TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

019b3836-229d-712a-af63-15c2f53b8dc1

complete
Chain ID
1
Address
Block Number
Created
Fri, Dec 19, 2025 8:03 PM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
0
Validated
0
Source
Bytecode only
Review Backing
Not yet
Best current signal
Untrusted CALL target/value reachable
crit 0 high 0 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
323 artifact.fetch complete 1 / 3 3 months ago
324 tool.cast_disasm complete 1 / 3 3 months ago
43635 analysis.bundle complete 1 / 3 2 weeks ago
43636 capability.graph complete 1 / 3 2 weeks ago
43637 detector.run complete 1 / 3 2 weeks ago
43638 validation.fork complete 1 / 3 2 weeks ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no
Implementation:
Verified Source: no

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate

No codex job recorded yet.

Opcode Heuristics

tool.cast_disasm
Delegatecall
0
Selfdestruct
1
CREATE2
0
CALL-family (heavy)
1
EXT*/BALANCE
0
Total opcodes
231
Flags
selfdestruct_present
View cast disassembly output
00000000: PUSH1 0x60
00000002: PUSH1 0x40
00000004: MSTORE
00000005: PUSH1 0x00
00000007: CALLDATALOAD
00000008: PUSH29 0x0100000000000000000000000000000000000000000000000000000000
00000026: SWAP1
00000027: DIV
00000028: DUP1
00000029: PUSH4 0x2e1a7d4d
0000002e: EQ
0000002f: PUSH2 0x004f
00000032: JUMPI
00000033: DUP1
00000034: PUSH4 0xa7f43779
00000039: EQ
0000003a: PUSH2 0x0062
0000003d: JUMPI
0000003e: DUP1
0000003f: PUSH4 0xd0e30db0
00000044: EQ
00000045: PUSH2 0x006f
00000048: JUMPI
00000049: PUSH2 0x004d
0000004c: JUMP
0000004d: JUMPDEST
0000004e: STOP
0000004f: JUMPDEST
00000050: PUSH2 0x0060
00000053: PUSH1 0x04
00000055: DUP1
00000056: CALLDATALOAD
00000057: SWAP1
00000058: PUSH1 0x20
0000005a: ADD
0000005b: POP
0000005c: PUSH2 0x00bb
0000005f: JUMP
00000060: JUMPDEST
00000061: STOP
00000062: JUMPDEST
00000063: PUSH2 0x006d
00000066: PUSH1 0x04
00000068: POP
00000069: PUSH2 0x0175
0000006c: JUMP
0000006d: JUMPDEST
0000006e: STOP
0000006f: JUMPDEST
00000070: PUSH2 0x007a
00000073: PUSH1 0x04
00000075: POP
00000076: PUSH2 0x007c
00000079: JUMP
0000007a: JUMPDEST
0000007b: STOP
0000007c: JUMPDEST
0000007d: CALLVALUE
0000007e: PUSH1 0x01
00000080: PUSH1 0x00
00000082: POP
00000083: PUSH1 0x00
00000085: CALLER
00000086: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000009b: AND
0000009c: DUP2
0000009d: MSTORE
0000009e: PUSH1 0x20
000000a0: ADD
000000a1: SWAP1
000000a2: DUP2
000000a3: MSTORE
000000a4: PUSH1 0x20
000000a6: ADD
000000a7: PUSH1 0x00
000000a9: KECCAK256
000000aa: PUSH1 0x00
000000ac: DUP3
000000ad: DUP3
000000ae: DUP3
000000af: POP
000000b0: SLOAD
000000b1: ADD
000000b2: SWAP3
000000b3: POP
000000b4: POP
000000b5: DUP2
000000b6: SWAP1
000000b7: SSTORE
000000b8: POP
000000b9: JUMPDEST
000000ba: JUMP
000000bb: JUMPDEST
000000bc: DUP1
000000bd: PUSH1 0x01
000000bf: PUSH1 0x00
000000c1: POP
000000c2: PUSH1 0x00
000000c4: CALLER
000000c5: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000000da: AND
000000db: DUP2
000000dc: MSTORE
000000dd: PUSH1 0x20
000000df: ADD
000000e0: SWAP1
000000e1: DUP2
000000e2: MSTORE
000000e3: PUSH1 0x20
000000e5: ADD
000000e6: PUSH1 0x00
000000e8: KECCAK256
000000e9: PUSH1 0x00
000000eb: POP
000000ec: SLOAD
000000ed: LT
000000ee: DUP1
000000ef: PUSH2 0x00f8
000000f2: JUMPI
000000f3: POP
000000f4: PUSH1 0x00
000000f6: DUP2
000000f7: EQ
000000f8: JUMPDEST
000000f9: ISZERO
000000fa: PUSH2 0x0102
000000fd: JUMPI
000000fe: PUSH2 0x0172
00000101: JUMP
00000102: JUMPDEST
00000103: DUP1
00000104: PUSH1 0x01
00000106: PUSH1 0x00
00000108: POP
00000109: PUSH1 0x00
0000010b: CALLER
0000010c: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000121: AND
00000122: DUP2
00000123: MSTORE
00000124: PUSH1 0x20
00000126: ADD
00000127: SWAP1
00000128: DUP2
00000129: MSTORE
0000012a: PUSH1 0x20
0000012c: ADD
0000012d: PUSH1 0x00
0000012f: KECCAK256
00000130: PUSH1 0x00
00000132: DUP3
00000133: DUP3
00000134: DUP3
00000135: POP
00000136: SLOAD
00000137: SUB
00000138: SWAP3
00000139: POP
0000013a: POP
0000013b: DUP2
0000013c: SWAP1
0000013d: SSTORE
0000013e: POP
0000013f: CALLER
00000140: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000155: AND
00000156: PUSH1 0x00
00000158: DUP3
00000159: PUSH1 0x40
0000015b: MLOAD
0000015c: DUP1
0000015d: SWAP1
0000015e: POP
0000015f: PUSH1 0x00
00000161: PUSH1 0x40
00000163: MLOAD
00000164: DUP1
00000165: DUP4
00000166: SUB
00000167: DUP2
00000168: DUP6
00000169: DUP9
0000016a: DUP9
0000016b: CALL
0000016c: SWAP4
0000016d: POP
0000016e: POP
0000016f: POP
00000170: POP
00000171: POP
00000172: JUMPDEST
00000173: POP
00000174: JUMP
00000175: JUMPDEST
00000176: PUSH1 0x00
00000178: PUSH1 0x00
0000017a: SWAP1
0000017b: SLOAD
0000017c: SWAP1
0000017d: PUSH2 0x0100
00000180: EXP
00000181: SWAP1
00000182: DIV
