if f.is_writing(variable)] | [
"def",
"get_functions_writing_to_variable",
"(",
"self",
",",
"variable",
")",
":",
"return",
"[",
"f",
"for",
"f",
"in",
"self",
".",
"functions",
"if",
"f",
".",
"is_writing",
"(",
"variable",
")",
"]"
] | Return the functions writting the variable | [
"Return",
"the",
"functions",
"writting",
"the",
"variable"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/core/declarations/contract.py#L345-L349 |
244,654 | crytic/slither | slither/core/declarations/contract.py | Contract.get_source_var_declaration | def get_source_var_declaration(self, var):
""" Return the source mapping where the variable is declared
Args:
var (str): variable name
Returns:
(dict): sourceMapping
"""
return next((x.source_mapping for x in self.variables if x.name == var)) | python | def get_source_var_declaration(self, var):
return next((x.source_mapping for x in self.variables if x.name == var)) | [
"def",
"get_source_var_declaration",
"(",
"self",
",",
"var",
")",
":",
"return",
"next",
"(",
"(",
"x",
".",
"source_mapping",
"for",
"x",
"in",
"self",
".",
"variables",
"if",
"x",
".",
"name",
"==",
"var",
")",
")"
] | Return the source mapping where the variable is declared
Args:
var (str): variable name
Returns:
(dict): sourceMapping | [
"Return",
"the",
"source",
"mapping",
"where",
"the",
"variable",
"is",
"declared"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/core/declarations/contract.py#L351-L359 |
244,655 | crytic/slither | slither/core/declarations/contract.py | Contract.get_source_event_declaration | def get_source_event_declaration(self, event):
""" Return the source mapping where the event is declared
Args:
event (str): event name
Returns:
(dict): sourceMapping
"""
return next((x.source_mapping for x in self.events if x.name == event)) | python | def get_source_event_declaration(self, event):
return next((x.source_mapping for x in self.events if x.name == event)) | [
"def",
"get_source_event_declaration",
"(",
"self",
",",
"event",
")",
":",
"return",
"next",
"(",
"(",
"x",
".",
"source_mapping",
"for",
"x",
"in",
"self",
".",
"events",
"if",
"x",
".",
"name",
"==",
"event",
")",
")"
] | Return the source mapping where the event is declared
Args:
event (str): event name
Returns:
(dict): sourceMapping | [
"Return",
"the",
"source",
"mapping",
"where",
"the",
"event",
"is",
"declared"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/core/declarations/contract.py#L361-L369 |
244,656 | crytic/slither | slither/core/declarations/contract.py | Contract.get_summary | def get_summary(self):
""" Return the function summary
Returns:
(str, list, list, list, list): (name, inheritance, variables, fuction summaries, modifier summaries)
"""
func_summaries = [f.get_summary() for f in self.functions]
modif_summaries = [f.get_summary() for ... | python | def get_summary(self):
func_summaries = [f.get_summary() for f in self.functions]
modif_summaries = [f.get_summary() for f in self.modifiers]
return (self.name, [str(x) for x in self.inheritance], [str(x) for x in self.variables], func_summaries, modif_summaries) | [
"def",
"get_summary",
"(",
"self",
")",
":",
"func_summaries",
"=",
"[",
"f",
".",
"get_summary",
"(",
")",
"for",
"f",
"in",
"self",
".",
"functions",
"]",
"modif_summaries",
"=",
"[",
"f",
".",
"get_summary",
"(",
")",
"for",
"f",
"in",
"self",
"."... | Return the function summary
Returns:
(str, list, list, list, list): (name, inheritance, variables, fuction summaries, modifier summaries) | [
"Return",
"the",
"function",
"summary"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/core/declarations/contract.py#L512-L520 |
244,657 | crytic/slither | slither/core/declarations/contract.py | Contract.is_erc20 | def is_erc20(self):
"""
Check if the contract is an erc20 token
Note: it does not check for correct return values
Returns:
bool
"""
full_names = [f.full_name for f in self.functions]
return 'transfer(address,uint256)' in full_names and\
... | python | def is_erc20(self):
full_names = [f.full_name for f in self.functions]
return 'transfer(address,uint256)' in full_names and\
'transferFrom(address,address,uint256)' in full_names and\
'approve(address,uint256)' in full_names | [
"def",
"is_erc20",
"(",
"self",
")",
":",
"full_names",
"=",
"[",
"f",
".",
"full_name",
"for",
"f",
"in",
"self",
".",
"functions",
"]",
"return",
"'transfer(address,uint256)'",
"in",
"full_names",
"and",
"'transferFrom(address,address,uint256)'",
"in",
"full_nam... | Check if the contract is an erc20 token
Note: it does not check for correct return values
Returns:
bool | [
"Check",
"if",
"the",
"contract",
"is",
"an",
"erc20",
"token"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/core/declarations/contract.py#L530-L541 |
244,658 | crytic/slither | slither/slithir/convert.py | integrate_value_gas | def integrate_value_gas(result):
'''
Integrate value and gas temporary arguments to call instruction
'''
was_changed = True
calls = []
while was_changed:
# We loop until we do not find any call to value or gas
was_changed = False
# Find all the assignments
... | python | def integrate_value_gas(result):
'''
Integrate value and gas temporary arguments to call instruction
'''
was_changed = True
calls = []
while was_changed:
# We loop until we do not find any call to value or gas
was_changed = False
# Find all the assignments
... | [
"def",
"integrate_value_gas",
"(",
"result",
")",
":",
"was_changed",
"=",
"True",
"calls",
"=",
"[",
"]",
"while",
"was_changed",
":",
"# We loop until we do not find any call to value or gas",
"was_changed",
"=",
"False",
"# Find all the assignments",
"assigments",
"=",... | Integrate value and gas temporary arguments to call instruction | [
"Integrate",
"value",
"and",
"gas",
"temporary",
"arguments",
"to",
"call",
"instruction"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/slithir/convert.py#L144-L213 |
244,659 | crytic/slither | slither/slithir/convert.py | propagate_type_and_convert_call | def propagate_type_and_convert_call(result, node):
'''
Propagate the types variables and convert tmp call to real call operation
'''
calls_value = {}
calls_gas = {}
call_data = []
idx = 0
# use of while len() as result can be modified during the iteration
while idx < len(result... | python | def propagate_type_and_convert_call(result, node):
'''
Propagate the types variables and convert tmp call to real call operation
'''
calls_value = {}
calls_gas = {}
call_data = []
idx = 0
# use of while len() as result can be modified during the iteration
while idx < len(result... | [
"def",
"propagate_type_and_convert_call",
"(",
"result",
",",
"node",
")",
":",
"calls_value",
"=",
"{",
"}",
"calls_gas",
"=",
"{",
"}",
"call_data",
"=",
"[",
"]",
"idx",
"=",
"0",
"# use of while len() as result can be modified during the iteration",
"while",
"id... | Propagate the types variables and convert tmp call to real call operation | [
"Propagate",
"the",
"types",
"variables",
"and",
"convert",
"tmp",
"call",
"to",
"real",
"call",
"operation"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/slithir/convert.py#L222-L292 |
