019b3836-22d7-70d4-8f04-697b1924f6d7
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 363 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 364 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 43355 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 43356 | capability.graph | complete | 1 / 3 | 1 week ago |
| 43357 | detector.run | complete | 1 / 3 | 1 week ago |
| 43358 | validation.fork | complete | 1 / 3 | 1 week ago |
| 78221 | report.consolidate | complete | 1 / 6 | 1 week ago |
No slither job recorded yet.
{"no_findings":false,"summary":"The bytecode appears to implement a keyed registry with per-record owner checks, a 5 ETH payment threshold, reverse-name style storage, and one value-bearing external call. Two issues are meaningful from bytecode alone: the payable acquisition path fails open and can trap ETH on invalid attempts, and the 5 ETH payout path mutates storage before an unchecked external CALL, which can strand refunds if the recipient call fails. Selector/function names are inferred only from bytecode structure, so exact business semantics remain uncertain.","findings":[{"severity":"high","category":"other","title":"Payable acquisition path returns success on failed preconditions, trapping ETH","exploit_scenario":"The routine behind selector 0xae999ece appears to be a payable registration/acquisition path. It checks an owner-like slot at key+3, compares CALLVALUE against the embedded constant 0x4563918244f40000 (5 ether), and also checks a length-like value. If any check fails, execution jumps to the shared POP/JUMP return path instead of reverting. An attacker or malicious frontend can deliberately submit already-owned, oversized, or underfunded registrations; the transaction still succeeds and any ETH sent remains in the contract.","recommendation":"Make failed acquisition attempts revert. If the intended behavior is conditional acceptance, explicitly refund msg.value on rejection instead of returning success.","evidence":"At pc 0x091e-0x0956 the contract loads key+3, checks for zero, compares CALLVALUE to 0x4563918244f40000, and evaluates a length-like bound. Failure jumps to pc 0x06c5/0x06c3, which only unwinds the stack and returns to the dispatcher STOP path; there is no REVERT and no compensating transfer.","locations":["selector:0xae999ece","pc:0x091e","pc:0x0943","pc:0x0956","pc:0x06c5"]},{"severity":"medium","category":"other","title":"Unchecked 5 ETH external CALL after state mutation can strand refunds","exploit_scenario":"The owner-gated routine behind selector 0xb5754045 appears to clear or rewrite several storage fields for a record and then perform a 5 ETH CALL to a computed recipient. Because the CALL result is discarded, a reverting or non-payable recipient can make the transfer fail while the prior state changes remain committed. If this path is meant to release a deposit or settle a record, the caller can lose the right to retry the refund and the ether stays trapped in the contract.","recommendation":"Use a checked CALL and revert on failure, or switch to a pull-payment model where the recipient withdraws separately. If the state must change first, persist a claimable balance instead of assuming the transfer succeeded.","evidence":"In the 0x098a routine reached from selector 0xb5754045, storage is written at pc 0x09f8, 0x0a02, 0x0a09, and 0x0a16 before a value-bearing CALL at pc 0x0a37. The call embeds the same 5 ether constant 0x4563918244f40000, uses a computed target, and the return value is immediately POP'd rather than checked.","locations":["selector:0xb5754045","pc:0x09f8","pc:0x0a02","pc:0x0a09","pc:0x0a16","pc:0x0a37"]}]}
OpenAI Codex v0.118.0 (research preview)
--------
workdir: /tmp/codex-i34svh9b
model: gpt-5.4
provider: openai
approval: never
sandbox: read-only
reasoning effort: high
reasoning summaries: none
session id: 019d5a72-a109-74a2-b710-6f8c6a8f9c47
--------
user
You are a security auditor. You ONLY have runtime bytecode + analysis artifacts.
You MUST read `BYTECODE_BUNDLE.json` before concluding; it contains the bytecode summary,
evidence bundle, callsites, storage slots, and detector findings.
Special cases when reasoning from bytecode (be explicit about uncertainty):
- Selector inference is best-effort; missing selectors are common.
- Fallback/receive paths may be the only entrypoints.
- CALL vs DELEGATECALL semantics differ; DELEGATECALL executes in caller storage.
- Proxy patterns (EIP-1967, minimal proxies, beacon) change which storage is authoritative.
- Storage slots are raw; mappings/arrays appear via keccak patterns, names are unknown.
- Guard detection is heuristic; absence of guards does NOT mean unguarded.
- Returndata checking is unknown unless explicitly shown in evidence.
- Precompiles (0x1..0x9) and common ERC20 transfer selectors may appear; do not over-claim.
Output MUST be valid JSON matching the provided schema.
- If you find nothing meaningful: set no_findings=true and findings=[].
- Otherwise: set no_findings=false and include findings with severity/category/title.
- Locations can be pc references like "pc:0x123" or selectors like "selector:0xa9059cbb".
Focus on: reentrancy, access control, upgradeability/proxy issues, signature validation,
accounting/invariant breaks, dangerous delegatecall, and untrusted external calls.
Be conservative: if evidence is weak, mark severity low/medium and explain why.
warning: Codex could not find system bubblewrap on PATH. Please install bubblewrap with your package manager. Codex will use the vendored bubblewrap in the meantime.
→ Inspect BYTECODE_BUNDLE.json and supporting artifacts to understand the contract architecture and evidence
• Evaluate potential security issues from bytecode-level evidence, focusing on requested categories
• Produce JSON report matching the required schema
exec
/bin/bash -lc pwd in /tmp/codex-i34svh9b
succeeded in 0ms:
/tmp/codex-i34svh9b
exec
/bin/bash -lc 'rg --files' in /tmp/codex-i34svh9b
succeeded in 0ms:
BYTECODE_BUNDLE.json
codex-output-schema.json
exec
/bin/bash -lc "sed -n '1,260p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
succeeded in 0ms:
{
"analysis_artifact": {
"address": "0x0e5e2b9341341ade98f510ad9a744e01f3b29f03",
"artifact_hash": "0xab671457d7f2c62e8a7f2129a7e1e2307acf47bc35ed289029289e3f547a7c18",
"artifact_json": {
"auth": {
"guards": []
},
"basic_blocks": [
{
"end_pc": 10,
"hash": "0x44b9496415b5809b15099b83c849935ad9891afc24dcc2240de0222f3d58d087",
"opcodes": [
"PUSH1",
"PUSH1",
"MSTORE",
"CALLDATASIZE",
"ISZERO",
"PUSH2",
"JUMPI"
],
"start_pc": 0
},
{
"end_pc": 30,
"hash": "0x0b87532a62385629a76fb3bcff5334263664d35f49f5e8e6aed3d378c36828ba",
"opcodes": [
"PUSH1",
"PUSH1",
"EXP",
"PUSH1",
"CALLDATALOAD",
"DIV",
"PUSH4",
"OP_81",
"EQ",
"PUSH2",
"JUMPI"
],
"start_pc": 11
},
{
"end_pc": 41,
"hash": "0x56843a24cfbcf172a710eb9b3da451f5d016f02966562b2da10bc3a13746606f",
"opcodes": [
"OP_80",
"PUSH4",
"EQ",
"PUSH2",
"JUMPI"
],
"start_pc": 31
},
{
"end_pc": 52,
"hash": "0x059538b22bbd02a446d49b6d27b83626ab97b7bfaa381d4af2c4799921cd9ea9",
"opcodes": [
"OP_80",
"PUSH4",
"EQ",
"PUSH2",
"JUMPI"
],
"start_pc": 42
},
{
"end_pc": 63,
"hash": "0x0dacc07d92d3a11bb86231bc9e0dac212999ca45a733e86190f6dd2718b0665f",
"opcodes": [
"OP_80",
"PUSH4",
"EQ",
"PUSH2",
"JUMPI"
],
"start_pc": 53
},
{
"end_pc": 74,
"hash": "0x523c13ccb04754d987451d49a8296345ef52e11eee8157d592b21cbbff73420a",
"opcodes": [
"OP_80",
"PUSH4",
"EQ",
"PUSH2",
"JUMPI"
],
"start_pc": 64
},
{
"end_pc": 85,
"hash": "0x190aeb7c03d7f97920022a96f7fdc921596a18da866dd429fa5954780ed8268a",
"opcodes": [
"OP_80",
"PUSH4",
"EQ",
"PUSH2",
"JUMPI"
],
"start_pc": 75
},
{
"end_pc": 96,
"hash": "0x958c157ccd8d1f5c97de8512100943774c06dcd761041b91b77dcaecb8bf98ad",
"opcodes": [
"OP_80",
"PUSH4",
"EQ",
"PUSH2",
"JUMPI"
],
"start_pc": 86
},
{
"end_pc": 107,
"hash": "0x439821237a16b00442a86433c8c91b9b69a6ea2f5a90751460c02036835e4afa",
"opcodes": [
"OP_80",
"PUSH4",
"EQ",
"PUSH2",
"JUMPI"
],
"start_pc": 97
},
{
"end_pc": 118,
"hash": "0xe8ce482e35cf9de104fbc681a40258c7da2861d618328adcce741fbc0a7b3c59",
"opcodes": [
"OP_80",
"PUSH4",
"EQ",
"PUSH2",
"JUMPI"
],
"start_pc": 108
},
{
"end_pc": 129,
"hash": "0x451d8df5efaf3d211f01b13a7e2e1c7691e8303b5662b77d05147c5c0996f399",
"opcodes": [
"OP_80",
"PUSH4",
"EQ",
"PUSH2",
"JUMPI"
],
"start_pc": 119
},
{
"end_pc": 140,
"hash": "0x617abeba635433e794db39310bcd1b93105490c336a3d028759beeb08d8b9033",
"opcodes": [
"OP_80",
"PUSH4",
"EQ",
"PUSH2",
"JUMPI"
],
"start_pc": 130
},
{
"end_pc": 151,
"hash": "0x3c1b0a8bc6cd2e3e1fe603408fe52c9bedf3235fb7563e8299d502f87d29002a",
"opcodes": [
"OP_80",
"PUSH4",
"EQ",
"PUSH2",
"JUMPI"
],
"start_pc": 141
},
{
"end_pc": 162,
"hash": "0xeb63698be90c4dbc58f6e33e6f16de473f76f6b38ac6479776289b236c1375de",
"opcodes": [
"OP_80",
"PUSH4",
"EQ",
"PUSH2",
"JUMPI"
],
"start_pc": 152
},
{
"end_pc": 164,
"hash": "0xd80b4574c7824875825a613ae53ec96b009aff7eec435ac8917ac4b672d18ea2",
"opcodes": [
"JUMPDEST",
"STOP"
],
"start_pc": 163
},
{
"end_pc": 213,
"hash": "0x65597272b5bf2296810b55ec6e832723f81977bff597af3790e35b1223be8916",
"opcodes": [
"JUMPDEST",
"PUSH2",
"PUSH1",
"CALLDATALOAD",
"PUSH1",
"OP_80",
"MLOAD",
"PUSH1",
"OP_81",
"ADD",
"OP_90",
"OP_91",
"MSTORE",
"PUSH1",
"OP_81",
"MSTORE",
"PUSH1",
"PUSH1",
"EXP",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"OP_83",