00000183: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000198: AND
00000199: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000001ae: AND
000001af: CALLER
000001b0: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000001c5: AND
000001c6: EQ
000001c7: ISZERO
000001c8: PUSH2 0x0206
000001cb: JUMPI
000001cc: PUSH1 0x00
000001ce: PUSH1 0x00
000001d0: SWAP1
000001d1: SLOAD
000001d2: SWAP1
000001d3: PUSH2 0x0100
000001d6: EXP
000001d7: SWAP1
000001d8: DIV
000001d9: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000001ee: AND
000001ef: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000204: AND
00000205: SELFDESTRUCT
00000206: JUMPDEST
00000207: JUMPDEST
00000208: JUMP
View stderr
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
medium other detector Untrusted CALL target/value reachable 45 no no
view
trace_id: 0x8141d9f5c8014042c2ef14aa1b76ad15e67d2e5afc72958fb886a4fb0515a770
call_targets: 0x6546b3b4d3be6bb26e32977061a2b1336619c5f4
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0x8141d9f5c8014042c2ef14aa1b76ad15e67d2e5afc72958fb886a4fb0515a770",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x6546b3b4d3be6bb26e32977061a2b1336619c5f4"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x2e1a7d4d",
            "selector": "0x2e1a7d4d",
            "calldata_variants": [
                "0x2e1a7d4d",
                "0x2e1a7d4d0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xa7f43779",
            "selector": "0xa7f43779",
            "calldata_variants": [
                "0xa7f43779",
                "0xa7f437790000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xd0e30db0",
            "selector": "0xd0e30db0",
            "calldata_variants": [
                "0xd0e30db0",
                "0xd0e30db00000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 363,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "call_count": 1,
    "guards_detected": [
        {
            "pc": 431,
            "type": "msg_sender_eq_const",
            "value": "0xffffffffffffffffffffffffffffffffffffffff"
        }
    ],
    "untrusted_call_count": 1
}
medium other detector ETH value transfer possible 40 no no
view
trace_id: 0x8141d9f5c8014042c2ef14aa1b76ad15e67d2e5afc72958fb886a4fb0515a770
call_targets: 0x6546b3b4d3be6bb26e32977061a2b1336619c5f4
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0x8141d9f5c8014042c2ef14aa1b76ad15e67d2e5afc72958fb886a4fb0515a770",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x6546b3b4d3be6bb26e32977061a2b1336619c5f4"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x2e1a7d4d",
            "selector": "0x2e1a7d4d",
            "calldata_variants": [
                "0x2e1a7d4d",
                "0x2e1a7d4d0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xa7f43779",
            "selector": "0xa7f43779",
            "calldata_variants": [
                "0xa7f43779",
                "0xa7f437790000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xd0e30db0",
            "selector": "0xd0e30db0",
            "calldata_variants": [
                "0xd0e30db0",
                "0xd0e30db00000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 363,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "eth_value_calls": 1,
    "guards_detected": [
        {
            "pc": 431,
            "type": "msg_sender_eq_const",
            "value": "0xffffffffffffffffffffffffffffffffffffffff"
        }
    ]
}
medium other detector SELFDESTRUCT reachable 45 no no
view
trace_id: 0x4cbf2a2b445d851f707a4ce4c12e8a651824728298e26d2b73563c02e19eea19
validation_json
{
    "sink": "SELFDESTRUCT",
    "errors": 0,
    "status": "unknown",
    "attempts": 6,
    "trace_id": "0x4cbf2a2b445d851f707a4ce4c12e8a651824728298e26d2b73563c02e19eea19",
    "confirmed": false,
    "trace_mode": "structLogs",
    "call_targets": null,
    "matched_probe": null,
    "target_varies": null,
    "classification": "no_sink"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x2e1a7d4d",
            "selector": "0x2e1a7d4d",
            "calldata_variants": [
                "0x2e1a7d4d",
                "0x2e1a7d4d0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xa7f43779",
            "selector": "0xa7f43779",
            "calldata_variants": [
                "0xa7f43779",
                "0xa7f437790000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xd0e30db0",
            "selector": "0xd0e30db0",
            "calldata_variants": [
                "0xd0e30db0",
                "0xd0e30db00000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "guards_detected": [
        {
            "pc": 431,
            "type": "msg_sender_eq_const",
            "value": "0xffffffffffffffffffffffffffffffffffffffff"
        }
    ],
    "selfdestruct_count": 1
}