{
    "Function": "executeWhitelistedBatch",
    "File": "src/Timelock.sol",
    "Parent Contracts": [
        "lib/openzeppelin-contracts/contracts/token/ERC721/IERC721Receiver.sol",
        "lib/openzeppelin-contracts/contracts/token/ERC1155/IERC1155Receiver.sol",
        "lib/openzeppelin-contracts/contracts/access/extensions/AccessControlEnumerable.sol",
        "lib/openzeppelin-contracts/contracts/access/AccessControl.sol",
        "lib/openzeppelin-contracts/contracts/utils/introspection/ERC165.sol",
        "lib/openzeppelin-contracts/contracts/utils/introspection/IERC165.sol",
        "lib/openzeppelin-contracts/contracts/access/extensions/IAccessControlEnumerable.sol",
        "lib/openzeppelin-contracts/contracts/access/IAccessControl.sol",
        "lib/openzeppelin-contracts/contracts/utils/Context.sol",
        "src/ConfigurablePause.sol"
    ],
    "High-Level Calls": [],
    "Internal Calls": [
        "whenNotPaused",
        "onlyRole",
        "require(bool,string)",
        "_execute",
        "checkCalldata"
    ],
    "Library Calls": [],
    "Low-Level Calls": [],
    "Code": "function executeWhitelistedBatch(\n        address[] calldata targets,\n        uint256[] calldata values,\n        bytes[] calldata payloads\n    ) external payable onlyRole(HOT_SIGNER_ROLE) whenNotPaused {\n        require(\n            targets.length == values.length && targets.length == payloads.length,\n            \"Timelock: length mismatch\"\n        );\n\n        for (uint256 i = 0; i < targets.length; i++) {\n            address target = targets[i];\n            uint256 value = values[i];\n            bytes calldata payload = payloads[i];\n\n            /// first ensure calldata to target is whitelisted,\n            /// and that parameters are not malicious\n            checkCalldata(target, payload);\n            _execute(target, value, payload);\n\n            emit CallExecuted(bytes32(0), i, target, value, payload);\n        }\n    }"
}