"AND",
"PUSH1",
"PUSH1",
"EXP",
"OP_81",
"LT",
"ISZERO",
"PUSH2",
"JUMPI"
],
"start_pc": 165
},
{
"end_pc": 275,
"hash": "0xd4c02429791ba15ce6ad913c96dc6c5331c3a963e02563b126f1bb48fff914b0",
"opcodes": [
"ADD",
"OP_80",
"SLOAD",
"PUSH1",
"OP_80",
"MLOAD",
"PUSH1",
"PUSH1",
"PUSH1",
"OP_85",
"AND",
"ISZERO",
"PUSH2",
"MUL",
"PUSH1",
"NOT",
"ADD",
"OP_90",
"OP_94",
"AND",
"OP_93",
exec
/bin/bash -lc "sed -n '261,520p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
succeeded in 0ms:
"OP_90",
"OP_93",
"DIV",
"PUSH1",
"OP_81",
"ADD",
"OP_84",
"OP_90",
"DIV",
"OP_84",
"MUL",
"OP_82",
"ADD",
"OP_84",
"ADD",
"OP_90",
"OP_92",
"MSTORE",
"OP_81",
"OP_81",
"MSTORE",
"OP_92",
"OP_91",
"OP_83",
"ADD",
"OP_82",
"OP_82",
"OP_80",
"ISZERO",
"PUSH2",
"JUMPI"
],
"start_pc": 214
},
{
"end_pc": 283,
"hash": "0xde9d4c24cbc6ab93adbfa7ba85fdbbb112b74639278492201c72d3d3c8599419",
"opcodes": [
"OP_80",
"PUSH1",
"LT",
"PUSH2",
"JUMPI"
],
"start_pc": 276
},
{
"end_pc": 302,
"hash": "0x40aa599523fba9053d55c921f003267e78ffce7e028fdd07195f19765f50fcf4",
"opcodes": [
"PUSH2",
"OP_80",
"OP_83",
"SLOAD",
"DIV",
"MUL",
"OP_83",
"MSTORE",
"OP_91",
"PUSH1",
"ADD",
"OP_91",
"PUSH2",
"JUMP"
],
"start_pc": 284
},
{
"end_pc": 394,
"hash": "0x810dbcc6786920c155ab801be98b78307ffea8e7257b2f78edf1022f80608122",
"opcodes": [
"JUMPDEST",
"PUSH2",
"PUSH1",
"OP_80",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_90",
"OP_82",
"ADD",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_91",
"OP_91",
"OP_90",
"OP_80",
"OP_80",
"PUSH1",
"ADD",
"PUSH1",
"OP_80",
"OP_91",
"DIV",
"MUL",
"PUSH1",
"ADD",
"PUSH1",
"MLOAD",
"OP_90",
"OP_81",
"ADD",
"PUSH1",
"MSTORE",
"OP_80",
"OP_93",
"OP_92",
"OP_91",
"OP_90",
"OP_81",
"OP_81",
"MSTORE",
"PUSH1",
"ADD",
"OP_83",
"OP_83",
"OP_80",
"OP_82",
"OP_84",
"CALLDATACOPY",
"POP",
"OP_94",
"OP_96",
"POP",
"POP",
"OP_93",
"CALLDATALOAD",
"OP_93",
"POP",
"POP",
"POP",
"POP",
"OP_81",
"CALLER",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"AND",
"PUSH2",
"OP_82"
],
"start_pc": 303
},
{
"end_pc": 469,
"hash": "0x7136678124d560fefd69881d15dc5d174958fa56a052a071a63ba415c4e9892b",
"opcodes": [
"JUMPDEST",
"PUSH1",
"PUSH1",
"PUSH1",
"POP",
"PUSH1",
"OP_83",
"PUSH1",
"MLOAD",
"OP_80",
"OP_82",
"OP_80",
"MLOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_90",
"OP_80",
"OP_83",
"OP_83",
"OP_82",
"OP_90",
"PUSH1",
"PUSH1",
"PUSH1",
"OP_84",
"PUSH1",
"ADD",
"DIV",
"PUSH1",
"MUL",
"PUSH1",
"ADD",
"CALL",
"POP",
"OP_90",
"OP_91",
"ADD",
"OP_82",
"OP_90",
"SUB",
"OP_90",
"OP_91",
"SHA3",
"OP_92",
"OP_90",
"OP_92",
"DIV",
"OP_91",
"POP",
"POP",
"PUSH1",
"PUSH1",
"EXP",
"OP_81",
"LT",
"ISZERO",
"PUSH2",
"JUMPI"
],
"start_pc": 395
},
{
"end_pc": 480,
"hash": "0x3016c5ec3a01cae8750be7154915913e6f5cc88f8c204ba173fdad43342ae7bd",
"opcodes": [
"PUSH1",
"MUL",
"OP_90",
"POP",
"OP_90",
"POP",
"PUSH2",
"JUMP"
],
"start_pc": 470
},
{
"end_pc": 576,
"hash": "0xfd8f4d8468fcddaaf00f5186688063bab493e09b47db99e18d8b7523d4493ce0",
"opcodes": [
"JUMPDEST",
"PUSH2",
"PUSH1",
"OP_80",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_90",
"OP_82",
"ADD",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_91",
"OP_91",
"OP_90",
"OP_80",
"OP_80",
"PUSH1",
"ADD",
"PUSH1",
exec
/bin/bash -lc "sed -n '521,780p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
succeeded in 0ms:
"OP_80",
"OP_91",
"DIV",
"MUL",
"PUSH1",
"ADD",
"PUSH1",
"MLOAD",
"OP_90",
"OP_81",
"ADD",
"PUSH1",
"MSTORE",
"OP_80",
"OP_93",
"OP_92",
"OP_91",
"OP_90",
"OP_81",
"OP_81",
"MSTORE",
"PUSH1",
"ADD",
"OP_83",
"OP_83",
"OP_80",
"OP_82",
"OP_84",
"CALLDATACOPY",
"POP",
"OP_94",
"OP_96",
"POP",
"POP",
"OP_93",
"CALLDATALOAD",
"OP_93",
"POP",
"POP",
"POP",
"POP",
"OP_81",
"CALLER",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"AND",
"PUSH2",
"OP_82",
"PUSH2",
"JUMP"
],
"start_pc": 481
},
{
"end_pc": 661,
"hash": "0xd27ffb61ba973d559f9dccc2caae1aafa5e2abe8c4f3cd2992fb8b0ed2b22c49",
"opcodes": [
"JUMPDEST",
"PUSH2",
"PUSH1",
"OP_80",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_90",
"OP_82",
"ADD",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_91",
"OP_91",
"OP_90",
"OP_80",
"OP_80",
"PUSH1",
"ADD",
"PUSH1",
"OP_80",
"OP_91",
"DIV",
"MUL",
"PUSH1",
"ADD",
"PUSH1",
"MLOAD",
"OP_90",
"OP_81",
"ADD",
"PUSH1",
"MSTORE",
"OP_80",
"OP_93",
"OP_92",
"OP_91",
"OP_90",
"OP_81",
"OP_81",
"MSTORE",
"PUSH1",
"ADD",
"OP_83",
"OP_83",
"OP_80",
"OP_82",
"OP_84",
"CALLDATACOPY",
"POP",
"OP_94",
"OP_96",
"POP",
"POP",
"POP",
"POP",
"POP",
"POP",
"POP",
"PUSH1",
"PUSH2",
"OP_82",
"PUSH2",
"JUMP"
],
"start_pc": 577
},
{
"end_pc": 746,
"hash": "0xdc62c41b0f53c62a687be38bf51945188732bc9bc50b7c18ef5c96d7b8d4fd7f",
"opcodes": [
"JUMPDEST",
"PUSH2",
"PUSH1",
"OP_80",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_90",
"OP_82",
"ADD",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_91",
"OP_91",
"OP_90",
"OP_80",
"OP_80",
"PUSH1",
"ADD",
"PUSH1",
"OP_80",
"OP_91",
"DIV",
"MUL",
"PUSH1",
"ADD",
"PUSH1",
"MLOAD",
"OP_90",
"OP_81",
"ADD",
"PUSH1",
"MSTORE",
"OP_80",
"OP_93",
"OP_92",
"OP_91",
"OP_90",
"OP_81",
"OP_81",
"MSTORE",
"PUSH1",
"ADD",
"OP_83",
"OP_83",
"OP_80",
"OP_82",
"OP_84",
"CALLDATACOPY",
"POP",
"OP_94",
"OP_96",
"POP",
"POP",
"POP",
"POP",
"POP",
"POP",
"POP",
"PUSH1",
"PUSH2",
"OP_82",
"PUSH2",
"JUMP"
],
"start_pc": 662
},
{
"end_pc": 831,
"hash": "0x1bbb9f186e1f80d7523ab6e7c86c5aeed9a6411e2e3c346ed8a435d7405822f9",
"opcodes": [
"JUMPDEST",
"PUSH2",
"PUSH1",
"OP_80",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_90",
"OP_82",
"ADD",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_91",
"OP_91",
"OP_90",
"OP_80",
"OP_80",
"PUSH1",
"ADD",
"PUSH1",
"OP_80",
"OP_91",
"DIV",
"MUL",
"PUSH1",
"ADD",
"PUSH1",
"MLOAD",
"OP_90",
"OP_81",
"ADD",
"PUSH1",
"MSTORE",
"OP_80",
"OP_93",
"OP_92",
"OP_91",
"OP_90",
"OP_81",
"OP_81",
"MSTORE",
"PUSH1",
"ADD",
exec
/bin/bash -lc "sed -n '781,1040p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
succeeded in 0ms:
"OP_83",
"OP_83",
"OP_80",
"OP_82",
"OP_84",
"CALLDATACOPY",
"POP",
"OP_94",
"OP_96",
"POP",
"POP",
"POP",
"POP",
"POP",
"POP",
"POP",
"PUSH1",
"PUSH2",
"OP_82",
"PUSH2",
"JUMP"
],
"start_pc": 747
},
{
"end_pc": 927,
"hash": "0x315e87d68d17e16adc47ac113c75daf38e6a3a71549e013d57043d0b0b682fe9",
"opcodes": [
"JUMPDEST",
"PUSH2",
"PUSH1",
"OP_80",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_90",
"OP_82",
"ADD",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_91",
"OP_91",
"OP_90",
"OP_80",
"OP_80",
"PUSH1",
"ADD",
"PUSH1",
"OP_80",
"OP_91",
"DIV",
"MUL",
"PUSH1",
"ADD",
"PUSH1",
"MLOAD",
"OP_90",
"OP_81",
"ADD",
"PUSH1",
"MSTORE",
"OP_80",
"OP_93",
"OP_92",
"OP_91",
"OP_90",
"OP_81",
"OP_81",
"MSTORE",
"PUSH1",
"ADD",
"OP_83",
"OP_83",
"OP_80",
"OP_82",
"OP_84",
"CALLDATACOPY",
"POP",
"OP_94",
"OP_96",
"POP",
"POP",
"OP_93",
"CALLDATALOAD",
"OP_93",
"POP",
"POP",
"POP",
"POP",
"OP_81",
"CALLER",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"AND",
"PUSH2",
"OP_82",
"PUSH2",
"JUMP"
],
"start_pc": 832
},
{
"end_pc": 1020,
"hash": "0xdc9744506a95f4a7fcde8b27158b83f937ec9f88420edefeed80105617522a02",
"opcodes": [
"JUMPDEST",
"PUSH2",
"PUSH1",
"OP_80",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_90",
"OP_82",
"ADD",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_91",
"OP_91",
"OP_90",
"OP_80",
"OP_80",
"PUSH1",
"ADD",
"PUSH1",
"OP_80",
"OP_91",
"DIV",
"MUL",
"PUSH1",
"ADD",
"PUSH1",
"MLOAD",
"OP_90",
"OP_81",
"ADD",
"PUSH1",
"MSTORE",
"OP_80",
"OP_93",
"OP_92",
"OP_91",
"OP_90",
"OP_81",
"OP_81",
"MSTORE",
"PUSH1",
"ADD",
"OP_83",
"OP_83",
"OP_80",
"OP_82",
"OP_84",
"CALLDATACOPY",
"POP",
"OP_94",
"OP_96",
"POP",
"POP",
"POP",
"POP",
"POP",
"POP",
"POP",
"CALLER",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"AND",
"PUSH2",
"OP_82",
"PUSH2",
"JUMP"
],
"start_pc": 928
},
{
"end_pc": 1116,
"hash": "0x4404bcee10e689bd455371e02633d8f381cabad8c35aebc84454f8895e8f3061",
"opcodes": [
"JUMPDEST",
"PUSH2",
"PUSH1",
"OP_80",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_90",
"OP_82",
"ADD",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_91",
"OP_91",
"OP_90",
"OP_80",
"OP_80",
"PUSH1",
"ADD",
"PUSH1",
"OP_80",
"OP_91",
"DIV",
"MUL",
"PUSH1",
"ADD",
"PUSH1",
"MLOAD",
"OP_90",
"OP_81",
"ADD",
"PUSH1",
"MSTORE",
"OP_80",
"OP_93",
"OP_92",
"OP_91",
"OP_90",
"OP_81",
"OP_81",
"MSTORE",
"PUSH1",
"ADD",
"OP_83",
"OP_83",
"OP_80",
"OP_82",
"OP_84",
"CALLDATACOPY",
"POP",
"OP_94",
"OP_96",
"POP",
"POP",
"OP_93",
"CALLDATALOAD",
"OP_93",
"POP",
"POP",
"POP",
exec
/bin/bash -lc "sed -n '1041,1300p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
succeeded in 0ms:
"POP",
"OP_81",
"CALLER",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"AND",
"PUSH2",
"OP_82",
"PUSH2",
"JUMP"
],
"start_pc": 1021
},
{
"end_pc": 1201,
"hash": "0x0f0bdd29e9205e8d06fb592a78525d7eff2d8ced609ce62a885dad46c227b33e",
"opcodes": [
"JUMPDEST",
"PUSH2",
"PUSH1",
"OP_80",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_90",
"OP_82",
"ADD",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_91",
"OP_91",
"OP_90",
"OP_80",
"OP_80",
"PUSH1",
"ADD",
"PUSH1",
"OP_80",
"OP_91",
"DIV",
"MUL",
"PUSH1",
"ADD",
"PUSH1",
"MLOAD",
"OP_90",
"OP_81",
"ADD",
"PUSH1",
"MSTORE",
"OP_80",
"OP_93",
"OP_92",
"OP_91",
"OP_90",
"OP_81",
"OP_81",
"MSTORE",
"PUSH1",
"ADD",
"OP_83",
"OP_83",
"OP_80",
"OP_82",
"OP_84",
"CALLDATACOPY",
