TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

019b3836-21ff-70b4-b7e3-88d9e0ce4416

complete
Chain ID
1
Address
Block Number
Created
Fri, Dec 19, 2025 8:03 PM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
0
Validated
0
Source
Bytecode only
Review Backing
Not yet
Best current signal
ETH value transfer possible
crit 0 high 0 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
203 artifact.fetch complete 1 / 3 3 months ago
204 tool.cast_disasm complete 1 / 3 3 months ago
43403 analysis.bundle complete 1 / 3 1 week ago
43404 capability.graph complete 1 / 3 1 week ago
43405 detector.run complete 1 / 3 1 week ago
43406 validation.fork complete 1 / 3 1 week ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no
Implementation:
Verified Source: no

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate

No codex job recorded yet.

Opcode Heuristics

tool.cast_disasm
Delegatecall
0
Selfdestruct
0
CREATE2
0
CALL-family (heavy)
1
EXT*/BALANCE
0
Total opcodes
444
Flags
No heuristic flags raised.
View cast disassembly output
00000000: PUSH1 0x60
00000002: PUSH1 0x40
00000004: MSTORE
00000005: PUSH1 0xe0
00000007: PUSH1 0x02
00000009: EXP
0000000a: PUSH1 0x00
0000000c: CALLDATALOAD
0000000d: DIV
0000000e: PUSH4 0x02110d25
00000013: DUP2
00000014: EQ
00000015: PUSH2 0x003c
00000018: JUMPI
00000019: DUP1
0000001a: PUSH4 0x0553e156
0000001f: EQ
00000020: PUSH2 0x011f
00000023: JUMPI
00000024: DUP1
00000025: PUSH4 0x27e235e3
0000002a: EQ
0000002b: PUSH2 0x0151
0000002e: JUMPI
0000002f: DUP1
00000030: PUSH4 0x6d4ce63c
00000035: EQ
00000036: PUSH2 0x0169
00000039: JUMPI
0000003a: JUMPDEST
0000003b: STOP
0000003c: JUMPDEST
0000003d: PUSH1 0x80
0000003f: PUSH1 0x20
00000041: PUSH1 0x04
00000043: DUP1
00000044: CALLDATALOAD
00000045: SWAP1
00000046: DUP2
00000047: ADD
00000048: CALLDATALOAD
00000049: PUSH1 0x1f
0000004b: DUP2
0000004c: ADD
0000004d: DUP4
0000004e: SWAP1
0000004f: DIV
00000050: SWAP1
00000051: SWAP3
00000052: MUL
00000053: DUP4
00000054: ADD
00000055: PUSH1 0x40
00000057: MSTORE
00000058: PUSH1 0x60
0000005a: DUP3
0000005b: DUP2
0000005c: MSTORE
0000005d: PUSH2 0x0183
00000060: SWAP4
00000061: PUSH1 0x24
00000063: SWAP4
00000064: SWAP2
00000065: SWAP3
00000066: DUP5
00000067: ADD
00000068: SWAP2
00000069: SWAP1
0000006a: DUP2
0000006b: SWAP1
0000006c: DUP4
0000006d: DUP3
0000006e: DUP1
0000006f: DUP3
00000070: DUP5
00000071: CALLDATACOPY
00000072: POP
00000073: POP
00000074: PUSH1 0x40
00000076: DUP1
00000077: MLOAD
00000078: PUSH1 0x20
0000007a: DUP9
0000007b: CALLDATALOAD
0000007c: PUSH1 0x04
0000007e: DUP2
0000007f: ADD
00000080: CALLDATALOAD
00000081: PUSH1 0x1f
00000083: DUP2
00000084: ADD
00000085: DUP4
00000086: SWAP1
00000087: DIV
00000088: DUP4
00000089: MUL
0000008a: DUP5
0000008b: ADD
0000008c: DUP4
0000008d: ADD
0000008e: SWAP1
0000008f: SWAP5
00000090: MSTORE
00000091: DUP4
00000092: DUP4
00000093: MSTORE
00000094: SWAP8
