{
    "Function": "checkTransaction",
    "File": "src/Guard.sol",
    "Parent Contracts": [
        "lib/safe-smart-account/contracts/base/GuardManager.sol",
        "lib/safe-smart-account/contracts/base/GuardManager.sol",
        "lib/safe-smart-account/contracts/interfaces/IERC165.sol"
    ],
    "High-Level Calls": [],
    "Internal Calls": [
        "require(bool,string)",
        "require(bool,string)"
    ],
    "Library Calls": [],
    "Low-Level Calls": [],
    "Code": "function checkTransaction(\n        address to,\n        uint256 value,\n        bytes memory data,\n        Enum.Operation operationType,\n        uint256,\n        uint256,\n        uint256,\n        address,\n        address payable,\n        bytes memory,\n        address\n    ) external view {\n        if (to == msg.sender) {\n            /// only allow self calls to effectively cancel a transaction by\n            /// using a nonce without any payload and value.\n            require(data.length == 0 && value == 0, \"Guard: no self calls\");\n        }\n        /// if delegate calls are allowed, owners or modules could be added\n        /// or removed outside of the expected flow, and the only way to reason\n        /// about this is to disallow delegate calls as we cannot prove unknown\n        /// slots were not written to in the owner or modules mapping\n        require(\n            operationType == Enum.Operation.Call,\n            \"Guard: delegate call disallowed\"\n        );\n    }"
}