"POP",
"OP_94",
"OP_96",
"POP",
"POP",
"POP",
"POP",
"POP",
"POP",
"POP",
"PUSH1",
"PUSH2",
"OP_82",
"PUSH2",
"JUMP"
],
"start_pc": 1117
},
{
"end_pc": 1286,
"hash": "0x55449b08b04d50dfb779a97ea506d16a01c22caebd8f033dcb6338d729247c8a",
"opcodes": [
"JUMPDEST",
"PUSH2",
"PUSH1",
"OP_80",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_90",
"OP_82",
"ADD",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_91",
"OP_91",
"OP_90",
"OP_80",
"OP_80",
"PUSH1",
"ADD",
"PUSH1",
"OP_80",
"OP_91",
"DIV",
"MUL",
"PUSH1",
"ADD",
"PUSH1",
"MLOAD",
"OP_90",
"OP_81",
"ADD",
"PUSH1",
"MSTORE",
"OP_80",
"OP_93",
"OP_92",
"OP_91",
"OP_90",
"OP_81",
"OP_81",
"MSTORE",
"PUSH1",
"ADD",
"OP_83",
"OP_83",
"OP_80",
"OP_82",
"OP_84",
"CALLDATACOPY",
"POP",
"OP_94",
"OP_96",
"POP",
"POP",
"POP",
"POP",
"POP",
"POP",
"POP",
"PUSH1",
"PUSH2",
"OP_82",
"PUSH2",
"JUMP"
],
"start_pc": 1202
},
{
"end_pc": 1379,
"hash": "0x4700dc329fafff0bc6f70a3dc72bd3680d2137e5826ef887a8f66a7fd5086c9d",
"opcodes": [
"JUMPDEST",
"PUSH2",
"PUSH1",
"OP_80",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_90",
"OP_82",
"ADD",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_91",
"OP_91",
"OP_90",
"OP_80",
"OP_80",
"PUSH1",
"ADD",
"PUSH1",
"OP_80",
"OP_91",
"DIV",
"MUL",
"PUSH1",
"ADD",
"PUSH1",
"MLOAD",
"OP_90",
"OP_81",
"ADD",
"PUSH1",
"MSTORE",
"OP_80",
"OP_93",
"OP_92",
"OP_91",
"OP_90",
"OP_81",
"OP_81",
"MSTORE",
"PUSH1",
"ADD",
"OP_83",
"OP_83",
"OP_80",
"OP_82",
"OP_84",
"CALLDATACOPY",
"POP",
"OP_94",
"OP_96",
"POP",
"POP",
"POP",
"POP",
"POP",
"POP",
"POP",
"PUSH1",
"PUSH1",
"PUSH1",
"PUSH1",
"PUSH1",
"PUSH2",
"OP_86",
"PUSH2",
"JUMP"
],
"start_pc": 1287
},
{
"end_pc": 1475,
"hash": "0xe67f76d2f3fcfed5fe80312ee16b86840468423343109bfc8655a11d34a4df9b",
"opcodes": [
"JUMPDEST",
"PUSH2",
"PUSH1",
"OP_80",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
exec
/bin/bash -lc "sed -n '1301,1560p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
succeeded in 0ms:
"ADD",
"OP_90",
"OP_82",
"ADD",
"OP_80",
"CALLDATALOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_91",
"OP_91",
"OP_90",
"OP_80",
"OP_80",
"PUSH1",
"ADD",
"PUSH1",
"OP_80",
"OP_91",
"DIV",
"MUL",
"PUSH1",
"ADD",
"PUSH1",
"MLOAD",
"OP_90",
"OP_81",
"ADD",
"PUSH1",
"MSTORE",
"OP_80",
"OP_93",
"OP_92",
"OP_91",
"OP_90",
"OP_81",
"OP_81",
"MSTORE",
"PUSH1",
"ADD",
"OP_83",
"OP_83",
"OP_80",
"OP_82",
"OP_84",
"CALLDATACOPY",
"POP",
"OP_94",
"OP_96",
"POP",
"POP",
"OP_93",
"CALLDATALOAD",
"OP_93",
"POP",
"POP",
"POP",
"POP",
"OP_81",
"CALLER",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"AND",
"PUSH2",
"OP_82",
"PUSH2",
"JUMP"
],
"start_pc": 1380
},
{
"end_pc": 1546,
"hash": "0x9bd7a67223d32a93314976f541c1c87dc40b843d7a8257be282f991dacf41773",
"opcodes": [
"JUMPDEST",
"PUSH1",
"MLOAD",
"OP_80",
"OP_80",
"PUSH1",
"ADD",
"OP_82",
"OP_81",
"SUB",
"OP_82",
"MSTORE",
"OP_83",
"OP_81",
"OP_81",
"MLOAD",
"OP_81",
"MSTORE",
"PUSH1",
"ADD",
"OP_91",
"POP",
"OP_80",
"MLOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_90",
"OP_80",
"OP_83",
"OP_83",
"OP_82",
"OP_90",
"PUSH1",
"PUSH1",
"PUSH1",
"OP_84",
"PUSH1",
"ADD",
"DIV",
"PUSH1",
"MUL",
"PUSH1",
"ADD",
"CALL",
"POP",
"OP_90",
"POP",
"OP_90",
"OP_81",
"ADD",
"OP_90",
"PUSH1",
"AND",
"OP_80",
"ISZERO",
"PUSH2",
"JUMPI"
],
"start_pc": 1476
},
{
"end_pc": 1571,
"hash": "0x51d9d829c9d21c4fd80459e7b646f6c1ebed60daa83c83a67ff2398ab051eb7c",
"opcodes": [
"OP_80",
"OP_82",
"SUB",
"OP_80",
"MLOAD",
"PUSH1",
"OP_83",
"PUSH1",
"SUB",
"PUSH2",
"EXP",
"SUB",
"NOT",
"AND",
"OP_81",
"MSTORE",
"PUSH1",
"ADD",
"OP_91",
"POP"
],
"start_pc": 1547
},
{
"end_pc": 1585,
"hash": "0xa18bc431fa5567633a272ad933ca3f56085b598aaa5e436f43473e02404d780c",
"opcodes": [
"JUMPDEST",
"POP",
"OP_92",
"POP",
"POP",
"POP",
"PUSH1",
"MLOAD",
"OP_80",
"OP_91",
"SUB",
"OP_90",
"RETURN"
],
"start_pc": 1572
},
{
"end_pc": 1614,
"hash": "0x095fceb81117169d2ade9eb96a2ea9e3c188a7b48f57c2fd6e28444258283cec",
"opcodes": [
"JUMPDEST",
"PUSH1",
"OP_80",
"MLOAD",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"OP_92",
"OP_90",
"OP_92",
"AND",
"OP_82",
"MSTORE",
"MLOAD",
"OP_90",
"OP_81",
"OP_90",
"SUB",
"PUSH1",
"ADD",
"OP_90",
"RETURN"
],
"start_pc": 1586
},
{
"end_pc": 1632,
"hash": "0xfd30ef1e3f62579f5b2013ae858c815a9a43476c1f6e6850db8c2e3dba55bc8a",
"opcodes": [
"JUMPDEST",
"PUSH1",
"OP_80",
"MLOAD",
"OP_91",
"OP_82",
"MSTORE",
"MLOAD",
"OP_90",
"OP_81",
"OP_90",
"SUB",
"PUSH1",
"ADD",
"OP_90",
"RETURN"
],
"start_pc": 1615
},
{
"end_pc": 1684,
"hash": "0x675280c2a5ebf290cf4db78d3f1c9beebf76be569cedda5303651a4eb142214c",
"opcodes": [
"JUMPDEST",
"PUSH1",
"OP_80",
"MLOAD",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"OP_95",
"OP_86",
"AND",
"OP_81",
"MSTORE",
"OP_93",
"OP_85",
"AND",
exec
/bin/bash -lc "sed -n '1561,1820p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
succeeded in 0ms:
"PUSH1",
"OP_85",
"ADD",
"MSTORE",
"OP_83",
"OP_81",
"ADD",
"OP_92",
"OP_90",
"OP_92",
"MSTORE",
"OP_90",
"OP_92",
"AND",
"PUSH1",
"OP_82",
"ADD",
"MSTORE",
"OP_90",
"MLOAD",
"OP_90",
"OP_81",
"OP_90",
"SUB",
"PUSH1",
"ADD",
"OP_90",
"RETURN"
],
"start_pc": 1633
},
{
"end_pc": 1730,
"hash": "0x1b6ea00474dafd843430dbc30fa5dd95cd708425754bb4b64bda8fa743a8b77e",
"opcodes": [
"JUMPDEST",
"PUSH1",
"ADD",
"OP_80",
"SLOAD",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"NOT",
"AND",
"OP_90",
"OP_91",
"OR",
"OP_90",
"SSTORE",
"PUSH1",
"MLOAD",
"OP_83",
"OP_90",
"PUSH1",
"OP_80",
"MLOAD",
"PUSH1",
"PUSH2",
"OP_83",
"CODECOPY",
"OP_81",
"MLOAD",
"OP_91",
"MSTORE",
"OP_90",
"PUSH1",
"OP_90",
"OP_A2"
],
"start_pc": 1685
},
{
"end_pc": 1732,
"hash": "0x3cb9f038c01a626984d69d67acdbcdd8262079cb12f3b138de8e0cff581962a7",
"opcodes": [
"JUMPDEST",
"POP"
],
"start_pc": 1731
},
{
"end_pc": 1736,
"hash": "0xa06d5219dd3292f91e3edd455dc495c81e1591e7d7430005e5f88d46d38d7716",
"opcodes": [
"JUMPDEST",
"POP",
"POP",
"JUMP"
],
"start_pc": 1733
},
{
"end_pc": 1756,
"hash": "0x65d95aad2589b86a0b3e889106b340dde00a6251d3031ccbfc3adb55e2646e50",
"opcodes": [
"JUMPDEST",
"PUSH1",
"ADD",
"SLOAD",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"AND",
"EQ",
"ISZERO",
"PUSH2",
"JUMPI"
],
"start_pc": 1737
},
{
"end_pc": 1765,
"hash": "0xd03ba9efc4a348eaac4d8fa6217f211b964d4bbb0d5cc854d65401c5f1669416",
"opcodes": [
"OP_81",
"PUSH2",
"OP_84",
"PUSH2",
"JUMP"
],
"start_pc": 1757
},
{
"end_pc": 1785,
"hash": "0x1a7d89a6d920165d672d21e04ecc5b6a38a2e1286d09820560ac1252ddb792a5",
"opcodes": [
"JUMPDEST",
"PUSH1",
"ADD",
"SLOAD",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"AND",
"EQ",
"ISZERO",
"PUSH2",
"JUMPI"
],
"start_pc": 1766
},
{
"end_pc": 1794,
"hash": "0x3045006ee924fae881169945500770c1d4a9dccfd176e6beff60d4733c3c8081",
"opcodes": [
"OP_81",
"PUSH2",
"OP_84",
"PUSH2",
"JUMP"
],
"start_pc": 1786
},
{
"end_pc": 1841,
"hash": "0xadb7d77c92a0f7e6e9e6827f2e978c19a0e30cc08b6db61398756a43cbcb58eb",
"opcodes": [
"JUMPDEST",
"OP_80",
"SLOAD",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"NOT",
"AND",
"OP_90",
"OP_91",
"OR",
"OP_90",
"SSTORE",
"PUSH1",
"MLOAD",
"OP_83",
"OP_90",
"PUSH1",
"OP_80",
"MLOAD",
"PUSH1",
"PUSH2",
"OP_83",
"CODECOPY",
"OP_81",
"MLOAD",
"OP_91",
"MSTORE",
"OP_90",
"PUSH1",
"OP_90",
"OP_A2",
"POP",
"POP",
"POP",
"JUMP"
],
"start_pc": 1795
},
{
"end_pc": 1888,
"hash": "0xda59a95bebcd296e50f90739315e5e84b17cf03ac1440004f64a905d58e5fbe1",
"opcodes": [
"JUMPDEST",
"PUSH1",
"OP_81",
"ADD",
"SLOAD",
"OP_81",
"SLOAD",
"PUSH1",
"OP_83",
"ADD",
"SLOAD",
"PUSH1",
"OP_93",
"OP_90",
"OP_93",
"ADD",
"SLOAD",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"OP_91",
"OP_82",
"AND",
"OP_9A",
"OP_93",
"OP_82",
"AND",
"OP_99",
"POP",
"OP_97",
"POP",
"AND",
"OP_94",
"POP",
"OP_92",
"POP",
"POP",
"POP",
"JUMP"
],
"start_pc": 1842
},
{
"end_pc": 1901,
"hash": "0xcfa9f1aa385e680bc9413d59fe1c38c67d53ac2dcab74fcd238a52feb29dabd2",
"opcodes": [
"JUMPDEST",
"SLOAD",
"PUSH1",
exec
/bin/bash -lc "sed -n '1821,2080p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
succeeded in 0ms:
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"AND",
"OP_90",
"POP"
],
"start_pc": 1889
},
{
"end_pc": 1906,
"hash": "0x31fc0b69d5834091bd1eb2d6a79251e180e7bfdea4f8a5df88bdb8ce677db679",
"opcodes": [
"JUMPDEST",
"OP_91",
"OP_90",
"POP",
"JUMP"
],
"start_pc": 1902
},
{
"end_pc": 1926,
"hash": "0xac0ee87018d83cba1de6909f148970b0accb29ecd956580fa9bec77961fed932",
"opcodes": [
"JUMPDEST",
"PUSH1",
"ADD",
"SLOAD",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"AND",
"OP_90",
"POP",
"PUSH2",
"JUMP"
],
"start_pc": 1907
},
{
"end_pc": 1937,
"hash": "0x51c59fc089520141aeacb33357bd913d25392268b29f7c33b813ada6df97c7a6",
"opcodes": [
"JUMPDEST",
"PUSH1",
"ADD",
"SLOAD",
"OP_90",
"POP",
"PUSH2",
"JUMP"
],
"start_pc": 1927
},
{
"end_pc": 1957,
"hash": "0xf78fc57b9ee72fb4b53485393e26c23d654892e9cacef7b75c06b2ec8c9261ba",
"opcodes": [
"JUMPDEST",
"PUSH1",
"ADD",
"SLOAD",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"AND",
"EQ",
"ISZERO",
"PUSH2",
"JUMPI"
],
"start_pc": 1938
},
{
"end_pc": 1966,
"hash": "0x3d5babe585585b6ab6b1b7c022b9121a0e80389df2e833e4ceef5d5129f72eef",
"opcodes": [
"OP_81",
"PUSH2",
"OP_84",
"PUSH2",
"JUMP"
],
"start_pc": 1958
},
{
"end_pc": 2016,
"hash": "0x69cebc6a482573de2ebe0608b76ae27a2b19875f5c07e940e499d918a1363fca",
"opcodes": [
"JUMPDEST",
"PUSH1",
"ADD",
"OP_80",
"SLOAD",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"NOT",
