# TODO - Describe the various forms it may take and construct minimal sample contracts for each variant. Also describe variants that look similar but are not a weakness, and construct minimal contracts for these non-weaknesses. - Describe the consequences if the weakness is exploited. - Collect vulnerable contracts used by the papers to motivate/illustrate the weakness. - Summarize the code properties that tools are looking for so that they can detect the weakness. - Sketch ways to potentially exploit the different variants of the weakness.