244,660 | crytic/slither | slither/slithir/convert.py | convert_to_push | def convert_to_push(ir, node):
"""
Convert a call to a PUSH operaiton
The funciton assume to receive a correct IR
The checks must be done by the caller
May necessitate to create an intermediate operation (InitArray)
Necessitate to return the lenght (see push documentation)
As a result, the... | python | def convert_to_push(ir, node):
lvalue = ir.lvalue
if isinstance(ir.arguments[0], list):
ret = []
val = TemporaryVariable(node)
operation = InitArray(ir.arguments[0], val)
ret.append(operation)
ir = Push(ir.destination, val)
length = Literal(len(operation.init_v... | [
"def",
"convert_to_push",
"(",
"ir",
",",
"node",
")",
":",
"lvalue",
"=",
"ir",
".",
"lvalue",
"if",
"isinstance",
"(",
"ir",
".",
"arguments",
"[",
"0",
"]",
",",
"list",
")",
":",
"ret",
"=",
"[",
"]",
"val",
"=",
"TemporaryVariable",
"(",
"node... | Convert a call to a PUSH operaiton
The funciton assume to receive a correct IR
The checks must be done by the caller
May necessitate to create an intermediate operation (InitArray)
Necessitate to return the lenght (see push documentation)
As a result, the function return may return a list | [
"Convert",
"a",
"call",
"to",
"a",
"PUSH",
"operaiton"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/slithir/convert.py#L579-L626 |
244,661 | crytic/slither | slither/slithir/convert.py | get_type | def get_type(t):
"""
Convert a type to a str
If the instance is a Contract, return 'address' instead
"""
if isinstance(t, UserDefinedType):
if isinstance(t.type, Contract):
return 'address'
return str(t) | python | def get_type(t):
if isinstance(t, UserDefinedType):
if isinstance(t.type, Contract):
return 'address'
return str(t) | [
"def",
"get_type",
"(",
"t",
")",
":",
"if",
"isinstance",
"(",
"t",
",",
"UserDefinedType",
")",
":",
"if",
"isinstance",
"(",
"t",
".",
"type",
",",
"Contract",
")",
":",
"return",
"'address'",
"return",
"str",
"(",
"t",
")"
] | Convert a type to a str
If the instance is a Contract, return 'address' instead | [
"Convert",
"a",
"type",
"to",
"a",
"str",
"If",
"the",
"instance",
"is",
"a",
"Contract",
"return",
"address",
"instead"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/slithir/convert.py#L661-L669 |
244,662 | crytic/slither | slither/slithir/convert.py | find_references_origin | def find_references_origin(irs):
"""
Make lvalue of each Index, Member operation
points to the left variable
"""
for ir in irs:
if isinstance(ir, (Index, Member)):
ir.lvalue.points_to = ir.variable_left | python | def find_references_origin(irs):
for ir in irs:
if isinstance(ir, (Index, Member)):
ir.lvalue.points_to = ir.variable_left | [
"def",
"find_references_origin",
"(",
"irs",
")",
":",
"for",
"ir",
"in",
"irs",
":",
"if",
"isinstance",
"(",
"ir",
",",
"(",
"Index",
",",
"Member",
")",
")",
":",
"ir",
".",
"lvalue",
".",
"points_to",
"=",
"ir",
".",
"variable_left"
] | Make lvalue of each Index, Member operation
points to the left variable | [
"Make",
"lvalue",
"of",
"each",
"Index",
"Member",
"operation",
"points",
"to",
"the",
"left",
"variable"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/slithir/convert.py#L768-L775 |
244,663 | crytic/slither | slither/slithir/convert.py | apply_ir_heuristics | def apply_ir_heuristics(irs, node):
"""
Apply a set of heuristic to improve slithIR
"""
irs = integrate_value_gas(irs)
irs = propagate_type_and_convert_call(irs, node)
irs = remove_unused(irs)
find_references_origin(irs)
return irs | python | def apply_ir_heuristics(irs, node):
irs = integrate_value_gas(irs)
irs = propagate_type_and_convert_call(irs, node)
irs = remove_unused(irs)
find_references_origin(irs)
return irs | [
"def",
"apply_ir_heuristics",
"(",
"irs",
",",
"node",
")",
":",
"irs",
"=",
"integrate_value_gas",
"(",
"irs",
")",
"irs",
"=",
"propagate_type_and_convert_call",
"(",
"irs",
",",
"node",
")",
"irs",
"=",
"remove_unused",
"(",
"irs",
")",
"find_references_ori... | Apply a set of heuristic to improve slithIR | [
"Apply",
"a",
"set",
"of",
"heuristic",
"to",
"improve",
"slithIR"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/slithir/convert.py#L832-L844 |
244,664 | crytic/slither | slither/core/declarations/function.py | Function.return_type | def return_type(self):
"""
Return the list of return type
If no return, return None
"""
returns = self.returns
if returns:
return [r.type for r in returns]
return None | python | def return_type(self):
returns = self.returns
if returns:
return [r.type for r in returns]
return None | [
"def",
"return_type",
"(",
"self",
")",
":",
"returns",
"=",
"self",
".",
"returns",
"if",
"returns",
":",
"return",
"[",
"r",
".",
"type",
"for",
"r",
"in",
"returns",
"]",
"return",
"None"
] | Return the list of return type
If no return, return None | [
"Return",
"the",
"list",
"of",
"return",
"type",
"If",
"no",
"return",
"return",
"None"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/core/declarations/function.py#L249-L257 |
244,665 | crytic/slither | slither/core/declarations/function.py | Function.all_solidity_variables_read | def all_solidity_variables_read(self):
""" recursive version of solidity_read
"""
if self._all_solidity_variables_read is None:
self._all_solidity_variables_read = self._explore_functions(
lambda x: x.solidity_variables_read)
return self._all_solidity_variable... | python | def all_solidity_variables_read(self):
if self._all_solidity_variables_read is None:
self._all_solidity_variables_read = self._explore_functions(
lambda x: x.solidity_variables_read)
return self._all_solidity_variables_read | [
"def",
"all_solidity_variables_read",
"(",
"self",
")",
":",
"if",
"self",
".",
"_all_solidity_variables_read",
"is",
"None",
":",
"self",
".",
"_all_solidity_variables_read",
"=",
"self",
".",
"_explore_functions",
"(",
"lambda",
"x",
":",
"x",
".",
"solidity_var... | recursive version of solidity_read | [
"recursive",
"version",
"of",
"solidity_read"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/core/declarations/function.py#L629-L635 |
244,666 | crytic/slither | slither/core/declarations/function.py | Function.all_state_variables_written | def all_state_variables_written(self):
""" recursive version of variables_written
"""
if self._all_state_variables_written is None:
self._all_state_variables_written = self._explore_functions(
lambda x: x.state_variables_written)
return self._all_state_variabl... | python | def all_state_variables_written(self):
if self._all_state_variables_written is None:
self._all_state_variables_written = self._explore_functions(
lambda x: x.state_variables_written)
return self._all_state_variables_written | [
"def",
"all_state_variables_written",
"(",
"self",
")",
":",
"if",
"self",
".",
"_all_state_variables_written",
"is",
"None",
":",
"self",
".",
"_all_state_variables_written",
"=",
"self",
".",
"_explore_functions",
"(",
"lambda",
"x",
":",
"x",
".",
"state_variab... | recursive version of variables_written | [
"recursive",
"version",
"of",