"AND",
"OP_90",
"OP_91",
"OR",
"OP_90",
"SSTORE",
"PUSH1",
"MLOAD",
"OP_83",
"OP_90",
"PUSH1",
"OP_80",
"MLOAD",
"PUSH1",
"PUSH2",
"OP_83",
"CODECOPY",
"OP_81",
"MLOAD",
"OP_91",
"MSTORE",
"OP_90",
"PUSH1",
"OP_90",
"OP_A2",
"POP",
"POP",
"POP",
"JUMP"
],
"start_pc": 1967
},
{
"end_pc": 2036,
"hash": "0x96ebdb09fa71484fe62c16733d86d1173f41a86a2a7b5c6b10750321061470c9",
"opcodes": [
"JUMPDEST",
"PUSH1",
"ADD",
"SLOAD",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"AND",
"EQ",
"ISZERO",
"PUSH2",
"JUMPI"
],
"start_pc": 2017
},
{
"end_pc": 2045,
"hash": "0xc331810d876a1fbe2c958a6c2318da17680cbee4c3ea0ed4759fcaa387bd70a6",
"opcodes": [
"OP_81",
"PUSH2",
"OP_84",
"PUSH2",
"JUMP"
],
"start_pc": 2037
},
{
"end_pc": 2079,
"hash": "0x6a9577669e848dd2fac0a497033532135b16372733e2aa8eb16bea6edc47eeac",
"opcodes": [
"JUMPDEST",
"PUSH1",
"ADD",
"SSTORE",
"PUSH1",
"MLOAD",
"OP_83",
"OP_90",
"PUSH1",
"OP_80",
"MLOAD",
"PUSH1",
"PUSH2",
"OP_83",
"CODECOPY",
"OP_81",
"MLOAD",
"OP_91",
"MSTORE",
"OP_90",
"PUSH1",
"OP_90",
"OP_A2",
"POP",
"POP",
"POP",
"JUMP"
],
"start_pc": 2046
},
{
"end_pc": 2096,
"hash": "0x9b8b6a5400b2e297ae7b20d6f00f568687bc916675f968538840541eb5c0893d",
"opcodes": [
"JUMPDEST",
"SLOAD",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"AND",
"EQ",
"ISZERO",
"PUSH2",
"JUMPI"
],
"start_pc": 2080
},
{
"end_pc": 2178,
"hash": "0xe859ba714c2a165a0d9cb97fa999a01d75268fc33e20de66f965a3237ce3058f",
"opcodes": [
"PUSH1",
"MLOAD",
"OP_81",
"OP_90",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"CALLER",
"AND",
"OP_90",
"PUSH32",
"OP_90",
"PUSH1",
"OP_90",
"OP_A3",
"OP_80",
"PUSH1",
"PUSH1",
"EXP",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"CALLER",
"AND",
"PUSH1",
"PUSH1",
"EXP",
"OP_81",
exec
/bin/bash -lc "sed -n '2081,2340p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
succeeded in 0ms:
"LT",
"ISZERO",
"PUSH2",
"JUMPI"
],
"start_pc": 2097
},
{
"end_pc": 2238,
"hash": "0xd37ccabf6236a7f14313e50e62ed6a36af8761f56d11dae34499c37b8d2655fe",
"opcodes": [
"ADD",
"PUSH1",
"POP",
"OP_90",
"OP_80",
"MLOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_90",
"OP_82",
"OP_80",
"SLOAD",
"PUSH1",
"OP_81",
"PUSH1",
"AND",
"ISZERO",
"PUSH2",
"MUL",
"SUB",
"AND",
"PUSH1",
"OP_90",
"DIV",
"OP_90",
"PUSH1",
"MSTORE",
"PUSH1",
"PUSH1",
"SHA3",
"OP_90",
"PUSH1",
"ADD",
"PUSH1",
"OP_90",
"DIV",
"OP_81",
"ADD",
"OP_92",
"OP_82",
"PUSH1",
"LT",
"PUSH2",
"JUMPI"
],
"start_pc": 2179
},
{
"end_pc": 2250,
"hash": "0x4400c334a70b3b819ab1fe919db3872efd4abbd536510a1b55935c76033d4203",
"opcodes": [
"OP_80",
"MLOAD",
"PUSH1",
"NOT",
"AND",
"OP_83",
"OP_80",
"ADD",
"OR",
"OP_85",
"SSTORE"
],
"start_pc": 2239
},
{
"end_pc": 2258,
"hash": "0xb7b5ceb412e014d250b13cc1148a0c280aace0492ccb84d4340f1a49a16c4144",
"opcodes": [
"JUMPDEST",
"POP",
"PUSH2",
"OP_92",
"OP_91",
"POP"
],
"start_pc": 2251
},
{
"end_pc": 2267,
"hash": "0x599d4b014b3bc13a9c327882ab9064fd277aff73e7fc51c19bcb57f11c3c5339",
"opcodes": [
"JUMPDEST",
"OP_80",
"OP_82",
"GT",
"ISZERO",
"PUSH2",
"JUMPI"
],
"start_pc": 2259
},
{
"end_pc": 2278,
"hash": "0xe7c78ae4e0fcf08a56f525ee61f3d93259788c33077616c8a2caea7aee95e714",
"opcodes": [
"PUSH1",
"OP_81",
"SSTORE",
"PUSH1",
"ADD",
"PUSH2",
"JUMP"
],
"start_pc": 2268
},
{
"end_pc": 2281,
"hash": "0x24c4498d764ee411450192a86f7a85071c4dcbef7359fbddd54ed34f7a98ce0c",
"opcodes": [
"JUMPDEST",
"POP",
"JUMP"
],
"start_pc": 2279
},
{
"end_pc": 2296,
"hash": "0xb549d923a0eb08200cd5d4fffbb94bf9606ecd90d6a7c13e74c9c61a1b8e94b3",
"opcodes": [
"JUMPDEST",
"OP_82",
"OP_80",
"ADD",
"PUSH1",
"ADD",
"OP_85",
"SSTORE",
"OP_82",
"ISZERO",
"PUSH2",
"JUMPI"
],
"start_pc": 2282
},
{
"end_pc": 2299,
"hash": "0x66b466d2850505b268b527abfc2e46b400ceb444f9aa56eaef3ab1f83b8876d1",
"opcodes": [
"OP_91",
"OP_82",
"ADD"
],
"start_pc": 2297
},
{
"end_pc": 2308,
"hash": "0x65ff1f6627c223d7a6efc050152bfb3b19bfac11063063504f32ac291a3c941a",
"opcodes": [
"JUMPDEST",
"OP_82",
"OP_81",
"GT",
"ISZERO",
"PUSH2",
"JUMPI"
],
"start_pc": 2300
},
{
"end_pc": 2329,
"hash": "0x1744ba3b8d9bb3c26f96b15f04b891d2904f14f7a07d75e0c7cf0fba2b028085",
"opcodes": [
"OP_82",
"MLOAD",
"OP_82",
"PUSH1",
"POP",
"SSTORE",
"OP_91",
"PUSH1",
"ADD",
"OP_91",
"OP_90",
"PUSH1",
"ADD",
"OP_90",
"PUSH2",
"JUMP"
],
"start_pc": 2309
},
{
"end_pc": 2333,
"hash": "0x0a3ea09c5a7a9d155ff10040fbc235f2ac09676f11e3aed96977bcda7b4b001d",
"opcodes": [
"JUMPDEST",
"POP",
"OP_90",
"JUMP"
],
"start_pc": 2330
},
{
"end_pc": 2360,
"hash": "0x6473473d59765fc26fbfdaf149cdb601ecf8fbc3ff6ebf34e1a421107e6733da",
"opcodes": [
"JUMPDEST",
"PUSH1",
"OP_81",
"ADD",
"SLOAD",
"OP_90",
"OP_91",
"POP",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"AND",
"PUSH1",
"EQ",
"OP_80",
"ISZERO",
"PUSH2",
"JUMPI"
],
"start_pc": 2334
},
{
"end_pc": 2373,
"hash": "0x5c40f9cbf15cbaeadfa7becf155e54faf9062e4ba02d25a7dd5b90df23b32600",
"opcodes": [
"POP",
"PUSH8",
"CALLVALUE",
"LT",
"ISZERO"
],
"start_pc": 2361
},
{
"end_pc": 2380,
"hash": "0x8aee5472047c32e6c9b1f189dce106da0ac65c870ffbe4e895aa5b43b0e0885f",
"opcodes": [
"JUMPDEST",
"OP_80",
"ISZERO",
"PUSH2",
"JUMPI"
],
"start_pc": 2374
},
{
"end_pc": 2387,
"hash": "0xd7cbdb40cbbfe6452b2e86dc385332c1c5d68000983d80869b083ad21623474a",
"opcodes": [
exec
/bin/bash -lc "sed -n '2341,2600p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
succeeded in 0ms:
"POP",
"PUSH1",
"OP_82",
"MLOAD",
"LT",
"ISZERO"
],
"start_pc": 2381
},
{
"end_pc": 2393,
"hash": "0x4ff40fd578984a172cb5aae09fbab86cef5c8b7a9a20720200370d985da9988d",
"opcodes": [
"JUMPDEST",
"ISZERO",
"PUSH2",
"JUMPI"
],
"start_pc": 2388
},
{
"end_pc": 2441,
"hash": "0xf47bdb6076369ba5277be0bddb166cba3f72d9580d60fe45e201b24a11c5b0d1",
"opcodes": [
"PUSH1",
"OP_81",
"ADD",
"OP_80",
"SLOAD",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"NOT",
"AND",
"CALLER",
"OR",
"OP_90",
"SSTORE",
"PUSH1",
"MLOAD",
"OP_82",
"OP_90",
"PUSH1",
"OP_80",
"MLOAD",
"PUSH1",
"PUSH2",
"OP_83",
"CODECOPY",
"OP_81",
"MLOAD",
"OP_91",
"MSTORE",
"OP_90",
"PUSH1",
"OP_90",
"OP_A2",
"POP",
"POP",
"JUMP"
],
"start_pc": 2394
},
{
"end_pc": 2461,
"hash": "0x95e083fda678634a54849c865ecd15ce65342800aa4c662c19a00bd58176773a",
"opcodes": [
"JUMPDEST",
"PUSH1",
"ADD",
"SLOAD",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"AND",
"EQ",
"ISZERO",
"PUSH2",
"JUMPI"
],
"start_pc": 2442
},
{
"end_pc": 2533,
"hash": "0xc1613122db7948fe7ed03dfd479379c844f83bf1d7edbcdb3c699767b6c54571",
"opcodes": [
"PUSH1",
"PUSH1",
"POP",
"PUSH1",
"OP_84",
"PUSH1",
"MLOAD",
"OP_80",
"OP_82",
"OP_80",
"MLOAD",
"OP_90",
"PUSH1",
"ADD",
"OP_90",
"OP_80",
"OP_83",
"OP_83",
"OP_82",
"OP_90",
"PUSH1",
"PUSH1",
"PUSH1",
"OP_84",
"PUSH1",
"ADD",
"DIV",
"PUSH1",
"MUL",
"PUSH1",
"ADD",
"CALL",
"POP",
"OP_90",
"OP_91",
"ADD",
"OP_82",
"OP_90",
"SUB",
"OP_90",
"OP_91",
"SHA3",
"OP_92",
"OP_90",
"OP_92",
"DIV",
"OP_91",
"POP",
"POP",
"PUSH1",
"PUSH1",
"EXP",
"OP_81",
"LT",
"ISZERO",
"PUSH2",
"JUMPI"
],
"start_pc": 2462
},
{
"end_pc": 2642,
"hash": "0xba72556e8db78c64689c0a53636d2707c07db89fa54f660af239f76c67b28620",
"opcodes": [
"PUSH1",
"MUL",
"OP_80",
"SLOAD",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"NOT",
"OP_90",
"OP_81",
"AND",
"OP_82",
"SSTORE",
"PUSH1",
"OP_82",
"ADD",
"OP_80",
"SLOAD",
"OP_82",
"AND",
"OP_90",
"SSTORE",
"PUSH1",
"OP_82",
"ADD",
"OP_83",
"OP_90",
"SSTORE",
"PUSH1",
"OP_91",
"OP_90",
"OP_91",
"ADD",
"OP_80",
"SLOAD",
"OP_90",
"OP_91",
"AND",
"OP_90",
"SSTORE",
"PUSH1",
"MLOAD",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"OP_84",
"AND",
"OP_91",
"OP_90",
"PUSH8",
"OP_90",
"OP_82",
"OP_81",
"OP_81",
"OP_81",
"OP_85",
"OP_88",
"OP_83",
"CALL",
"POP",
"OP_86",
"OP_93",
"POP",
"PUSH1",
"OP_80",
"MLOAD",
"PUSH1",
"PUSH2",
"OP_83",
"CODECOPY",
"OP_81",
"MLOAD",
"OP_91",
"MSTORE",
"OP_92",
"OP_91",
"POP",
"OP_A2",
"POP",
"POP",
"POP",
"JUMP"
],
"start_pc": 2534
},
{
"end_pc": 2662,
"hash": "0x70a700e6a5f2f6c4f36c384f5cc3e99c2870e93114fa3036f7c6914a31965af3",
"opcodes": [
"JUMPDEST",
"PUSH1",
"ADD",
"SLOAD",
"PUSH1",
"PUSH1",
"PUSH1",
"EXP",
"SUB",
"AND",
"OP_90",
"POP",
"PUSH2",
exec
/bin/bash -lc "sed -n '2601,2860p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
succeeded in 0ms:
"JUMP"
],
"start_pc": 2643
},
{
"end_pc": 2676,
"hash": "0x6b0058e448568a07ec3f347c041a05e83895205831b90ed6677ced561d26bb5e",
"opcodes": [
"JUMPDEST",
"OP_82",
"ADD",
"OP_91",
"OP_90",
"PUSH1",
"MSTORE",
"PUSH1",
"PUSH1",
"SHA3",
"OP_90"
],
"start_pc": 2663
},
{
"end_pc": 2696,
"hash": "0x7e9b66bb3db47bd594ebeca7e194bc84c79cd5441d4014348c43d4375fbf6d45",
"opcodes": [
"JUMPDEST",
"OP_81",
"SLOAD",
"OP_81",
"MSTORE",
"OP_90",
"PUSH1",
"ADD",
"OP_90",
"PUSH1",
"ADD",
"OP_80",
"OP_83",
"GT",
"PUSH2",
"JUMPI"
],
"start_pc": 2677
},
{
"end_pc": 2705,
"hash": "0x12e16cb397a1bb294267b44bc99abfb9af47494d6aa6ae0d477895930926cb32",
"opcodes": [
"OP_82",
"OP_90",
"SUB",
"PUSH1",
"AND",
"OP_82",
"ADD",
"OP_91"
],
"start_pc": 2697
},
{
"end_pc": 2717,
"hash": "0x951b2d660f54c562ce551d02c1a25e54c81604b3ba3e9a712aeffa54404d889f",
"opcodes": [
"JUMPDEST",
"POP",
"POP",
"POP",
"POP",
"POP",
"OP_90",
"POP",
"PUSH2",
"JUMP"
],
"start_pc": 2706
},
{
"end_pc": 2727,
"hash": "0xfc6c0f0bbbaa575011f3c62665e44c316159a7ada8db11298aaf6fd254586b40",
"opcodes": [
"SHR",
"OP_F7",
"PUSH6",
"PUSH23"
],
"start_pc": 2718
}
],
"callsites": [
{
"opcode": "CALL",
"pc": 440,
"returndata_checked": null,
