Skip to content

Commit

Permalink
Add exclusion for Slither Detector calls-loop
Browse files Browse the repository at this point in the history
  • Loading branch information
alejoloaiza committed Jul 22, 2024
1 parent 982ecde commit 77ea319
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions contracts/multicall/GuardedMulticaller.sol
Original file line number Diff line number Diff line change
Expand Up @@ -148,7 +148,7 @@ contract GuardedMulticaller is AccessControl, ReentrancyGuard, EIP712 {
* @param _deadline Expiration timestamp
* @param _signature Signature of the multicall signer
*/
// slither-disable-start low-level-calls,cyclomatic-complexity,calls-inside-a-loop
// slither-disable-start low-level-calls,cyclomatic-complexity
// solhint-disable-next-line code-complexity
function execute(
address _multicallSigner,
Expand Down Expand Up @@ -206,7 +206,7 @@ contract GuardedMulticaller is AccessControl, ReentrancyGuard, EIP712 {
// Multicall
for (uint256 i = 0; i < _targets.length; i++) {
// solhint-disable avoid-low-level-calls
// slither-disable-next-line calls-inside-a-loop
// slither-disable-next-line calls-loop
(bool success, bytes memory returnData) = _targets[i].call(_data[i]);
if (!success) {
if (returnData.length == 0) {
Expand All @@ -221,7 +221,7 @@ contract GuardedMulticaller is AccessControl, ReentrancyGuard, EIP712 {

emit Multicalled(_multicallSigner, _reference, _targets, _data, _deadline);
}
// slither-disable-end low-level-calls,cyclomatic-complexity,calls-inside-a-loop
// slither-disable-end low-level-calls,cyclomatic-complexity

/**
* @notice Update function permits for a list of function selectors on target contracts. Only DEFAULT_ADMIN_ROLE can call this function.
Expand Down

0 comments on commit 77ea319

Please sign in to comment.