"variables_written"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/core/declarations/function.py#L651-L657 |
244,667 | crytic/slither | slither/core/declarations/function.py | Function.all_internal_calls | def all_internal_calls(self):
""" recursive version of internal_calls
"""
if self._all_internals_calls is None:
self._all_internals_calls = self._explore_functions(lambda x: x.internal_calls)
return self._all_internals_calls | python | def all_internal_calls(self):
if self._all_internals_calls is None:
self._all_internals_calls = self._explore_functions(lambda x: x.internal_calls)
return self._all_internals_calls | [
"def",
"all_internal_calls",
"(",
"self",
")",
":",
"if",
"self",
".",
"_all_internals_calls",
"is",
"None",
":",
"self",
".",
"_all_internals_calls",
"=",
"self",
".",
"_explore_functions",
"(",
"lambda",
"x",
":",
"x",
".",
"internal_calls",
")",
"return",
... | recursive version of internal_calls | [
"recursive",
"version",
"of",
"internal_calls"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/core/declarations/function.py#L659-L664 |
244,668 | crytic/slither | slither/core/declarations/function.py | Function.all_low_level_calls | def all_low_level_calls(self):
""" recursive version of low_level calls
"""
if self._all_low_level_calls is None:
self._all_low_level_calls = self._explore_functions(lambda x: x.low_level_calls)
return self._all_low_level_calls | python | def all_low_level_calls(self):
if self._all_low_level_calls is None:
self._all_low_level_calls = self._explore_functions(lambda x: x.low_level_calls)
return self._all_low_level_calls | [
"def",
"all_low_level_calls",
"(",
"self",
")",
":",
"if",
"self",
".",
"_all_low_level_calls",
"is",
"None",
":",
"self",
".",
"_all_low_level_calls",
"=",
"self",
".",
"_explore_functions",
"(",
"lambda",
"x",
":",
"x",
".",
"low_level_calls",
")",
"return",... | recursive version of low_level calls | [
"recursive",
"version",
"of",
"low_level",
"calls"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/core/declarations/function.py#L666-L671 |
244,669 | crytic/slither | slither/core/declarations/function.py | Function.all_high_level_calls | def all_high_level_calls(self):
""" recursive version of high_level calls
"""
if self._all_high_level_calls is None:
self._all_high_level_calls = self._explore_functions(lambda x: x.high_level_calls)
return self._all_high_level_calls | python | def all_high_level_calls(self):
if self._all_high_level_calls is None:
self._all_high_level_calls = self._explore_functions(lambda x: x.high_level_calls)
return self._all_high_level_calls | [
"def",
"all_high_level_calls",
"(",
"self",
")",
":",
"if",
"self",
".",
"_all_high_level_calls",
"is",
"None",
":",
"self",
".",
"_all_high_level_calls",
"=",
"self",
".",
"_explore_functions",
"(",
"lambda",
"x",
":",
"x",
".",
"high_level_calls",
")",
"retu... | recursive version of high_level calls | [
"recursive",
"version",
"of",
"high_level",
"calls"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/core/declarations/function.py#L673-L678 |
244,670 | crytic/slither | slither/core/declarations/function.py | Function.all_library_calls | def all_library_calls(self):
""" recursive version of library calls
"""
if self._all_library_calls is None:
self._all_library_calls = self._explore_functions(lambda x: x.library_calls)
return self._all_library_calls | python | def all_library_calls(self):
if self._all_library_calls is None:
self._all_library_calls = self._explore_functions(lambda x: x.library_calls)
return self._all_library_calls | [
"def",
"all_library_calls",
"(",
"self",
")",
":",
"if",
"self",
".",
"_all_library_calls",
"is",
"None",
":",
"self",
".",
"_all_library_calls",
"=",
"self",
".",
"_explore_functions",
"(",
"lambda",
"x",
":",
"x",
".",
"library_calls",
")",
"return",
"self... | recursive version of library calls | [
"recursive",
"version",
"of",
"library",
"calls"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/core/declarations/function.py#L680-L685 |
244,671 | crytic/slither | slither/core/declarations/function.py | Function.all_conditional_state_variables_read | def all_conditional_state_variables_read(self, include_loop=True):
"""
Return the state variable used in a condition
Over approximate and also return index access
It won't work if the variable is assigned to a temp variable
"""
if include_loop:
if... | python | def all_conditional_state_variables_read(self, include_loop=True):
if include_loop:
if self._all_conditional_state_variables_read_with_loop is None:
self._all_conditional_state_variables_read_with_loop = self._explore_functions(
lambda x: self._explore_func_cond_r... | [
"def",
"all_conditional_state_variables_read",
"(",
"self",
",",
"include_loop",
"=",
"True",
")",
":",
"if",
"include_loop",
":",
"if",
"self",
".",
"_all_conditional_state_variables_read_with_loop",
"is",
"None",
":",
"self",
".",
"_all_conditional_state_variables_read_... | Return the state variable used in a condition
Over approximate and also return index access
It won't work if the variable is assigned to a temp variable | [
"Return",
"the",
"state",
"variable",
"used",
"in",
"a",
"condition"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/core/declarations/function.py#L692-L710 |
244,672 | crytic/slither | slither/core/declarations/function.py | Function.all_conditional_solidity_variables_read | def all_conditional_solidity_variables_read(self, include_loop=True):
"""
Return the Soldiity variables directly used in a condtion
Use of the IR to filter index access
Assumption: the solidity vars are used directly in the conditional node
It won't work if the v... | python | def all_conditional_solidity_variables_read(self, include_loop=True):
if include_loop:
if self._all_conditional_solidity_variables_read_with_loop is None:
self._all_conditional_solidity_variables_read_with_loop = self._explore_functions(
lambda x: self._explore_fu... | [
"def",
"all_conditional_solidity_variables_read",
"(",
"self",
",",
"include_loop",
"=",
"True",
")",
":",
"if",
"include_loop",
":",
"if",
"self",
".",
"_all_conditional_solidity_variables_read_with_loop",
"is",
"None",
":",
"self",
".",
"_all_conditional_solidity_variab... | Return the Soldiity variables directly used in a condtion
Use of the IR to filter index access
Assumption: the solidity vars are used directly in the conditional node
It won't work if the variable is assigned to a temp variable | [
"Return",
"the",
"Soldiity",
"variables",
"directly",
"used",
"in",
"a",
"condtion"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/core/declarations/function.py#L726-L747 |
244,673 | crytic/slither | slither/core/declarations/function.py | Function.all_solidity_variables_used_as_args | def all_solidity_variables_used_as_args(self):
"""
Return the Soldiity variables directly used in a call
Use of the IR to filter index access
Used to catch check(msg.sender)
"""
if self._all_solidity_variables_used_as_args is None:
self._all_solid... | python | def all_solidity_variables_used_as_args(self):
if self._all_solidity_variables_used_as_args is None:
self._all_solidity_variables_used_as_args = self._explore_functions(
lambda x: self._explore_func_nodes(x, self._solidity_variable_in_internal_calls))
return self._all_solidit... | [
"def",
"all_solidity_variables_used_as_args",
"(",
"self",
")",
":",
"if",
"self",
".",
"_all_solidity_variables_used_as_args",
"is",
"None",
":",
"self",
".",
"_all_solidity_variables_used_as_args",
"=",
"self",
".",
"_explore_functions",
"(",
"lambda",
"x",
":",
"se... | Return the Soldiity variables directly used in a call
Use of the IR to filter index access
Used to catch check(msg.sender) | [
"Return",
"the",
"Soldiity",
"variables",
"directly",
"used",
"in",
"a",
"call"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/core/declarations/function.py#L763-L773 |
244,674 | crytic/slither | slither/core/declarations/function.py | Function.is_protected | def is_protected(self):
"""
Determine if the function is protected using a check on msg.sender
Only detects if msg.sender is directly used in a condition
For example, it wont work for:
address a = msg.sender
require(a == owner)
Returns... | python | def is_protected(self):
if self.is_constructor:
return True
conditional_vars = self.all_conditional_solidity_variables_read(include_loop=False)
args_vars = self.all_solidity_variables_used_as_args()
return SolidityVariableComposed('msg.sender') in conditional_vars + args_vars | [
"def",
"is_protected",
"(",
"self",
")",
":",
"if",
"self",
".",
"is_constructor",
":",
"return",
"True",
"conditional_vars",
"=",
"self",
".",
"all_conditional_solidity_variables_read",
"(",
"include_loop",
"=",
"False",
")",
"args_vars",
"=",
"self",
".",
"all... | Determine if the function is protected using a check on msg.sender
Only detects if msg.sender is directly used in a condition
For example, it wont work for:
address a = msg.sender
require(a == owner)
Returns
(bool) | [
"Determine",
"if",
"the",
"function",
"is",
"protected",
"using",
"a",
"check",
"on",
"msg",
".",
"sender"
] | 04c147f7e50223c6af458ca430befae747ccd259 | https://github.com/crytic/slither/blob/04c147f7e50223c6af458ca430befae747ccd259/slither/core/declarations/function.py#L940-L956 |
244,675 | TheHive-Project/Cortex-Analyzers | analyzers/SoltraEdge/soltra.py | SoltraEdge.auth_string | def auth_string(self):
'''
Authenticate based on username and token which is base64-encoded
'''
username_token = '{username}:{token}'.format(username=self.username, token=self.token)
b64encoded_string = b64encode(username_token)
auth_string = 'Token {b64}'.format(b64=b64... | python | def auth_string(self):
'''
Authenticate based on username and token which is base64-encoded
'''
username_token = '{username}:{token}'.format(username=self.username, token=self.token)
b64encoded_string = b64encode(username_token)
auth_string = 'Token {b64}'.format(b64=b64... | [
"def",
"auth_string",
"(",
"self",
")",
":",
"username_token",
"=",
"'{username}:{token}'",
".",
"format",
"(",
"username",
"=",
"self",
".",
"username",
",",
"token",
"=",
"self",
".",
"token",
")",
"b64encoded_string",
"=",
"b64encode",
"(",
"username_token"... | Authenticate based on username and token which is base64-encoded | [
"Authenticate",
"based",
"on",
"username",
"and",
"token",
"which",
"is",
"base64",
"-",
"encoded"
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/SoltraEdge/soltra.py#L27-L36 |
244,676 | TheHive-Project/Cortex-Analyzers | analyzers/SoltraEdge/soltra.py | SoltraEdge.api_related | def api_related(self, query):
'''
Find related objects through SoltraEdge API
'''
url = "{0}/{1}/related/?format=json".format(self.base_url, query)
response = requests.get(url, headers=self.headers, verify=self.verify_ssl)
if response.status_code == 200:
ret... | python | def api_related(self, query):
'''
Find related objects through SoltraEdge API
'''
url = "{0}/{1}/related/?format=json".format(self.base_url, query)
response = requests.get(url, headers=self.headers, verify=self.verify_ssl)
if response.status_code == 200:
ret... | [
"def",
"api_related",
"(",
"self",
",",
"query",
")",
":",
"url",
"=",
"\"{0}/{1}/related/?format=json\"",
".",
"format",
"(",
"self",
".",
"base_url",
",",
"query",
")",
"response",
"=",
"requests",
".",
"get",
"(",
"url",
",",
"headers",
"=",
"self",
"... | Find related objects through SoltraEdge API | [
"Find",
"related",
"objects",
"through",
"SoltraEdge",
"API"
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/SoltraEdge/soltra.py#L55-L68 |
244,677 | TheHive-Project/Cortex-Analyzers | analyzers/SoltraEdge/soltra.py | SoltraEdge.tlp_classifiers | def tlp_classifiers(self, name_tlp, val_tlp):
'''
Classifier between Cortex and Soltra.
Soltra uses name-TLP, and Cortex "value-TLP"
'''
classifier = {
"WHITE": 0,
"GREEN": 1,
"AMBER": 2,
"RED": 3
}
valid = True
... | python | def tlp_classifiers(self, name_tlp, val_tlp):
'''
Classifier between Cortex and Soltra.
Soltra uses name-TLP, and Cortex "value-TLP"
'''
classifier = {
"WHITE": 0,
"GREEN": 1,
"AMBER": 2,
"RED": 3
}
valid = True
... | [
"def",
"tlp_classifiers",
"(",
"self",
",",
"name_tlp",
",",
"val_tlp",
")",
":",
"classifier",
"=",
"{",
"\"WHITE\"",
":",
"0",
",",
"\"GREEN\"",
":",
"1",
",",
"\"AMBER\"",
":",
"2",
",",
"\"RED\"",
":",
"3",
"}",
"valid",
"=",
"True",
"if",
"class... | Classifier between Cortex and Soltra.
Soltra uses name-TLP, and Cortex "value-TLP" | [
"Classifier",
"between",
"Cortex",
"and",
"Soltra",
".",
"Soltra",
"uses",
"name",
"-",
"TLP",
"and",
"Cortex",
"value",
"-",
"TLP"
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/SoltraEdge/soltra.py#L71-L89 |
244,678 | TheHive-Project/Cortex-Analyzers | analyzers/SoltraEdge/soltra.py | SoltraEdge.pop_object | def pop_object(self, element):
'''
Pop the object element if the object contains an higher TLP then allowed.
'''
redacted_text = "Redacted. Object contained TLP value higher than allowed."
element['id'] = ''
element['url'] = ''
element['type'] = ''
eleme... | python | def pop_object(self, element):
'''
Pop the object element if the object contains an higher TLP then allowed.
'''
redacted_text = "Redacted. Object contained TLP value higher than allowed."
element['id'] = ''
element['url'] = ''
element['type'] = ''
eleme... | [
"def",
"pop_object",
"(",
"self",
",",
"element",
")",
":",
"redacted_text",
"=",
"\"Redacted. Object contained TLP value higher than allowed.\"",
"element",
"[",
"'id'",
"]",
"=",
"''",
"element",
"[",
"'url'",
"]",
"=",
"''",
"element",
"[",
"'type'",
"]",
"="... | Pop the object element if the object contains an higher TLP then allowed. | [
"Pop",
"the",
"object",
"element",
"if",
"the",
"object",
"contains",
"an",
"higher",
"TLP",
"then",
"allowed",
"."
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/SoltraEdge/soltra.py#L92-L116 |
244,679 | TheHive-Project/Cortex-Analyzers | analyzers/CERTatPassiveDNS/whois_wrapper.py | __query | def __query(domain, limit=100):
"""Using the shell script to query pdns.cert.at is a hack, but python raises an error every time using subprocess
functions to call whois. So this hack is avoiding calling whois directly. Ugly, but works.