00000095: SWAP9
00000096: PUSH1 0x44
00000098: SWAP9
00000099: SWAP3
0000009a: SWAP8
0000009b: POP
0000009c: SWAP2
0000009d: SWAP1
0000009e: SWAP2
0000009f: ADD
000000a0: SWAP5
000000a1: POP
000000a2: SWAP1
000000a3: SWAP3
000000a4: POP
000000a5: DUP3
000000a6: SWAP2
000000a7: POP
000000a8: DUP5
000000a9: ADD
000000aa: DUP4
000000ab: DUP3
000000ac: DUP1
000000ad: DUP3
000000ae: DUP5
000000af: CALLDATACOPY
000000b0: POP
000000b1: POP
000000b2: PUSH1 0x40
000000b4: DUP1
000000b5: MLOAD
000000b6: PUSH1 0x20
000000b8: SWAP8
000000b9: CALLDATALOAD
000000ba: PUSH1 0x04
000000bc: DUP2
000000bd: ADD
000000be: CALLDATALOAD
000000bf: PUSH1 0x1f
000000c1: DUP2
000000c2: ADD
000000c3: DUP11
000000c4: SWAP1
000000c5: DIV
000000c6: DUP11
000000c7: MUL
000000c8: DUP4
000000c9: ADD
000000ca: DUP11
000000cb: ADD
000000cc: SWAP1
000000cd: SWAP4
000000ce: MSTORE
000000cf: DUP3
000000d0: DUP3
000000d1: MSTORE
000000d2: SWAP7
000000d3: SWAP8
000000d4: PUSH1 0x64
000000d6: SWAP8
000000d7: SWAP2
000000d8: SWAP7
000000d9: POP
000000da: PUSH1 0x24
000000dc: SWAP2
000000dd: SWAP1
000000de: SWAP2
000000df: ADD
000000e0: SWAP5
000000e1: POP
000000e2: SWAP1
000000e3: SWAP3
000000e4: POP
000000e5: DUP3
000000e6: SWAP2
000000e7: POP
000000e8: DUP5
000000e9: ADD
000000ea: DUP4
000000eb: DUP3
000000ec: DUP1
000000ed: DUP3
000000ee: DUP5
000000ef: CALLDATACOPY
000000f0: POP
000000f1: SWAP5
000000f2: SWAP6
000000f3: CALLDATALOAD
000000f4: SWAP5
000000f5: POP
000000f6: POP
000000f7: POP
000000f8: POP
000000f9: POP
000000fa: PUSH1 0x01
000000fc: PUSH1 0xa0
000000fe: PUSH1 0x02
00000100: EXP
00000101: SUB
00000102: CALLER
00000103: AND
00000104: PUSH1 0x00
00000106: SWAP1
00000107: DUP2
00000108: MSTORE
00000109: PUSH1 0x20
0000010b: DUP2
0000010c: SWAP1
0000010d: MSTORE
0000010e: PUSH1 0x40
00000110: DUP2
00000111: KECCAK256
00000112: SLOAD
00000113: DUP2
00000114: SWAP1
00000115: GT
00000116: ISZERO
00000117: PUSH2 0x0195
0000011a: JUMPI
0000011b: PUSH2 0x022c
0000011e: JUMP
0000011f: JUMPDEST
00000120: PUSH2 0x003a
00000123: PUSH1 0x04
00000125: CALLDATALOAD
00000126: PUSH1 0x24
00000128: CALLDATALOAD
00000129: PUSH20 0x3c94923400ccc528e8ab0f849edafca06fe332e5
0000013e: PUSH1 0x01
00000140: PUSH1 0xa0
00000142: PUSH1 0x02
00000144: EXP
00000145: SUB
00000146: CALLER
00000147: AND
00000148: EQ
00000149: PUSH2 0x0234
0000014c: JUMPI
0000014d: PUSH2 0x0283
00000150: JUMP
00000151: JUMPDEST
00000152: PUSH2 0x0183
00000155: PUSH1 0x04
00000157: CALLDATALOAD
00000158: PUSH1 0x00
0000015a: PUSH1 0x20
0000015c: DUP2
0000015d: SWAP1
0000015e: MSTORE
0000015f: SWAP1
00000160: DUP2
00000161: MSTORE
00000162: PUSH1 0x40
00000164: SWAP1
00000165: KECCAK256
00000166: SLOAD
00000167: DUP2
00000168: JUMP
00000169: JUMPDEST
0000016a: CALLER
0000016b: PUSH1 0x01
0000016d: PUSH1 0xa0
0000016f: PUSH1 0x02
00000171: EXP
00000172: SUB
00000173: AND
00000174: PUSH1 0x00
00000176: SWAP1
00000177: DUP2