"target_expression_category": "constant",
"value_expression_category": "constant_zero"
},
{
"opcode": "CALL",
"pc": 1530,
"returndata_checked": null,
"target_expression_category": "computed",
"value_expression_category": "computed"
},
{
"opcode": "CALL",
"pc": 2504,
"returndata_checked": null,
"target_expression_category": "computed",
"value_expression_category": "constant_zero"
},
{
"opcode": "CALL",
"pc": 2615,
"returndata_checked": null,
"target_expression_category": "computed",
"value_expression_category": "computed"
}
],
"cfg_edges": [
{
"from": "bb:0",
"to": "bb:163",
"type": "control_flow"
},
{
"from": "bb:0",
"to": "bb:11",
"type": "control_flow_fallthrough"
},
{
"from": "bb:11",
"to": "bb:165",
"type": "control_flow"
},
{
"from": "bb:11",
"to": "bb:31",
"type": "control_flow_fallthrough"
},
{
"from": "bb:31",
"to": "bb:303",
"type": "control_flow"
},
{
"from": "bb:31",
"to": "bb:42",
"type": "control_flow_fallthrough"
},
{
"from": "bb:42",
"to": "bb:481",
"type": "control_flow"
},
{
"from": "bb:42",
"to": "bb:53",
"type": "control_flow_fallthrough"
},
{
"from": "bb:53",
"to": "bb:577",
"type": "control_flow"
},
{
"from": "bb:53",
"to": "bb:64",
"type": "control_flow_fallthrough"
},
{
"from": "bb:64",
"to": "bb:662",
"type": "control_flow"
},
{
"from": "bb:64",
"to": "bb:75",
"type": "control_flow_fallthrough"
},
{
"from": "bb:75",
"to": "bb:747",
"type": "control_flow"
},
{
"from": "bb:75",
"to": "bb:86",
"type": "control_flow_fallthrough"
},
{
"from": "bb:86",
"to": "bb:832",
"type": "control_flow"
},
{
"from": "bb:86",
"to": "bb:97",
"type": "control_flow_fallthrough"
},
{
"from": "bb:97",
"to": "bb:928",
"type": "control_flow"
},
{
"from": "bb:97",
"to": "bb:108",
"type": "control_flow_fallthrough"
},
{
"from": "bb:108",
"to": "bb:1021",
"type": "control_flow"
},
{
"from": "bb:108",
"to": "bb:119",
"type": "control_flow_fallthrough"
},
{
"from": "bb:119",
"to": "bb:1117",
"type": "control_flow"
},
{
"from": "bb:119",
"to": "bb:130",
"type": "control_flow_fallthrough"
},
{
"from": "bb:130",
"to": "bb:1202",
"type": "control_flow"
},
{
"from": "bb:130",
"to": "bb:141",
"type": "control_flow_fallthrough"
},
{
"from": "bb:141",
"to": "bb:1287",
"type": "control_flow"
},
{
"from": "bb:141",
"to": "bb:152",
"type": "control_flow_fallthrough"
},
{
"from": "bb:152",
"to": "bb:1380",
"type": "control_flow"
},
{
"from": "bb:152",
"to": "bb:163",
"type": "control_flow_fallthrough"
},
exec
/bin/bash -lc "sed -n '2861,3120p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
succeeded in 0ms:
{
"from": "bb:165",
"to": "bb:214",
"type": "control_flow_fallthrough"
},
{
"from": "bb:214",
"to": "bb:2706",
"type": "control_flow"
},
{
"from": "bb:214",
"to": "bb:276",
"type": "control_flow_fallthrough"
},
{
"from": "bb:276",
"to": "bb:2663",
"type": "control_flow"
},
{
"from": "bb:276",
"to": "bb:284",
"type": "control_flow_fallthrough"
},
{
"from": "bb:284",
"to": "bb:2706",
"type": "control_flow"
},
{
"from": "bb:303",
"to": "bb:395",
"type": "control_flow_fallthrough"
},
{
"from": "bb:395",
"to": "bb:470",
"type": "control_flow_fallthrough"
},
{
"from": "bb:470",
"to": "bb:1902",
"type": "control_flow"
},
{
"from": "bb:481",
"to": "bb:395",
"type": "control_flow"
},
{
"from": "bb:577",
"to": "bb:395",
"type": "control_flow"
},
{
"from": "bb:662",
"to": "bb:395",
"type": "control_flow"
},
{
"from": "bb:747",
"to": "bb:395",
"type": "control_flow"
},
{
"from": "bb:832",
"to": "bb:395",
"type": "control_flow"
},
{
"from": "bb:928",
"to": "bb:395",
"type": "control_flow"
},
{
"from": "bb:1021",
"to": "bb:395",
"type": "control_flow"
},
{
"from": "bb:1117",
"to": "bb:395",
"type": "control_flow"
},
{
"from": "bb:1202",
"to": "bb:395",
"type": "control_flow"
},
{
"from": "bb:1287",
"to": "bb:395",
"type": "control_flow"
},
{
"from": "bb:1380",
"to": "bb:395",
"type": "control_flow"
},
{
"from": "bb:1476",
"to": "bb:1572",
"type": "control_flow"
},
{
"from": "bb:1476",
"to": "bb:1547",
"type": "control_flow_fallthrough"
},
{
"from": "bb:1547",
"to": "bb:1572",
"type": "control_flow_fallthrough"
},
{
"from": "bb:1685",
"to": "bb:1731",
"type": "control_flow_fallthrough"
},
{
"from": "bb:1731",
"to": "bb:1733",
"type": "control_flow_fallthrough"
},
{
"from": "bb:1737",
"to": "bb:1731",
"type": "control_flow"
},
{
"from": "bb:1737",
"to": "bb:1757",
"type": "control_flow_fallthrough"
},
{
"from": "bb:1757",
"to": "bb:395",
"type": "control_flow"
},
{
"from": "bb:1766",
"to": "bb:1731",
"type": "control_flow"
},
{
"from": "bb:1766",
"to": "bb:1786",
"type": "control_flow_fallthrough"
},
{
"from": "bb:1786",
"to": "bb:395",
"type": "control_flow"
},
{
"from": "bb:1889",
"to": "bb:1902",
"type": "control_flow_fallthrough"
},
{
"from": "bb:1907",
"to": "bb:1902",
"type": "control_flow"
},
{
"from": "bb:1927",
"to": "bb:1902",
"type": "control_flow"
},
{
"from": "bb:1938",
"to": "bb:1731",
"type": "control_flow"
},
{
"from": "bb:1938",
"to": "bb:1958",
"type": "control_flow_fallthrough"
},
{
"from": "bb:1958",
"to": "bb:395",
"type": "control_flow"
},
{
"from": "bb:2017",
"to": "bb:1731",
"type": "control_flow"
},
{
"from": "bb:2017",
"to": "bb:2037",
"type": "control_flow_fallthrough"
},
{
"from": "bb:2037",
"to": "bb:395",
"type": "control_flow"
},
{
"from": "bb:2080",
"to": "bb:2279",
"type": "control_flow"
},
{
"from": "bb:2080",
"to": "bb:2097",
"type": "control_flow_fallthrough"
},
{
"from": "bb:2097",
"to": "bb:2179",
"type": "control_flow_fallthrough"
},
{
"from": "bb:2179",
"to": "bb:2282",
"type": "control_flow"
},
{
"from": "bb:2179",
"to": "bb:2239",
"type": "control_flow_fallthrough"
},
{
"from": "bb:2239",
"to": "bb:2251",
"type": "control_flow_fallthrough"
},
{
"from": "bb:2251",
"to": "bb:2259",
"type": "control_flow_fallthrough"
},
{
"from": "bb:2259",
"to": "bb:2330",
"type": "control_flow"
},
{
"from": "bb:2259",
"to": "bb:2268",
"type": "control_flow_fallthrough"
},
{
"from": "bb:2268",
"to": "bb:2259",
"type": "control_flow"
},
{
"from": "bb:2282",
"to": "bb:2251",
"type": "control_flow"
},
{
"from": "bb:2282",
"to": "bb:2297",
"type": "control_flow_fallthrough"
},
exec
/bin/bash -lc "sed -n '3121,3380p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
succeeded in 0ms:
{
"from": "bb:2297",
"to": "bb:2300",
"type": "control_flow_fallthrough"
},
{
"from": "bb:2300",
"to": "bb:2251",
"type": "control_flow"
},
{
"from": "bb:2300",
"to": "bb:2309",
"type": "control_flow_fallthrough"
},
{
"from": "bb:2309",
"to": "bb:2300",
"type": "control_flow"
},
{
"from": "bb:2334",
"to": "bb:2374",
"type": "control_flow"
},
{
"from": "bb:2334",
"to": "bb:2361",
"type": "control_flow_fallthrough"
},
{
"from": "bb:2361",
"to": "bb:2374",
"type": "control_flow_fallthrough"
},
{
"from": "bb:2374",
"to": "bb:2388",
"type": "control_flow"
},
{
"from": "bb:2374",
"to": "bb:2381",
"type": "control_flow_fallthrough"
},
{
"from": "bb:2381",
"to": "bb:2388",
"type": "control_flow_fallthrough"
},
{
"from": "bb:2388",
"to": "bb:1733",
"type": "control_flow"
},
{
"from": "bb:2388",
"to": "bb:2394",
"type": "control_flow_fallthrough"
},
{
"from": "bb:2442",
"to": "bb:1731",
"type": "control_flow"
},
{
"from": "bb:2442",
"to": "bb:2462",
"type": "control_flow_fallthrough"
},
{
"from": "bb:2462",
"to": "bb:2534",
"type": "control_flow_fallthrough"
},
{
"from": "bb:2643",
"to": "bb:1902",
"type": "control_flow"
},
{
"from": "bb:2663",
"to": "bb:2677",
"type": "control_flow_fallthrough"
},
{
"from": "bb:2677",
"to": "bb:2677",
"type": "control_flow"
},
{
"from": "bb:2677",
"to": "bb:2697",
"type": "control_flow_fallthrough"
},
{
"from": "bb:2697",
"to": "bb:2706",
"type": "control_flow_fallthrough"
},
{
"from": "bb:2706",
"to": "bb:1902",
"type": "control_flow"
}
],
"cfg_hash": "0xb6fb6f3f477b82571ef71458778786f3a1f85b24bb054f14f0f55822dfd4a6a2",
"dispatcher_type": "selector_jump_table",
"function_entries": [
{
"entry_pc": null,
"selector": "0x01984892"
},
{
"entry_pc": 557555384,
"selector": "0x092b25e9"
},
{
"entry_pc": 1360731641,
"selector": "0x213b9eb8"
},
{
"entry_pc": 2135186468,
"selector": "0x511b1df9"
},
{
"entry_pc": 2929303246,
"selector": "0x7f445c24"
},
{
"entry_pc": 3044360261,
"selector": "0xae999ece"
},
{
"entry_pc": 3296657447,
"selector": "0xb5754045"
},
{
"entry_pc": 3438605331,
"selector": "0xc47f0027"
},
{
"entry_pc": 3713312303,
"selector": "0xccf4f413"
},
{
"entry_pc": 3746935834,
"selector": "0xdd54a62f"
},
{
"entry_pc": 3843739158,
"selector": "0xdf55b41a"
},
{
"entry_pc": 4251931696,
"selector": "0xe51ace16"
},
{
"entry_pc": null,
"selector": "0xfd6f5430"
}
],
"functions": [
{
"auth": {
"guards": []
},
"entry_pc": null,
"selector": "0x01984892",
"sinks": {
"call": 4,
"delegatecall": 0,
"selfdestruct": 0,
"staticcall": 0
},
"storage": {
"reads": 26,
"slots": [
{
"op": "SLOAD",
"pc": 289,
"slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
}
],
"writes": 13
}
},
{
"auth": {
"guards": []
},
"entry_pc": 557555384,
"selector": "0x092b25e9",
"sinks": {
"call": 4,
"delegatecall": 0,
"selfdestruct": 0,
"staticcall": 0
},
"storage": {
"reads": 26,
"slots": [
{
"op": "SLOAD",
"pc": 289,
"slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
}
],
"writes": 13
}
},
{
"auth": {
"guards": []
},
"entry_pc": 1360731641,
"selector": "0x213b9eb8",
"sinks": {
"call": 4,
"delegatecall": 0,
"selfdestruct": 0,
"staticcall": 0
},
"storage": {
"reads": 26,
"slots": [