:param domain: The domain pdns is queried with.
:type domain: str
... | python | def __query(domain, limit=100):
s = check_output(['{}'.format(os.path.join(os.path.dirname(__file__), 'whois.sh')), '--limit {} {}'.format(limit, domain)], universal_newlines=True)
return s | [
"def",
"__query",
"(",
"domain",
",",
"limit",
"=",
"100",
")",
":",
"s",
"=",
"check_output",
"(",
"[",
"'{}'",
".",
"format",
"(",
"os",
".",
"path",
".",
"join",
"(",
"os",
".",
"path",
".",
"dirname",
"(",
"__file__",
")",
",",
"'whois.sh'",
... | Using the shell script to query pdns.cert.at is a hack, but python raises an error every time using subprocess
functions to call whois. So this hack is avoiding calling whois directly. Ugly, but works.
:param domain: The domain pdns is queried with.
:type domain: str
:param limit: Maximum number of res... | [
"Using",
"the",
"shell",
"script",
"to",
"query",
"pdns",
".",
"cert",
".",
"at",
"is",
"a",
"hack",
"but",
"python",
"raises",
"an",
"error",
"every",
"time",
"using",
"subprocess",
"functions",
"to",
"call",
"whois",
".",
"So",
"this",
"hack",
"is",
... | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/CERTatPassiveDNS/whois_wrapper.py#L6-L18 |
244,680 | TheHive-Project/Cortex-Analyzers | analyzers/FileInfo/submodules/submodule_oletools.py | OLEToolsSubmodule.analyze_vba | def analyze_vba(self, path):
"""Analyze a given sample for malicious vba."""
try:
vba_parser = VBA_Parser_CLI(path, relaxed=True)
vbaparser_result = vba_parser.process_file_json(show_decoded_strings=True,
display_code=... | python | def analyze_vba(self, path):
try:
vba_parser = VBA_Parser_CLI(path, relaxed=True)
vbaparser_result = vba_parser.process_file_json(show_decoded_strings=True,
display_code=True,
... | [
"def",
"analyze_vba",
"(",
"self",
",",
"path",
")",
":",
"try",
":",
"vba_parser",
"=",
"VBA_Parser_CLI",
"(",
"path",
",",
"relaxed",
"=",
"True",
")",
"vbaparser_result",
"=",
"vba_parser",
".",
"process_file_json",
"(",
"show_decoded_strings",
"=",
"True",... | Analyze a given sample for malicious vba. | [
"Analyze",
"a",
"given",
"sample",
"for",
"malicious",
"vba",
"."
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/FileInfo/submodules/submodule_oletools.py#L98-L115 |
244,681 | TheHive-Project/Cortex-Analyzers | analyzers/MaxMind/maxminddb/reader.py | Reader.get | def get(self, ip_address):
"""Return the record for the ip_address in the MaxMind DB
Arguments:
ip_address -- an IP address in the standard string notation
"""
address = ipaddress.ip_address(ip_address)
if address.version == 6 and self._metadata.ip_version == 4:
... | python | def get(self, ip_address):
address = ipaddress.ip_address(ip_address)
if address.version == 6 and self._metadata.ip_version == 4:
raise ValueError('Error looking up {0}. You attempted to look up '
'an IPv6 address in an IPv4-only database.'.format(
... | [
"def",
"get",
"(",
"self",
",",
"ip_address",
")",
":",
"address",
"=",
"ipaddress",
".",
"ip_address",
"(",
"ip_address",
")",
"if",
"address",
".",
"version",
"==",
"6",
"and",
"self",
".",
"_metadata",
".",
"ip_version",
"==",
"4",
":",
"raise",
"Va... | Return the record for the ip_address in the MaxMind DB
Arguments:
ip_address -- an IP address in the standard string notation | [
"Return",
"the",
"record",
"for",
"the",
"ip_address",
"in",
"the",
"MaxMind",
"DB"
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/MaxMind/maxminddb/reader.py#L61-L76 |
244,682 | TheHive-Project/Cortex-Analyzers | analyzers/Crtsh/crtshquery.py | CrtshAnalyzer.search | def search(self, domain, wildcard=True):
"""
Search crt.sh for the given domain.
domain -- Domain to search for
wildcard -- Whether or not to prepend a wildcard to the domain
(default: True)
Return a list of a certificate dict:
{
"issuer... | python | def search(self, domain, wildcard=True):
base_url = "https://crt.sh/?q={}&output=json"
if wildcard:
domain = "%25.{}".format(domain)
url = base_url.format(domain)
ua = 'Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1'
req = requests.get(url, ... | [
"def",
"search",
"(",
"self",
",",
"domain",
",",
"wildcard",
"=",
"True",
")",
":",
"base_url",
"=",
"\"https://crt.sh/?q={}&output=json\"",
"if",
"wildcard",
":",
"domain",
"=",
"\"%25.{}\"",
".",
"format",
"(",
"domain",
")",
"url",
"=",
"base_url",
".",
... | Search crt.sh for the given domain.
domain -- Domain to search for
wildcard -- Whether or not to prepend a wildcard to the domain
(default: True)
Return a list of a certificate dict:
{
"issuer_ca_id": 16418,
"issuer_name": "C=US, O=Let's Enc... | [
"Search",
"crt",
".",
"sh",
"for",
"the",
"given",
"domain",
"."
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/Crtsh/crtshquery.py#L10-L47 |
244,683 | TheHive-Project/Cortex-Analyzers | analyzers/MISP/mispclient.py | MISPClient.__search | def __search(self, value, type_attribute):
"""Search method call wrapper.
:param value: value to search for.
:type value: str
:param type_attribute: attribute types to search for.
:type type_attribute: [list, none]
"""
results = []
if not value:
... | python | def __search(self, value, type_attribute):
results = []
if not value:
raise EmptySearchtermError
for idx, connection in enumerate(self.misp_connections):
misp_response = connection.search(type_attribute=type_attribute, values=value)
# Fixes #94
if... | [
"def",
"__search",
"(",
"self",
",",
"value",
",",
"type_attribute",
")",
":",
"results",
"=",
"[",
"]",
"if",
"not",
"value",
":",
"raise",
"EmptySearchtermError",
"for",
"idx",
",",
"connection",
"in",
"enumerate",
"(",
"self",
".",
"misp_connections",
"... | Search method call wrapper.
:param value: value to search for.
:type value: str
:param type_attribute: attribute types to search for.
:type type_attribute: [list, none] | [
"Search",
"method",
"call",
"wrapper",
"."
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/MISP/mispclient.py#L213-L236 |
244,684 | TheHive-Project/Cortex-Analyzers | analyzers/TorBlutmagie/tor_blutmagie.py | TorBlutmagieClient.search_tor_node | def search_tor_node(self, data_type, data):
"""Lookup an artifact to check if it is a known tor exit node.