00000178: MSTORE
00000179: PUSH1 0x20
0000017b: DUP2
0000017c: SWAP1
0000017d: MSTORE
0000017e: PUSH1 0x40
00000180: SWAP1
00000181: KECCAK256
00000182: SLOAD
00000183: JUMPDEST
00000184: PUSH1 0x40
00000186: DUP1
00000187: MLOAD
00000188: SWAP2
00000189: DUP3
0000018a: MSTORE
0000018b: MLOAD
0000018c: SWAP1
0000018d: DUP2
0000018e: SWAP1
0000018f: SUB
00000190: PUSH1 0x20
00000192: ADD
00000193: SWAP1
00000194: RETURN
00000195: JUMPDEST
00000196: PUSH1 0x40
00000198: DUP1
00000199: MLOAD
0000019a: PUSH1 0x0b
0000019c: DUP2
0000019d: MSTORE
0000019e: SWAP1
0000019f: MLOAD
000001a0: PUSH32 0xf82c50f1848136e6c140b186ea0c768b7deda5efffe42c25e96336a90b26c744
000001c1: SWAP2
000001c2: DUP2
000001c3: SWAP1
000001c4: SUB
000001c5: PUSH1 0x20
000001c7: ADD
000001c8: SWAP1
000001c9: LOG1
000001ca: CALLVALUE
000001cb: PUSH1 0x05
000001cd: MUL
000001ce: PUSH1 0x00
000001d0: PUSH1 0x00
000001d2: POP
000001d3: PUSH1 0x00
000001d5: CALLER
000001d6: PUSH1 0x01
000001d8: PUSH1 0xa0
000001da: PUSH1 0x02
000001dc: EXP
000001dd: SUB
000001de: AND
000001df: DUP2
000001e0: MSTORE
000001e1: PUSH1 0x20
000001e3: ADD
000001e4: SWAP1
000001e5: DUP2
000001e6: MSTORE
000001e7: PUSH1 0x20
000001e9: ADD
000001ea: PUSH1 0x00
000001ec: KECCAK256
000001ed: PUSH1 0x00
000001ef: POP
000001f0: DUP2
000001f1: SWAP1
000001f2: SSTORE
000001f3: POP
000001f4: PUSH32 0xf82c50f1848136e6c140b186ea0c768b7deda5efffe42c25e96336a90b26c744
00000215: PUSH1 0x0c
00000217: PUSH1 0x40
00000219: MLOAD
0000021a: DUP1
0000021b: DUP3
0000021c: DUP2
0000021d: MSTORE
0000021e: PUSH1 0x20
00000220: ADD
00000221: SWAP2
00000222: POP
00000223: POP
00000224: PUSH1 0x40
00000226: MLOAD
00000227: DUP1
00000228: SWAP2
00000229: SUB
0000022a: SWAP1
0000022b: LOG1
0000022c: JUMPDEST
0000022d: SWAP5
0000022e: SWAP4
0000022f: POP
00000230: POP
00000231: POP
00000232: POP
00000233: JUMP
00000234: JUMPDEST
00000235: PUSH1 0x00
00000237: DUP2
00000238: GT
00000239: ISZERO
0000023a: PUSH2 0x0269
0000023d: JUMPI
0000023e: PUSH1 0x01
00000240: PUSH1 0xa0
00000242: PUSH1 0x02
00000244: EXP
00000245: SUB
00000246: DUP3
00000247: AND
00000248: PUSH1 0x00
0000024a: DUP2
0000024b: DUP2
0000024c: MSTORE
0000024d: PUSH1 0x20
0000024f: DUP2
00000250: SWAP1
00000251: MSTORE
00000252: PUSH1 0x40
00000254: DUP2
00000255: KECCAK256
00000256: SLOAD
00000257: PUSH1 0x05
00000259: MUL
0000025a: PUSH1 0x60
0000025c: DUP3
0000025d: DUP2
0000025e: DUP2
0000025f: DUP2
00000260: DUP6
00000261: DUP9
00000262: DUP4
00000263: CALL
00000264: POP
00000265: POP
00000266: POP
00000267: POP
00000268: POP
00000269: JUMPDEST
0000026a: PUSH1 0x40
0000026c: PUSH1 0x00
0000026e: SWAP1
0000026f: DUP2
00000270: KECCAK256
00000271: PUSH1 0x01
00000273: PUSH1 0xa0
00000275: PUSH1 0x02
00000277: EXP
00000278: SUB
00000279: DUP5
0000027a: AND
0000027b: DUP3
0000027c: MSTORE
0000027d: PUSH1 0x20
0000027f: DUP3
00000280: SWAP1
00000281: MSTORE
00000282: SSTORE