{
"op": "SLOAD",
"pc": 289,
"slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
}
],
"writes": 13
}
},
{
"auth": {
"guards": []
},
"entry_pc": 2135186468,
"selector": "0x511b1df9",
"sinks": {
"call": 4,
"delegatecall": 0,
"selfdestruct": 0,
"staticcall": 0
},
"storage": {
"reads": 26,
"slots": [
{
"op": "SLOAD",
"pc": 289,
"slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
}
],
"writes": 13
}
},
{
exec
/bin/bash -lc "sed -n '3381,3640p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
succeeded in 0ms:
"auth": {
"guards": []
},
"entry_pc": 2929303246,
"selector": "0x7f445c24",
"sinks": {
"call": 4,
"delegatecall": 0,
"selfdestruct": 0,
"staticcall": 0
},
"storage": {
"reads": 26,
"slots": [
{
"op": "SLOAD",
"pc": 289,
"slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
}
],
"writes": 13
}
},
{
"auth": {
"guards": []
},
"entry_pc": 3044360261,
"selector": "0xae999ece",
"sinks": {
"call": 4,
"delegatecall": 0,
"selfdestruct": 0,
"staticcall": 0
},
"storage": {
"reads": 26,
"slots": [
{
"op": "SLOAD",
"pc": 289,
"slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
}
],
"writes": 13
}
},
{
"auth": {
"guards": []
},
"entry_pc": 3296657447,
"selector": "0xb5754045",
"sinks": {
"call": 4,
"delegatecall": 0,
"selfdestruct": 0,
"staticcall": 0
},
"storage": {
"reads": 26,
"slots": [
{
"op": "SLOAD",
"pc": 289,
"slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
}
],
"writes": 13
}
},
{
"auth": {
"guards": []
},
"entry_pc": 3438605331,
"selector": "0xc47f0027",
"sinks": {
"call": 4,
"delegatecall": 0,
"selfdestruct": 0,
"staticcall": 0
},
"storage": {
"reads": 26,
"slots": [
{
"op": "SLOAD",
"pc": 289,
"slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
}
],
"writes": 13
}
},
{
"auth": {
"guards": []
},
"entry_pc": 3713312303,
"selector": "0xccf4f413",
"sinks": {
"call": 4,
"delegatecall": 0,
"selfdestruct": 0,
"staticcall": 0
},
"storage": {
"reads": 26,
"slots": [
{
"op": "SLOAD",
"pc": 289,
"slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
}
],
"writes": 13
}
},
{
"auth": {
"guards": []
},
"entry_pc": 3746935834,
"selector": "0xdd54a62f",
"sinks": {
"call": 4,
"delegatecall": 0,
"selfdestruct": 0,
"staticcall": 0
},
"storage": {
"reads": 26,
"slots": [
{
"op": "SLOAD",
"pc": 289,
"slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
}
],
"writes": 13
}
},
{
"auth": {
"guards": []
},
"entry_pc": 3843739158,
"selector": "0xdf55b41a",
"sinks": {
"call": 4,
"delegatecall": 0,
"selfdestruct": 0,
"staticcall": 0
},
"storage": {
"reads": 26,
"slots": [
{
"op": "SLOAD",
"pc": 289,
"slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
}
],
"writes": 13
}
},
{
"auth": {
"guards": []
},
"entry_pc": 4251931696,
"selector": "0xe51ace16",
"sinks": {
"call": 4,
"delegatecall": 0,
"selfdestruct": 0,
"staticcall": 0
},
"storage": {
"reads": 26,
"slots": [
{
"op": "SLOAD",
"pc": 289,
"slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
}
],
"writes": 13
}
},
{
"auth": {
"guards": []
},
"entry_pc": null,
"selector": "0xfd6f5430",
"sinks": {
"call": 4,
"delegatecall": 0,
"selfdestruct": 0,
"staticcall": 0
},
"storage": {
"reads": 26,
"slots": [
{
"op": "SLOAD",
"pc": 289,
"slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
}
],
"writes": 13
}
}
],
"selectors": [
"0x01984892",
"0x092b25e9",
"0x213b9eb8",
"0x511b1df9",
"0x7f445c24",
"0xae999ece",
"0xb5754045",
"0xc47f0027",
"0xccf4f413",
"0xdd54a62f",
"0xdf55b41a",
"0xe51ace16",
"0xfd6f5430"
],
"sinks": {
"call": 4,
"create": 0,
"create2": 0,
"delegatecall": 0,
"selfdestruct": 0,
"staticcall": 0,
"upgrade_slot_write_suspected": false
},
"storage": {
"keccak_count": 4,
"reads": 26,
"slots": [
{
"op": "SLOAD",
"pc": 289,
"slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
}
],
"writes": 13
},
"version": "analysis_artifact_v1"
},
"block_number": null,
"chain_id": 1,
"codehash": "0x442fb089dcd7251563797d1a9528c790baa53b792306a35c6f1fef135793d337",
"created_at": "2026-04-04T19:45:06.000000Z",
"id": 1500,
"updated_at": "2026-04-04T20:42:26.000000Z",
exec
/bin/bash -lc "sed -n '3641,3900p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
succeeded in 0ms:
"version": "analysis_artifact_v1"
},
"analysis_run": {
"address": "0x0e5e2b9341341ade98f510ad9a744e01f3b29f03",
"block_number": null,
"chain_id": 1,
"child_links": [],
"created_at": "2025-12-19T20:03:50.000000Z",
"id": "019b3836-22d7-70d4-8f04-697b1924f6d7",
"parent_links": [],
"status": "running",
"updated_at": "2026-04-04T19:45:06.000000Z"
},
"artifact": {
"codehash": "0x442fb089dcd7251563797d1a9528c790baa53b792306a35c6f1fef135793d337",
"compiler_json": {
"etherscan": {
"skipped": true
}
},
"implementation_address": null,
"is_proxy": false,
"runtime_bytecode": {
"full": "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",
"head": null,
"length": 5502,
"tail": null,
"truncated": false
},
"verified_source": false
},
"capability_graph": {
"address": "0x0e5e2b9341341ade98f510ad9a744e01f3b29f03",
"block_number": null,
"chain_id": 1,
"codehash": "0x442fb089dcd7251563797d1a9528c790baa53b792306a35c6f1fef135793d337",
"created_at": "2026-04-04T19:45:07.000000Z",
"graph_hash": "0xacb8777cbabe43c7ce8ef1bc1851752e61f58a6814de3b048d7cb2a85dc15e27",
"graph_json": {
"edges": [
{
"from": "bb:0",
"to": "bb:163",
"type": "control_flow"
},
{
"from": "bb:0",
"to": "bb:11",
"type": "control_flow_fallthrough"
},
{
"from": "bb:11",
"to": "bb:165",
"type": "control_flow"
},
{
"from": "bb:11",
"to": "bb:31",
"type": "control_flow_fallthrough"
},
{
"from": "bb:31",
"to": "bb:303",
"type": "control_flow"
},
{
"from": "bb:31",
"to": "bb:42",
"type": "control_flow_fallthrough"
},
{
"from": "bb:42",
"to": "bb:481",
"type": "control_flow"
},
{
"from": "bb:42",
"to": "bb:53",
"type": "control_flow_fallthrough"
},
{
"from": "bb:53",
"to": "bb:577",
"type": "control_flow"
},
{
"from": "bb:53",
"to": "bb:64",
"type": "control_flow_fallthrough"
},
{
"from": "bb:64",
"to": "bb:662",
"type": "control_flow"
},
{
"from": "bb:64",
"to": "bb:75",
"type": "control_flow_fallthrough"
},
{
"from": "bb:75",
"to": "bb:747",
"type": "control_flow"
},
{
"from": "bb:75",
"to": "bb:86",
"type": "control_flow_fallthrough"
},
{
"from": "bb:86",
"to": "bb:832",
"type": "control_flow"
},
{
"from": "bb:86",
"to": "bb:97",
"type": "control_flow_fallthrough"
},
{
"from": "bb:97",
"to": "bb:928",
"type": "control_flow"
},
{
"from": "bb:97",
"to": "bb:108",
"type": "control_flow_fallthrough"
},
{
"from": "bb:108",
"to": "bb:1021",
"type": "control_flow"
},
{
"from": "bb:108",
"to": "bb:119",
"type": "control_flow_fallthrough"
},
{
"from": "bb:119",
"to": "bb:1117",
"type": "control_flow"
},
{
"from": "bb:119",
"to": "bb:130",
"type": "control_flow_fallthrough"
},
{
"from": "bb:130",
"to": "bb:1202",
"type": "control_flow"
},
{
"from": "bb:130",
"to": "bb:141",
"type": "control_flow_fallthrough"
},
{
"from": "bb:141",
"to": "bb:1287",
"type": "control_flow"
},
{
"from": "bb:141",
"to": "bb:152",
"type": "control_flow_fallthrough"
},
{
"from": "bb:152",
"to": "bb:1380",
"type": "control_flow"
},
{
"from": "bb:152",
"to": "bb:163",
"type": "control_flow_fallthrough"
},
{
"from": "bb:165",
"to": "bb:214",
"type": "control_flow_fallthrough"
},
{
"from": "bb:214",
"to": "bb:2706",
"type": "control_flow"
},
{
"from": "bb:214",
"to": "bb:276",
"type": "control_flow_fallthrough"
},
{
"from": "bb:276",
"to": "bb:2663",
"type": "control_flow"
},
{
"from": "bb:276",
"to": "bb:284",
"type": "control_flow_fallthrough"
},
{
"from": "bb:284",
"to": "bb:2706",
"type": "control_flow"
},
{
"from": "bb:303",
"to": "bb:395",
"type": "control_flow_fallthrough"
},
{
"from": "bb:395",
"to": "bb:470",
"type": "control_flow_fallthrough"
},
{
"from": "bb:470",
"to": "bb:1902",
"type": "control_flow"
},
{
"from": "bb:481",
"to": "bb:395",
"type": "control_flow"
},
{
"from": "bb:577",
"to": "bb:395",
"type": "control_flow"
},
{
"from": "bb:662",
"to": "bb:395",
"type": "control_flow"
},
{
"from": "bb:747",
"to": "bb:395",
"type": "control_flow"
},
{
"from": "bb:832",
"to": "bb:395",
"type": "control_flow"
},
{
"from": "bb:928",
"to": "bb:395",
"type": "control_flow"
},
{
"from": "bb:1021",
"to": "bb:395",
"type": "control_flow"
},
exec
/bin/bash -lc "rg -n 'detector|evidence|slot|callsite|summary|finding|proxy|event' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
succeeded in 0ms:
2690: "callsites": [
3298: "slots": [
3302: "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3322: "slots": [
3326: "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3346: "slots": [
3350: "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3370: "slots": [
3374: "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3394: "slots": [
3398: "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3418: "slots": [
3422: "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3442: "slots": [
3446: "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3466: "slots": [
3470: "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3490: "slots": [
3494: "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3514: "slots": [
3518: "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3538: "slots": [
3542: "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3562: "slots": [
3566: "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3586: "slots": [
3590: "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3619: "upgrade_slot_write_suspected": false
