Skip to content

Commit

Permalink
Another attempt to suppress Slither false positives
Browse files Browse the repository at this point in the history
  • Loading branch information
lukasz-zimnoch committed Mar 5, 2024
1 parent fa89a62 commit b6db931
Showing 1 changed file with 1 addition and 2 deletions.
3 changes: 1 addition & 2 deletions solidity/contracts/l2/L1BitcoinDepositor.sol
Original file line number Diff line number Diff line change
Expand Up @@ -519,6 +519,7 @@ contract L1BitcoinDepositor is
/// attached to the call (as calculated by `quoteFinalizeDeposit`).
/// @dev Implemented based on examples presented as part of the Wormhole SDK:
/// https://github.com/wormhole-foundation/hello-token/blob/8ec757248788dc12183f13627633e1d6fd1001bb/src/example-extensions/HelloTokenWithoutSDK.sol#L29
// slither-disable-next-line arbitrary-send-eth
function _transferTbtc(uint256 amount, bytes32 l2Receiver) internal {
// Wormhole supports the 1e8 precision at most. TBTC is 1e18 so
// the amount needs to be normalized.
Expand All @@ -540,7 +541,6 @@ contract L1BitcoinDepositor is
// Initiate a Wormhole token transfer that will lock L1 TBTC within
// the Wormhole Token Bridge contract and assign Wormhole-wrapped
// L2 TBTC to the corresponding `L2WormholeGateway` contract.
// slither-disable-next-line arbitrary-send-eth
uint64 transferSequence = wormholeTokenBridge.transferTokensWithPayload{
value: wormholeMessageFee
}(
Expand Down Expand Up @@ -569,7 +569,6 @@ contract L1BitcoinDepositor is
// contract receives it, it calls the `L2WormholeGateway` contract
// that redeems Wormhole-wrapped L2 TBTC from the Wormhole Token
// Bridge and use it to mint canonical L2 TBTC to the receiver address.
// slither-disable-next-line arbitrary-send-eth
wormholeRelayer.sendVaasToEvm{value: cost - wormholeMessageFee}(
l2ChainId,
l2BitcoinDepositor,
Expand Down

0 comments on commit b6db931

Please sign in to comment.