00000283: JUMPDEST
00000284: POP
00000285: POP
00000286: JUMP
View stderr
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
high other detector ETH value transfer possible 55 no no
view
trace_id: 0x5174977114d886715e8e4cc955615b6f0543348d3b9db5887cb5b0806c4156a5
call_targets: 0xbb5cdae9cc524422a46f24b21ed9e1f718c483f9
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0x5174977114d886715e8e4cc955615b6f0543348d3b9db5887cb5b0806c4156a5",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0xbb5cdae9cc524422a46f24b21ed9e1f718c483f9"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x02110d25",
            "selector": "0x02110d25",
            "calldata_variants": [
                "0x02110d25",
                "0x02110d250000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x0553e156",
            "selector": "0x0553e156",
            "calldata_variants": [
                "0x0553e156",
                "0x0553e1560000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x27e235e3",
            "selector": "0x27e235e3",
            "calldata_variants": [
                "0x27e235e3",
                "0x27e235e30000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x6d4ce63c",
            "selector": "0x6d4ce63c",
            "calldata_variants": [
                "0x6d4ce63c",
                "0x6d4ce63c0000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 611,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "eth_value_calls": 1,
    "guards_detected": []
}
high other detector Untrusted CALL target/value reachable 60 no no
view
trace_id: 0x5174977114d886715e8e4cc955615b6f0543348d3b9db5887cb5b0806c4156a5
call_targets: 0xbb5cdae9cc524422a46f24b21ed9e1f718c483f9
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0x5174977114d886715e8e4cc955615b6f0543348d3b9db5887cb5b0806c4156a5",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0xbb5cdae9cc524422a46f24b21ed9e1f718c483f9"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x02110d25",
            "selector": "0x02110d25",
            "calldata_variants": [
                "0x02110d25",
                "0x02110d250000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x0553e156",
            "selector": "0x0553e156",
            "calldata_variants": [
                "0x0553e156",
                "0x0553e1560000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x27e235e3",
            "selector": "0x27e235e3",
            "calldata_variants": [
                "0x27e235e3",
                "0x27e235e30000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x6d4ce63c",
            "selector": "0x6d4ce63c",
            "calldata_variants": [
                "0x6d4ce63c",
                "0x6d4ce63c0000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 611,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "call_count": 1,
    "guards_detected": [],
    "untrusted_call_count": 1
}