:param data_type: The artifact type. Must be one of 'ip', 'fqdn'
or 'domain'
:param data: The artifact to lookup
:type data_type: str
:type data: ... | python | def search_tor_node(self, data_type, data):
results = []
if data_type == 'ip':
results = self._get_node_from_ip(data)
elif data_type == 'fqdn':
results = self._get_node_from_fqdn(data)
elif data_type == 'domain':
results = self._get_node_from_domain(da... | [
"def",
"search_tor_node",
"(",
"self",
",",
"data_type",
",",
"data",
")",
":",
"results",
"=",
"[",
"]",
"if",
"data_type",
"==",
"'ip'",
":",
"results",
"=",
"self",
".",
"_get_node_from_ip",
"(",
"data",
")",
"elif",
"data_type",
"==",
"'fqdn'",
":",
... | Lookup an artifact to check if it is a known tor exit node.
:param data_type: The artifact type. Must be one of 'ip', 'fqdn'
or 'domain'
:param data: The artifact to lookup
:type data_type: str
:type data: str
:return: Data relative to the tor node. If ... | [
"Lookup",
"an",
"artifact",
"to",
"check",
"if",
"it",
"is",
"a",
"known",
"tor",
"exit",
"node",
"."
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/TorBlutmagie/tor_blutmagie.py#L80-L110 |
244,685 | TheHive-Project/Cortex-Analyzers | analyzers/Yara/yara_analyzer.py | YaraAnalyzer.check | def check(self, file):
"""
Checks a given file against all available yara rules
:param file: Path to file
:type file:str
:returns: Python dictionary containing the results
:rtype: list
"""
result = []
for rule in self.ruleset:
matches ... | python | def check(self, file):
result = []
for rule in self.ruleset:
matches = rule.match(file)
for match in matches:
result.append(str(match))
return result | [
"def",
"check",
"(",
"self",
",",
"file",
")",
":",
"result",
"=",
"[",
"]",
"for",
"rule",
"in",
"self",
".",
"ruleset",
":",
"matches",
"=",
"rule",
".",
"match",
"(",
"file",
")",
"for",
"match",
"in",
"matches",
":",
"result",
".",
"append",
... | Checks a given file against all available yara rules
:param file: Path to file
:type file:str
:returns: Python dictionary containing the results
:rtype: list | [
"Checks",
"a",
"given",
"file",
"against",
"all",
"available",
"yara",
"rules"
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/Yara/yara_analyzer.py#L32-L47 |
244,686 | TheHive-Project/Cortex-Analyzers | analyzers/CIRCLPassiveDNS/circl_passivedns.py | CIRCLPassiveDNSAnalyzer.query | def query(self, domain):
"""The actual query happens here. Time from queries is replaced with isoformat.
:param domain: The domain which should gets queried.
:type domain: str
:returns: List of dicts containing the search results.
:rtype: [list, dict]
"""
result ... | python | def query(self, domain):
result = {}
try:
result = self.pdns.query(domain)
except:
self.error('Exception while querying passiveDNS. Check the domain format.')
# Clean the datetime problems in order to correct the json serializability
clean_result = []
... | [
"def",
"query",
"(",
"self",
",",
"domain",
")",
":",
"result",
"=",
"{",
"}",
"try",
":",
"result",
"=",
"self",
".",
"pdns",
".",
"query",
"(",
"domain",
")",
"except",
":",
"self",
".",
"error",
"(",
"'Exception while querying passiveDNS. Check the doma... | The actual query happens here. Time from queries is replaced with isoformat.
:param domain: The domain which should gets queried.
:type domain: str
:returns: List of dicts containing the search results.
:rtype: [list, dict] | [
"The",
"actual",
"query",
"happens",
"here",
".",
"Time",
"from",
"queries",
"is",
"replaced",
"with",
"isoformat",
"."
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/CIRCLPassiveDNS/circl_passivedns.py#L13-L37 |
244,687 | TheHive-Project/Cortex-Analyzers | analyzers/CIRCLPassiveSSL/circl_passivessl.py | CIRCLPassiveSSLAnalyzer.query_ip | def query_ip(self, ip):
"""
Queries Circl.lu Passive SSL for an ip using PyPSSL class. Returns error if nothing is found.
:param ip: IP to query for
:type ip: str
:returns: python dict of results
:rtype: dict
"""
try:
result = self.pssl.query(... | python | def query_ip(self, ip):
try:
result = self.pssl.query(ip)
except:
self.error('Exception during processing with passiveSSL. '
'Please check the format of ip.')
# Check for empty result
# result is always assigned, self.error exits the functi... | [
"def",
"query_ip",
"(",
"self",
",",
"ip",
")",
":",
"try",
":",
"result",
"=",
"self",
".",
"pssl",
".",
"query",
"(",
"ip",
")",
"except",
":",
"self",
".",
"error",
"(",
"'Exception during processing with passiveSSL. '",
"'Please check the format of ip.'",
... | Queries Circl.lu Passive SSL for an ip using PyPSSL class. Returns error if nothing is found.
:param ip: IP to query for
:type ip: str
:returns: python dict of results
:rtype: dict | [
"Queries",
"Circl",
".",
"lu",
"Passive",
"SSL",
"for",
"an",
"ip",
"using",
"PyPSSL",
"class",
".",
"Returns",
"error",
"if",
"nothing",
"is",
"found",
"."
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/CIRCLPassiveSSL/circl_passivessl.py#L16-L43 |
244,688 | TheHive-Project/Cortex-Analyzers | analyzers/CIRCLPassiveSSL/circl_passivessl.py | CIRCLPassiveSSLAnalyzer.query_certificate | def query_certificate(self, cert_hash):
"""
Queries Circl.lu Passive SSL for a certificate hash using PyPSSL class. Returns error if nothing is found.
:param cert_hash: hash to query for
:type cert_hash: str
:return: python dict of results
:rtype: dict
"""
... | python | def query_certificate(self, cert_hash):
try:
cquery = self.pssl.query_cert(cert_hash)
except Exception:
self.error('Exception during processing with passiveSSL. '
'This happens if the given hash is not sha1 or contains dashes/colons etc. '
... | [
"def",
"query_certificate",
"(",
"self",
",",
"cert_hash",
")",
":",
"try",
":",
"cquery",
"=",
"self",
".",
"pssl",
".",
"query_cert",
"(",
"cert_hash",
")",
"except",
"Exception",
":",
"self",
".",
"error",
"(",
"'Exception during processing with passiveSSL. '... | Queries Circl.lu Passive SSL for a certificate hash using PyPSSL class. Returns error if nothing is found.
:param cert_hash: hash to query for
:type cert_hash: str
:return: python dict of results
:rtype: dict | [
"Queries",
"Circl",
".",
"lu",
"Passive",
"SSL",
"for",
"a",
"certificate",
"hash",
"using",
"PyPSSL",
"class",
".",
"Returns",
"error",
"if",
"nothing",
"is",
"found",
"."
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/CIRCLPassiveSSL/circl_passivessl.py#L45-L68 |
244,689 | TheHive-Project/Cortex-Analyzers | analyzers/GreyNoise/greynoise.py | GreyNoiseAnalyzer._get_level | def _get_level(current_level, new_intention):
"""
Map GreyNoise intentions to Cortex maliciousness levels.
Accept a Cortex level and a GreyNoise intention, the return the more malicious of the two.
:param current_level: A Cortex maliciousness level
https://github.com/TheHive... | python | def _get_level(current_level, new_intention):
intention_level_map = OrderedDict([
('info', 'info'),
('benign', 'safe'),
('suspicious', 'suspicious'),
('malicious', 'malicious')
])
levels = intention_level_map.values()
new_level = intention... | [
"def",
"_get_level",
"(",
"current_level",
",",
"new_intention",
")",
":",
"intention_level_map",
"=",
"OrderedDict",
"(",
"[",
"(",
"'info'",
",",
"'info'",
")",
",",
"(",
"'benign'",
",",
"'safe'",
")",
",",
"(",
"'suspicious'",
",",
"'suspicious'",
")",
... | Map GreyNoise intentions to Cortex maliciousness levels.
Accept a Cortex level and a GreyNoise intention, the return the more malicious of the two.
:param current_level: A Cortex maliciousness level
https://github.com/TheHive-Project/CortexDocs/blob/master/api/how-to-create-an-analyzer.md#o... | [
"Map",
"GreyNoise",
"intentions",
"to",
"Cortex",
"maliciousness",
"levels",
".",
"Accept",
"a",
"Cortex",
"level",
"and",
"a",
"GreyNoise",
"intention",
"the",
"return",
"the",
"more",
"malicious",
"of",
"the",
"two",
"."
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/GreyNoise/greynoise.py#L16-L44 |
244,690 | TheHive-Project/Cortex-Analyzers | analyzers/GreyNoise/greynoise.py | GreyNoiseAnalyzer.summary | def summary(self, raw):
"""
Return one taxonomy summarizing the reported tags
If there is only one tag, use it as the predicate
If there are multiple tags, use "entries" as the predicate
Use the total count as the value
Use the most malicious level found
... | python | def summary(self, raw):
try:
taxonomies = []
if raw.get('records'):
final_level = None
taxonomy_data = defaultdict(int)
for record in raw.get('records', []):
name = record.get('name', 'unknown')
inten... | [
"def",
"summary",
"(",
"self",
",",
"raw",
")",
":",
"try",
":",
"taxonomies",
"=",
"[",
"]",
"if",
"raw",
".",
"get",
"(",
"'records'",
")",
":",
"final_level",
"=",
"None",
"taxonomy_data",
"=",
"defaultdict",
"(",
"int",
")",
"for",
"record",
"in"... | Return one taxonomy summarizing the reported tags
If there is only one tag, use it as the predicate
If there are multiple tags, use "entries" as the predicate
Use the total count as the value
Use the most malicious level found
Examples:
Input
{... | [
"Return",
"one",
"taxonomy",
"summarizing",
"the",
"reported",
"tags",
"If",
"there",
"is",
"only",
"one",
"tag",
"use",
"it",
"as",
"the",
"predicate",
"If",
"there",
"are",
"multiple",
"tags",
"use",
"entries",
"as",
"the",
"predicate",
"Use",
"the",
"to... | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/GreyNoise/greynoise.py#L62-L136 |
244,691 | TheHive-Project/Cortex-Analyzers | analyzers/VirusTotal/virustotal_api.py | PublicApi.scan_file | def scan_file(self, this_file):
""" Submit a file to be scanned by VirusTotal
:param this_file: File to be scanned (32MB file size limit)
:return: JSON response that contains scan_id and permalink.
"""
params = {'apikey': self.api_key}
try:
if type(this_file)... | python | def scan_file(self, this_file):
params = {'apikey': self.api_key}
try:
if type(this_file) == str and os.path.isfile(this_file):
files = {'file': (this_file, open(this_file, 'rb'))}
elif isinstance(this_file, StringIO.StringIO):
files = {'file': thi... | [
"def",
"scan_file",
"(",
"self",
",",
"this_file",
")",
":",
"params",
"=",
"{",
"'apikey'",
":",
"self",
".",
"api_key",
"}",
"try",
":",
"if",
"type",
"(",
"this_file",
")",
"==",
"str",
"and",
"os",
".",
"path",
".",
"isfile",
"(",
"this_file",
... | Submit a file to be scanned by VirusTotal
:param this_file: File to be scanned (32MB file size limit)
:return: JSON response that contains scan_id and permalink. | [
"Submit",
"a",
"file",
"to",
"be",
"scanned",
"by",
"VirusTotal"
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/VirusTotal/virustotal_api.py#L62-L84 |
244,692 | TheHive-Project/Cortex-Analyzers | analyzers/VirusTotal/virustotal_api.py | PublicApi.scan_url | def scan_url(self, this_url):
""" Submit a URL to be scanned by VirusTotal.
:param this_url: The URL that should be scanned. This parameter accepts a list of URLs (up to 4 with the
standard request rate) so as to perform a batch scanning request with one single call. The
... | python | def scan_url(self, this_url):
params = {'apikey': self.api_key, 'url': this_url}
try:
response = requests.post(self.base + 'url/scan', params=params, proxies=self.proxies)
except requests.RequestException as e:
return dict(error=e.message)
return _return_respons... | [
"def",
"scan_url",
"(",
"self",
",",
"this_url",
")",
":",
"params",
"=",
"{",
"'apikey'",
":",
"self",
".",
"api_key",
",",
"'url'",
":",
"this_url",
"}",
"try",
":",
"response",
"=",
"requests",
".",
"post",
"(",
"self",
".",
"base",
"+",
"'url/sca... | Submit a URL to be scanned by VirusTotal.
:param this_url: The URL that should be scanned. This parameter accepts a list of URLs (up to 4 with the
standard request rate) so as to perform a batch scanning request with one single call. The
URLs must be separated ... | [
"Submit",
"a",
"URL",
"to",
"be",
"scanned",
"by",
"VirusTotal",
"."
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/VirusTotal/virustotal_api.py#L124-L139 |
244,693 | TheHive-Project/Cortex-Analyzers | analyzers/VirusTotal/virustotal_api.py | PrivateApi.get_file | def get_file(self, this_hash):
""" Download a file by its hash.
Downloads a file from VirusTotal's store given one of its hashes. This call can be used in conjuction with
the file searching call in order to download samples that match a given set of criteria.
:param this_hash: The md5/... | python | def get_file(self, this_hash):
params = {'apikey': self.api_key, 'hash': this_hash}
try:
response = requests.get(self.base + 'file/download', params=params, proxies=self.proxies)
except requests.RequestException as e:
return dict(error=e.message)
if response.sta... | [
"def",
"get_file",
"(",
"self",
",",
"this_hash",
")",
":",
"params",
"=",
"{",
"'apikey'",
":",
"self",
".",
"api_key",
",",
"'hash'",
":",
"this_hash",
"}",
"try",
":",
"response",
"=",
"requests",
".",
"get",
"(",
"self",
".",
"base",
"+",
"'file/... | Download a file by its hash.
Downloads a file from VirusTotal's store given one of its hashes. This call can be used in conjuction with
the file searching call in order to download samples that match a given set of criteria.
:param this_hash: The md5/sha1/sha256 hash of the file you want to do... | [
"Download",
"a",
"file",
"by",
"its",
"hash",
"."
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/VirusTotal/virustotal_api.py#L501-L525 |
244,694 | TheHive-Project/Cortex-Analyzers | analyzers/VirusTotal/virustotal_api.py | PrivateApi.get_url_report | def get_url_report(self, this_url, scan='0', allinfo=1):
""" Get the scan results for a URL.
