You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I think not because I use bytes32 for precisely this reason, such that in case of a would-be collision we would be still comparing these distinct values:
0xffffffff00000000000000000000000000000000000000000000000000000000 # sig
0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff # ANY
Nice, I think that works as long as the previous bug where it wouldn't zero your bytes <32 args (because args are word aligned) isn't accidentally reverted with the loosey goosey solidity reference implentation
Looks like ANY trick is fine for src/dest, but is there some fuckery that could happen with a malicious function signature
bytes4(uint32(-1))
? @dbrockThe text was updated successfully, but these errors were encountered: