Skip to content

Commit 6cafeb1

Browse files
committed
More links fixed
1 parent d788db1 commit 6cafeb1

File tree

4 files changed

+5
-5
lines changed

4 files changed

+5
-5
lines changed

development-guidelines/workflow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ Visually inspect critical security features of your code:
2121

2222
Document critical security properties and use automated test generators to evaluate them:
2323

24-
- [ ] Learn to [document security properties for your code](/program-analysis/). It's tough as first, but it's the single most important activity for achieving a good outcome. It's also a prerequisite for using any of the advanced techniques in this tutorial.
24+
- [ ] Learn to [document security properties for your code](../program-analysis/). It's tough as first, but it's the single most important activity for achieving a good outcome. It's also a prerequisite for using any of the advanced techniques in this tutorial.
2525
- [ ] Define security properties in Solidity, for use with [Echidna](https://github.com/crytic/echidna) and [Manticore](https://manticore.readthedocs.io/en/latest/verifier.html). Focus on your state machine, access controls, arithmetic operations, external interactions, and standards conformance.
26-
- [ ] Define security properties with [Slither's Python API](/program-analysis/slither). Focus on inheritance, variable dependencies, access controls, and other structural issues.
26+
- [ ] Define security properties with [Slither's Python API](../program-analysis/slither). Focus on inheritance, variable dependencies, access controls, and other structural issues.
2727

2828
Finally, be mindful of issues that automated tools cannot easily find:
2929

program-analysis/manticore/exercises/example.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# Example: Arithmetic overflow
22
This scenario is given as an example. You can follow its structure to solve the exercises.
33

4-
[`my_token.py`](example/my_token.py) uses manticore to find for an attacker to generate tokens during a transfer on Token ([my_token.sol](exercises/example/my_token.sol)).
4+
[`my_token.py`](example/my_token.py) uses manticore to find for an attacker to generate tokens during a transfer on Token ([my_token.sol](example/my_token.sol)).
55

66
## Proposed scenario
77

program-analysis/manticore/exercises/exercise1.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Follow the pattern initilization, exploration and property for the script.
2525

2626
- `m.ready_states` returns the list of state alive
2727
- `Operators.AND(a, b)` allows to create and AND condition
28-
- You can use the template proposed in [exercise1/template.sol](./exercise1/template.sol)
28+
- You can use the template proposed in [exercise1/template.py](./exercise1/template.py)
2929

3030
### Solution
3131

program-analysis/manticore/exercises/exercise2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ state.platform.transactions[-1].return_data
3434
data = ABI.deserialize("uint", data)
3535
```
3636

37-
- You can use the template proposed in [exercise2/template.sol](./exercise2/template.sol)
37+
- You can use the template proposed in [exercise2/template.py](./exercise2/template.py)
3838

3939
### Solution
4040

0 commit comments

Comments
 (0)