:param this_url: A URL for which you want to retrieve the most recent report. You may also specify a scan_id
(sha256-timestamp as returned by the URL submission API) to access a specific report. At the ... | python | def get_url_report(self, this_url, scan='0', allinfo=1):
params = {'apikey': self.api_key, 'resource': this_url, 'scan': scan, 'allinfo': allinfo}
try:
response = requests.get(self.base + 'url/report', params=params, proxies=self.proxies)
except requests.RequestException as e:
... | [
"def",
"get_url_report",
"(",
"self",
",",
"this_url",
",",
"scan",
"=",
"'0'",
",",
"allinfo",
"=",
"1",
")",
":",
"params",
"=",
"{",
"'apikey'",
":",
"self",
".",
"api_key",
",",
"'resource'",
":",
"this_url",
",",
"'scan'",
":",
"scan",
",",
"'al... | Get the scan results for a URL.
:param this_url: A URL for which you want to retrieve the most recent report. You may also specify a scan_id
(sha256-timestamp as returned by the URL submission API) to access a specific report. At the same time, you
can specify a CSV list made up of a combinatio... | [
"Get",
"the",
"scan",
"results",
"for",
"a",
"URL",
"."
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/VirusTotal/virustotal_api.py#L548-L572 |
244,695 | TheHive-Project/Cortex-Analyzers | analyzers/VirusTotal/virustotal_api.py | PrivateApi.get_comments | def get_comments(self, resource, before=None):
""" Get comments for a file or URL.
Retrieve a list of VirusTotal Community comments for a given file or URL. VirusTotal Community comments are
user submitted reviews on a given item, these comments may contain anything from the in-the-wild locatio... | python | def get_comments(self, resource, before=None):
params = dict(apikey=self.api_key, resource=resource, before=before)
try:
response = requests.get(self.base + 'comments/get', params=params, proxies=self.proxies)
except requests.RequestException as e:
return dict(error=e.me... | [
"def",
"get_comments",
"(",
"self",
",",
"resource",
",",
"before",
"=",
"None",
")",
":",
"params",
"=",
"dict",
"(",
"apikey",
"=",
"self",
".",
"api_key",
",",
"resource",
"=",
"resource",
",",
"before",
"=",
"before",
")",
"try",
":",
"response",
... | Get comments for a file or URL.
Retrieve a list of VirusTotal Community comments for a given file or URL. VirusTotal Community comments are
user submitted reviews on a given item, these comments may contain anything from the in-the-wild locations of
files up to fully-featured reverse engineerin... | [
"Get",
"comments",
"for",
"a",
"file",
"or",
"URL",
"."
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/VirusTotal/virustotal_api.py#L659-L679 |
244,696 | TheHive-Project/Cortex-Analyzers | analyzers/VirusTotal/virustotal_api.py | IntelApi.save_downloaded_file | def save_downloaded_file(filename, save_file_at, file_stream):
""" Save Downloaded File to Disk Helper Function
:param save_file_at: Path of where to save the file.
:param file_stream: File stream
:param filename: Name to save the file.
"""
filename = os.path.join(save_f... | python | def save_downloaded_file(filename, save_file_at, file_stream):
filename = os.path.join(save_file_at, filename)
with open(filename, 'wb') as f:
f.write(file_stream)
f.flush() | [
"def",
"save_downloaded_file",
"(",
"filename",
",",
"save_file_at",
",",
"file_stream",
")",
":",
"filename",
"=",
"os",
".",
"path",
".",
"join",
"(",
"save_file_at",
",",
"filename",
")",
"with",
"open",
"(",
"filename",
",",
"'wb'",
")",
"as",
"f",
"... | Save Downloaded File to Disk Helper Function
:param save_file_at: Path of where to save the file.
:param file_stream: File stream
:param filename: Name to save the file. | [
"Save",
"Downloaded",
"File",
"to",
"Disk",
"Helper",
"Function"
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/VirusTotal/virustotal_api.py#L758-L768 |
244,697 | TheHive-Project/Cortex-Analyzers | analyzers/MaxMind/geoip2/records.py | PlaceRecord.name | def name(self):
"""Dict with locale codes as keys and localized name as value"""
# pylint:disable=E1101
return next((self.names.get(x) for x in self._locales if x in
self.names), None) | python | def name(self):
# pylint:disable=E1101
return next((self.names.get(x) for x in self._locales if x in
self.names), None) | [
"def",
"name",
"(",
"self",
")",
":",
"# pylint:disable=E1101",
"return",
"next",
"(",
"(",
"self",
".",
"names",
".",
"get",
"(",
"x",
")",
"for",
"x",
"in",
"self",
".",
"_locales",
"if",
"x",
"in",
"self",
".",
"names",
")",
",",
"None",
")"
] | Dict with locale codes as keys and localized name as value | [
"Dict",
"with",
"locale",
"codes",
"as",
"keys",
"and",
"localized",
"name",
"as",
"value"
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/MaxMind/geoip2/records.py#L40-L44 |
244,698 | TheHive-Project/Cortex-Analyzers | analyzers/Patrowl/patrowl.py | PatrowlAnalyzer.summary | def summary(self, raw):
"""Parse, format and return scan summary."""
taxonomies = []
level = "info"
namespace = "Patrowl"
# getreport service
if self.service == 'getreport':
if 'risk_level' in raw and raw['risk_level']:
risk_level = raw['risk_... | python | def summary(self, raw):
taxonomies = []
level = "info"
namespace = "Patrowl"
# getreport service
if self.service == 'getreport':
if 'risk_level' in raw and raw['risk_level']:
risk_level = raw['risk_level']
# Grade
if r... | [
"def",
"summary",
"(",
"self",
",",
"raw",
")",
":",
"taxonomies",
"=",
"[",
"]",
"level",
"=",
"\"info\"",
"namespace",
"=",
"\"Patrowl\"",
"# getreport service",
"if",
"self",
".",
"service",
"==",
"'getreport'",
":",
"if",
"'risk_level'",
"in",
"raw",
"... | Parse, format and return scan summary. | [
"Parse",
"format",
"and",
"return",
"scan",
"summary",
"."
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/Patrowl/patrowl.py#L17-L53 |
244,699 | TheHive-Project/Cortex-Analyzers | analyzers/Patrowl/patrowl.py | PatrowlAnalyzer.run | def run(self):
"""Run the analyzer."""
try:
if self.service == 'getreport':
service_url = '{}/assets/api/v1/details/{}'.format(
self.url, self.get_data())
headers = {
'Authorization': 'token {}'.format(s... | python | def run(self):
try:
if self.service == 'getreport':
service_url = '{}/assets/api/v1/details/{}'.format(
self.url, self.get_data())
headers = {
'Authorization': 'token {}'.format(self.api_key)
}
... | [
"def",
"run",
"(",
"self",
")",
":",
"try",
":",
"if",
"self",
".",
"service",
"==",
"'getreport'",
":",
"service_url",
"=",
"'{}/assets/api/v1/details/{}'",
".",
"format",
"(",
"self",
".",
"url",
",",
"self",
".",
"get_data",
"(",
")",
")",
"headers",
... | Run the analyzer. | [
"Run",
"the",
"analyzer",
"."
] | 8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf | https://github.com/TheHive-Project/Cortex-Analyzers/blob/8dae6a8c4cf9af5554ae8c844985c4b44d4bd4bf/analyzers/Patrowl/patrowl.py#L55-L73 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.