3624: "slots": [
3628: "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3662: "is_proxy": false,
4889: "type": "callsite"
4895: "type": "callsite"
4901: "type": "callsite"
4907: "type": "callsite"
4998: "detector_findings": [
5001: "evidence_json": {
5054: "evidence_json": {
5099: "heuristics_summary": {
exec
/bin/bash -lc "sed -n '4840,5135p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
succeeded in 0ms:
"start_pc": 2534,
"type": "basic_block"
},
{
"end_pc": 2662,
"hash": "0x70a700e6a5f2f6c4f36c384f5cc3e99c2870e93114fa3036f7c6914a31965af3",
"id": "bb:2643",
"start_pc": 2643,
"type": "basic_block"
},
{
"end_pc": 2676,
"hash": "0x6b0058e448568a07ec3f347c041a05e83895205831b90ed6677ced561d26bb5e",
"id": "bb:2663",
"start_pc": 2663,
"type": "basic_block"
},
{
"end_pc": 2696,
"hash": "0x7e9b66bb3db47bd594ebeca7e194bc84c79cd5441d4014348c43d4375fbf6d45",
"id": "bb:2677",
"start_pc": 2677,
"type": "basic_block"
},
{
"end_pc": 2705,
"hash": "0x12e16cb397a1bb294267b44bc99abfb9af47494d6aa6ae0d477895930926cb32",
"id": "bb:2697",
"start_pc": 2697,
"type": "basic_block"
},
{
"end_pc": 2717,
"hash": "0x951b2d660f54c562ce551d02c1a25e54c81604b3ba3e9a712aeffa54404d889f",
"id": "bb:2706",
"start_pc": 2706,
"type": "basic_block"
},
{
"end_pc": 2727,
"hash": "0xfc6c0f0bbbaa575011f3c62665e44c316159a7ada8db11298aaf6fd254586b40",
"id": "bb:2718",
"start_pc": 2718,
"type": "basic_block"
},
{
"id": "call:440",
"opcode": "CALL",
"pc": 440,
"type": "callsite"
},
{
"id": "call:1530",
"opcode": "CALL",
"pc": 1530,
"type": "callsite"
},
{
"id": "call:2504",
"opcode": "CALL",
"pc": 2504,
"type": "callsite"
},
{
"id": "call:2615",
"opcode": "CALL",
"pc": 2615,
"type": "callsite"
},
{
"id": "sink:call",
"type": "sink"
},
{
"entry_pc": null,
"id": "fn:0x01984892",
"selector": "0x01984892",
"type": "function"
},
{
"entry_pc": 557555384,
"id": "fn:0x092b25e9",
"selector": "0x092b25e9",
"type": "function"
},
{
"entry_pc": 1360731641,
"id": "fn:0x213b9eb8",
"selector": "0x213b9eb8",
"type": "function"
},
{
"entry_pc": 2135186468,
"id": "fn:0x511b1df9",
"selector": "0x511b1df9",
"type": "function"
},
{
"entry_pc": 2929303246,
"id": "fn:0x7f445c24",
"selector": "0x7f445c24",
"type": "function"
},
{
"entry_pc": 3044360261,
"id": "fn:0xae999ece",
"selector": "0xae999ece",
"type": "function"
},
{
"entry_pc": 3296657447,
"id": "fn:0xb5754045",
"selector": "0xb5754045",
"type": "function"
},
{
"entry_pc": 3438605331,
"id": "fn:0xc47f0027",
"selector": "0xc47f0027",
"type": "function"
},
{
"entry_pc": 3713312303,
"id": "fn:0xccf4f413",
"selector": "0xccf4f413",
"type": "function"
},
{
"entry_pc": 3746935834,
"id": "fn:0xdd54a62f",
"selector": "0xdd54a62f",
"type": "function"
},
{
"entry_pc": 3843739158,
"id": "fn:0xdf55b41a",
"selector": "0xdf55b41a",
"type": "function"
},
{
"entry_pc": 4251931696,
"id": "fn:0xe51ace16",
"selector": "0xe51ace16",
"type": "function"
},
{
"entry_pc": null,
"id": "fn:0xfd6f5430",
"selector": "0xfd6f5430",
"type": "function"
}
],
"version": "capability_graph_v1"
},
"id": 1500,
"updated_at": "2026-04-04T20:42:26.000000Z",
"version": "capability_graph_v1"
},
"detector_findings": [
{
"confidence": 60,
"evidence_json": {
"call_count": 4,
"examples": [
{
"opcode": "CALL",
"pc": 1530,
"returndata_checked": null,
"target_expression_category": "computed",
"value_expression_category": "computed"
},
{
"opcode": "CALL",
"pc": 2504,
"returndata_checked": null,
"target_expression_category": "computed",
"value_expression_category": "constant_zero"
},
{
"opcode": "CALL",
"pc": 2615,
"returndata_checked": null,
"target_expression_category": "computed",
"value_expression_category": "computed"
}
],
"guards_detected": [],
"untrusted_call_count": 3
},
"normalized_json": {
"sink": "CALL"
},
"severity": "high",
"title": "Untrusted CALL target/value reachable",
"validated": true,
"validation_json": {
"attempts": 1,
"call_targets": [
"0x0000000000000000000000000000000000000004",
"0x0e5e2b9341341ade98f510ad9a744e01f3b29f03"
],
"classification": "target_varies",
"confirmed": true,
"errors": 0,
"matched_probe": null,
"sink": "CALL",
"status": "confirmed",
"target_varies": true,
"trace_id": "0x1d75af42b2cd4ccf6a86204d2258d3f365baa73f77ebcfc3a310aa3d9863e3d2",
"trace_mode": "callTracer"
}
},
{
"confidence": 55,
"evidence_json": {
"eth_value_calls": 2,
"examples": [
{
"opcode": "CALL",
"pc": 1530,
"returndata_checked": null,
"target_expression_category": "computed",
"value_expression_category": "computed"
},
{
"opcode": "CALL",
"pc": 2615,
"returndata_checked": null,
"target_expression_category": "computed",
"value_expression_category": "computed"
}
],
"guards_detected": []
},
"normalized_json": {
"sink": "CALL",
"value": "nonzero"
},
"severity": "high",
"title": "ETH value transfer possible",
"validated": true,
"validation_json": {
"attempts": 1,
"call_targets": [
"0x0000000000000000000000000000000000000004",
"0x0e5e2b9341341ade98f510ad9a744e01f3b29f03"
],
"classification": "target_varies",
"confirmed": true,
"errors": 0,
"matched_probe": null,
"sink": "CALL",
"status": "confirmed",
"target_varies": true,
"trace_id": "0x1d75af42b2cd4ccf6a86204d2258d3f365baa73f77ebcfc3a310aa3d9863e3d2",
"trace_mode": "callTracer"
}
}
],
"heuristics_summary": {
"create2_count": 0,
"delegatecall_count": 0,
"flags": [],
"selfdestruct_count": 0
}
}
exec
/bin/bash -lc 'which evm && which cast && which python3 && which node' in /tmp/codex-i34svh9b
exited 1 in 0ms:
exec
/bin/bash -lc 'which evm' in /tmp/codex-i34svh9b
exited 1 in 0ms:
exec
/bin/bash -lc 'which cast' in /tmp/codex-i34svh9b
succeeded in 0ms:
/home/noahkuhn/.foundry/bin/cast
exec
/bin/bash -lc 'which python3' in /tmp/codex-i34svh9b
succeeded in 0ms:
/var/www/tripwire/.venv/bin/python3
exec
/bin/bash -lc 'which node' in /tmp/codex-i34svh9b
succeeded in 0ms:
/home/noahkuhn/.nvm/versions/node/v23.3.0/bin/node
exec
/bin/bash -lc "cast --help | sed -n '1,200p'" in /tmp/codex-i34svh9b
succeeded in 0ms:
A Swiss Army knife for interacting with Ethereum applications from the command line
Usage: cast [OPTIONS] <COMMAND>
Commands:
4byte Get the function signatures for the given selector from
<https://openchain.xyz> [aliases: 4, 4b]
4byte-calldata Decode ABI-encoded calldata using <https://openchain.xyz> [aliases: 4c,
4bc]
4byte-event Get the event signature for a given topic 0 from <https://openchain.xyz>
[aliases: 4e, 4be, topic0-event, t0e]
abi-encode ABI encode the given function argument, excluding the selector [aliases:
ae]
abi-encode-event ABI encode an event and its arguments to generate topics and data [aliases:
aee]
access-list Create an access list for a transaction [aliases: ac, acl]
address-zero Prints the zero address [aliases: --address-zero, az]
admin Fetch the EIP-1967 admin account [aliases: adm]
age Get the timestamp of a block [aliases: a]
artifact Generate an artifact file, that can be used to deploy a contract locally
[aliases: ar]
b2e-payload Convert Beacon payload to execution payload [aliases: b2e]
balance Get the balance of an account in wei [aliases: b]
base-fee Get the basefee of a block [aliases: ba, fee, basefee]
bind Generate a rust binding from a given ABI [aliases: bi]
block Get information about a block [aliases: bl]
block-number Get the latest block number [aliases: bn]
call Perform a call on an account without publishing a transaction [aliases: c]
calldata ABI-encode a function with arguments [aliases: cd]
chain Get the symbolic name of the current chain
chain-id Get the Ethereum chain ID [aliases: ci, cid]
client Get the current client version [aliases: cl]
code Get the runtime bytecode of a contract [aliases: co]
codehash Get the codehash for an account
codesize Get the runtime bytecode size of a contract [aliases: cs]
completions Generate shell completions script [aliases: com]
compute-address Compute the contract address from a given nonce and deployer address
[aliases: ca]
concat-hex Concatenate hex strings [aliases: --concat-hex, ch]
constructor-args Display constructor arguments used for the contract initialization
[aliases: cra]
create2 Generate a deterministic contract address using CREATE2 [aliases: c2]
creation-code Download a contract creation code from Etherscan and RPC [aliases: cc]
da-estimate Estimates the data availability size of a given opstack block
decode-abi Decode ABI-encoded input or output data [aliases: abi-decode, --abi-decode,
ad]
decode-calldata Decode ABI-encoded input data [aliases: calldata-decode, --calldata-decode,
cdd]
decode-error Decode custom error data [aliases: error-decode, --error-decode, erd]
decode-event Decode event data [aliases: event-decode, --event-decode, ed]
decode-string Decode ABI-encoded string [aliases: string-decode, --string-decode, sd]
decode-transaction Decodes a raw signed EIP 2718 typed transaction [aliases: dt, decode-tx]
disassemble Disassembles a hex-encoded bytecode into a human-readable representation
[aliases: da]
erc20-token ERC20 token operations [aliases: erc20]
estimate Estimate the gas cost of a transaction [aliases: e]
find-block Get the block number closest to the provided timestamp [aliases: f]
format-bytes32-string Formats a string into bytes32 encoding [aliases: --format-bytes32-string]
format-units Format a number from smallest unit to decimal with arbitrary decimals
[aliases: --format-units, fun]
