{
    "Function": "execute",
    "File": "contracts/openzeppelin-solidity/contracts/metatx/MinimalForwarder.sol",
    "Parent Contracts": [
        "contracts/openzeppelin-solidity/contracts/utils/cryptography/draft-EIP712.sol"
    ],
    "High-Level Calls": [],
    "Internal Calls": [
        "require(bool,string)",
        "invalid()",
        "gasleft()",
        "verify",
        "abi.encodePacked()"
    ],
    "Library Calls": [],
    "Low-Level Calls": [
        "call"
    ],
    "Code": "function execute(ForwardRequest calldata req, bytes calldata signature)\n        public\n        payable\n        returns (bool, bytes memory)\n    {\n        require(verify(req, signature), \"MinimalForwarder: signature does not match request\");\n        _nonces[req.from] = req.nonce + 1;\n\n        (bool success, bytes memory returndata) = req.to.call{gas: req.gas, value: req.value}(\n            abi.encodePacked(req.data, req.from)\n        );\n\n        // Validate that the relayer has sent enough gas for the call.\n        // See https://ronan.eth.link/blog/ethereum-gas-dangers/\n        if (gasleft() <= req.gas / 63) {\n            // We explicitly trigger invalid opcode to consume all gas and bubble-up the effects, since\n            // neither revert or assert consume all gas since Solidity 0.8.0\n            // https://docs.soliditylang.org/en/v0.8.0/control-structures.html#panic-via-assert-and-error-via-require\n            assembly {\n                invalid()\n            }\n        }\n\n        return (success, returndata);\n    }"
}