Kingdom: Environment

This section includes everything that is outside of the source code but is still critical to the security of the product that is being created. Because the issues covered by this kingdom are not directly related to source code, we separated it from the rest of the kingdoms.

Dynamic Code Evaluation: Delegatecall

Abstract
The contract uses delegatecall to call into a potentially untrusted contract.
Explanation
Unlike a regular message call, using delegatecall causes the code at the target address to be executed in the context of the calling address. delegatecall effectively enables the smart contract to dynamically load code from a different address at runtime, which is dangerous as the code at the target address can change any storage values and potentially take full control over the caller's balance.

Example 1: The following code uses delegatecall to execute code in the context of the calling address.


function forward(address callee, bytes _data) public {
require(callee.delegatecall(_data));
}
References
[1] Enterprise Ethereum Alliance No delegatecall()
[2] Standards Mapping - Common Weakness Enumeration CWE ID 829
[3] Standards Mapping - Smart Contract Weakness Classification SWC-112
desc.structural.solidity.swc112