@@ -265,16 +265,11 @@ public static void runCrossChainCheckers(Bridge bridge) {
265265
266266 /**
267267 * Executes the Local Dependency analysis for all contracts in the given
268- * bridge.
269- * <p>
270- * This method performs three phases in parallel across all contracts:
271- * <ol>
272- * <li>Identify vulnerable LOG statements for the Local Dependency
273- * Checker.</li>
274- * <li>Mark any CALLDATALOAD sites reachable from those LOGs as
275- * tainted.</li>
276- * <li>Run the core Local Dependency Checker logic on each contract.</li>
277- * </ol>
268+ * bridge. This method performs three phases in parallel across all
269+ * contracts: (i) Identify vulnerable LOG statements for the Local
270+ * Dependency Checker. (ii) Mark any CALLDATALOAD sites reachable from those
271+ * LOGs as tainted. (iii) Run the core Local Dependency Checker logic on
272+ * each contract.
278273 *
279274 * @param bridge the Bridge instance whose contracts will be analyzed
280275 */
@@ -303,9 +298,8 @@ public static void runLocalDependencyCheckers(Bridge bridge) {
303298 }
304299
305300 /**
306- * Runs the Unchecked External Influence Checker on a single contract.
307- * <p>
308- * This sets up the LiSA analysis environment, registers the
301+ * Runs the Unchecked External Influence Checker on a single contract. This
302+ * sets up the LiSA analysis environment, registers the
309303 * UncheckedExternalInfluenceChecker, and executes the analysis to find
310304 * event emit influenced by unvalidated external inputs. Reports definite
311305 * and possible findings to the configured cache.
@@ -338,9 +332,8 @@ public static void runUncheckedExternalInfluenceChecker(Bridge bridge, SmartCont
338332 }
339333
340334 /**
341- * Runs the Unchecked External Call Checker on a single contract.
342- * <p>
343- * This configures and invokes LiSA with the UncheckedExternalCallChecker to
335+ * Runs the Unchecked External Call Checker on a single contract. This
336+ * configures and invokes LiSA with the UncheckedExternalCallChecker to
344337 * detect any CALL, STATICCALL or DELEGATECALL instructions whose results
345338 * directly influence event emit without proper validation.
346339 *
@@ -369,18 +362,12 @@ public static void runUncheckedExternalCallChecker(Bridge bridge, SmartContract
369362 }
370363
371364 /**
372- * Executes the Event Order Checker on a single contract.
373- * <p>
374- * For each public function:
375- * <ul>
376- * <li>Follow only successful return paths (STOP for void, RETURN
377- * otherwise).</li>
378- * <li>Collect any SSTORE and LOG instructions on that path.</li>
379- * <li>If LOGs occur without a preceding SSTORE, flag an event-order
380- * issue.</li>
381- * <li>Classify as definite if across a cross‑chain edge, else
382- * possible.</li>
383- * </ul>
365+ * Executes the Event Order Checker on a single contract. For each public
366+ * function: (i) Follow only successful return paths (STOP for void, RETURN
367+ * otherwise). (ii) Collect any SSTORE and LOG instructions on that path.
368+ * (iii) If LOGs occur without a preceding SSTORE, flag an event-order
369+ * issue. (iv) Classify as definite if across a cross‑chain edge, else
370+ * possible.
384371 *
385372 * @param bridge the Bridge providing the cross-chain CFG context
386373 * @param contract the specific SmartContract to analyze
@@ -479,17 +466,12 @@ public static void runEventOrderChecker(Bridge bridge, SmartContract contract) {
479466 }
480467
481468 /**
482- * Executes the Missing Event Notification Checker on a single contract.
483- * <p>
484- * For each public function:
485- * <ul>
486- * <li>Follow only successful return paths (STOP for void, RETURN
487- * otherwise).</li>
488- * <li>Identify any SSTORE instructions on that path.</li>
489- * <li>Ensure that each such SSTORE is followed by at least one LOG before
490- * termination.</li>
491- * <li>Flag any missing notifications as vulnerabilities.</li>
492- * </ul>
469+ * Executes the Missing Event Notification Checker on a single contract. For
470+ * each public function: (i) Follow only successful return paths (STOP for
471+ * void, RETURN otherwise). (ii) Identify any SSTORE instructions on that
472+ * path. (iii) Ensure that each such SSTORE is followed by at least one LOG
473+ * before termination. (iv) Flag any missing notifications as
474+ * vulnerabilities.
493475 *
494476 * @param contract the SmartContract to analyze for missing event logs
495477 */
0 commit comments