from-bin Convert binary data into hex data [aliases: --from-bin, from-binx, fb]
from-fixed-point Convert a fixed point number into an integer [aliases: --from-fix, ff]
from-rlp Decodes RLP hex-encoded data [aliases: --from-rlp]
from-utf8 Convert UTF8 text to hex [aliases: --from-ascii, --from-utf8, from-ascii,
fu, fa]
from-wei Convert wei into an ETH amount [aliases: --from-wei, fw]
gas-price Get the current gas price [aliases: g]
hash-message Hash a message according to EIP-191 [aliases: --hash-message, hm]
hash-zero Prints the zero hash [aliases: --hash-zero, hz]
help Print this message or the help of the given subcommand(s)
implementation Fetch the EIP-1967 implementation for a contract Can read from the
implementation slot or the beacon slot [aliases: impl]
index Compute the storage slot for an entry in a mapping [aliases: in]
index-erc7201 Compute storage slots as specified by `ERC-7201: Namespaced Storage Layout`
[aliases: index7201, in7201]
interface Generate a Solidity interface from a given ABI [aliases: i]
keccak Hash arbitrary data using Keccak-256 [aliases: k, keccak256]
logs Get logs by signature or topic [aliases: l]
lookup-address Perform an ENS reverse lookup [aliases: la]
max-int Prints the maximum value of the given integer type [aliases: --max-int,
maxi]
max-uint Prints the maximum value of the given integer type [aliases: --max-uint,
maxu]
min-int Prints the minimum value of the given integer type [aliases: --min-int,
mini]
mktx Build and sign a transaction [aliases: m]
namehash Calculate the ENS namehash of a name [aliases: na, nh]
nonce Get the nonce for an account [aliases: n]
pad Pads hex data to a specified length [aliases: pd]
parse-bytes32-address Parses a checksummed address from bytes32 encoding. [aliases:
--parse-bytes32-address]
parse-bytes32-string Parses a string from bytes32 encoding [aliases: --parse-bytes32-string]
parse-units Convert a number from decimal to smallest unit with arbitrary decimals
[aliases: --parse-units, pun]
pretty-calldata Pretty print calldata [aliases: pc]
proof Generate a storage proof for a given storage slot [aliases: pr]
publish Publish a raw transaction to the network [aliases: p]
receipt Get the transaction receipt for a transaction [aliases: re]
recover-authority Recovery an EIP-7702 authority from a Authorization JSON string [aliases:
decode-auth]
resolve-name Perform an ENS lookup [aliases: rn]
rpc Perform a raw JSON-RPC request [aliases: rp]
run Runs a published transaction in a local environment and prints the trace
[aliases: r]
selectors Extracts function selectors and arguments from bytecode [aliases: sel]
send Sign and publish a transaction [aliases: s]
shl Perform a left shifting operation
shr Perform a right shifting operation
sig Get the selector for a function [aliases: si]
sig-event Generate event signatures from event string [aliases: se]
source Get the source code of a contract from a block explorer [aliases: et, src]
storage Get the raw value of a contract's storage slot [aliases: st]
storage-root Get the storage root for an account [aliases: sr]
to-ascii Convert hex data to an ASCII string [aliases: --to-ascii, tas, 2as]
to-base Converts a number of one base to another [aliases: --to-base, --to-radix,
to-radix, tr, 2r]
to-bytes32 Right-pads hex data to 32 bytes [aliases: --to-bytes32, tb, 2b]
to-check-sum-address Convert an address to a checksummed format (EIP-55) [aliases:
--to-checksum-address, --to-checksum, to-checksum, ta, 2a]
to-dec Converts a number of one base to decimal [aliases: --to-dec, td, 2d]
to-fixed-point Convert an integer into a fixed point number [aliases: --to-fix, tf, 2f]
to-hex Converts a number of one base to another [aliases: --to-hex, th, 2h]
to-hexdata Normalize the input to lowercase, 0x-prefixed hex [aliases: --to-hexdata,
thd, 2hd]
to-int256 Convert a number to a hex-encoded int256 [aliases: --to-int256, ti, 2i]
to-rlp RLP encodes hex data, or an array of hex data [aliases: --to-rlp]
to-uint256 Convert a number to a hex-encoded uint256 [aliases: --to-uint256, tu, 2u]
to-unit Convert an ETH amount into another unit (ether, gwei or wei) [aliases:
--to-unit, tun, 2un]
to-utf8 Convert hex data to a utf-8 string [aliases: --to-utf8, tu8, 2u8]
to-wei Convert an ETH amount to wei [aliases: --to-wei, tw, 2w]
trace CLI arguments for `cast trace`
tx Get information about a transaction [aliases: t]
tx-pool Inspect the TxPool of a node [aliases: tp]
upload-signature Upload the given signatures to <https://openchain.xyz> [aliases: ups]
wallet Wallet management utilities [aliases: w]
Options:
-h, --help
Print help (see a summary with '-h')
-j, --threads <THREADS>
Number of threads to use. Specifying 0 defaults to the number of logical cores
[aliases: --jobs]
-V, --version
Print version
Display options:
--color <COLOR>
The color of the log messages
Possible values:
- auto: Intelligently guess whether to use color output (default)
- always: Force color output
- never: Force disable color output
--json
Format log messages as JSON
--md
Format log messages as Markdown
-q, --quiet
Do not print log messages
-v, --verbosity...
Verbosity level of the log messages.
Pass multiple times to increase the verbosity (e.g. -v, -vv, -vvv).
Depending on the context the verbosity levels have different meanings.
For example, the verbosity levels of the EVM are:
- 2 (-vv): Print logs for all tests.
- 3 (-vvv): Print execution traces for failing tests.
- 4 (-vvvv): Print execution traces for all tests, and setup traces for failing tests.
- 5 (-vvvvv): Print execution and setup traces for all tests, including storage changes
and
backtraces with line numbers.
Find more information in the book: https://getfoundry.sh/cast/overview
exec
/bin/bash -lc "python3 - <<'PY'
import json
with open('BYTECODE_BUNDLE.json') as f:
data=json.load(f)
print(data['artifact']['runtime_bytecode']['full'])
PY" in /tmp/codex-i34svh9b
succeeded in 0ms:
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
exec
/bin/bash -lc "python3 - <<'PY' > /tmp/runtime.hex
import json
with open('BYTECODE_BUNDLE.json') as f:
data=json.load(f)
print(data['artifact']['runtime_bytecode']['full'])
PY
cast disassemble "'$(cat /tmp/runtime.hex) | sed -n '"'1,280p'" in /tmp/codex-i34svh9b
succeeded in 0ms:
/bin/bash: line 1: /tmp/runtime.hex: Read-only file system
cat: /tmp/runtime.hex: No such file or directory
exec
/bin/bash -lc 'cast disassemble "$(python3 - <<'"'PY'
import json
with open('BYTECODE_BUNDLE.json') as f:
data=json.load(f)
print(data['artifact']['runtime_bytecode']['full'])
PY
)\" | sed -n '1,320p'" in /tmp/codex-i34svh9b
succeeded in 0ms:
00000000: PUSH1 0x60
00000002: PUSH1 0x40
00000004: MSTORE
00000005: CALLDATASIZE
00000006: ISZERO
00000007: PUSH2 0x00a3
0000000a: JUMPI
0000000b: PUSH1 0xe0
0000000d: PUSH1 0x02
0000000f: EXP
00000010: PUSH1 0x00
00000012: CALLDATALOAD
00000013: DIV
00000014: PUSH4 0x01984892
00000019: DUP2
0000001a: EQ
0000001b: PUSH2 0x00a5
0000001e: JUMPI
0000001f: DUP1
00000020: PUSH4 0x092b25e9
00000025: EQ
00000026: PUSH2 0x012f
00000029: JUMPI
0000002a: DUP1
0000002b: PUSH4 0x213b9eb8
00000030: EQ
00000031: PUSH2 0x01e1
00000034: JUMPI
00000035: DUP1
00000036: PUSH4 0x511b1df9
0000003b: EQ
0000003c: PUSH2 0x0241
0000003f: JUMPI
00000040: DUP1
00000041: PUSH4 0x7f445c24
00000046: EQ
00000047: PUSH2 0x0296
0000004a: JUMPI
0000004b: DUP1
0000004c: PUSH4 0xae999ece
00000051: EQ
00000052: PUSH2 0x02eb
00000055: JUMPI
00000056: DUP1
00000057: PUSH4 0xb5754045
0000005c: EQ
0000005d: PUSH2 0x0340
00000060: JUMPI
00000061: DUP1
00000062: PUSH4 0xc47f0027
00000067: EQ
00000068: PUSH2 0x03a0
0000006b: JUMPI
0000006c: DUP1
0000006d: PUSH4 0xccf4f413
00000072: EQ
00000073: PUSH2 0x03fd
00000076: JUMPI
00000077: DUP1
00000078: PUSH4 0xdd54a62f
0000007d: EQ
0000007e: PUSH2 0x045d
00000081: JUMPI
00000082: DUP1
00000083: PUSH4 0xdf55b41a
00000088: EQ
00000089: PUSH2 0x04b2
0000008c: JUMPI
0000008d: DUP1
0000008e: PUSH4 0xe51ace16
00000093: EQ
00000094: PUSH2 0x0507
00000097: JUMPI
00000098: DUP1
00000099: PUSH4 0xfd6f5430
0000009e: EQ
0000009f: PUSH2 0x0564
000000a2: JUMPI
000000a3: JUMPDEST
000000a4: STOP
000000a5: JUMPDEST
000000a6: PUSH2 0x05c4
000000a9: PUSH1 0x04
000000ab: CALLDATALOAD
000000ac: PUSH1 0x40
000000ae: DUP1
000000af: MLOAD
000000b0: PUSH1 0x20
000000b2: DUP2
000000b3: ADD
000000b4: SWAP1
000000b5: SWAP2
000000b6: MSTORE
000000b7: PUSH1 0x00
000000b9: DUP2
000000ba: MSTORE
000000bb: PUSH1 0xff
000000bd: PUSH1 0x02
000000bf: EXP
000000c0: PUSH1 0x01
000000c2: PUSH1 0xa0
000000c4: PUSH1 0x02
000000c6: EXP
000000c7: SUB
000000c8: DUP4
000000c9: AND
000000ca: PUSH1 0xa0
000000cc: PUSH1 0x02
000000ce: EXP
000000cf: DUP2
000000d0: LT
000000d1: ISZERO
000000d2: PUSH2 0x0002
000000d5: JUMPI
000000d6: ADD
000000d7: DUP1
000000d8: SLOAD
000000d9: PUSH1 0x40
000000db: DUP1
000000dc: MLOAD
000000dd: PUSH1 0x20
000000df: PUSH1 0x02
000000e1: PUSH1 0x01
000000e3: DUP6
000000e4: AND
000000e5: ISZERO
000000e6: PUSH2 0x0100
000000e9: MUL
000000ea: PUSH1 0x00
000000ec: NOT
000000ed: ADD
000000ee: SWAP1
000000ef: SWAP5
000000f0: AND
000000f1: SWAP4
000000f2: SWAP1
000000f3: SWAP4
000000f4: DIV
000000f5: PUSH1 0x1f
000000f7: DUP2
000000f8: ADD
000000f9: DUP5
000000fa: SWAP1
000000fb: DIV
000000fc: DUP5
000000fd: MUL
000000fe: DUP3
000000ff: ADD
00000100: DUP5
00000101: ADD
00000102: SWAP1
00000103: SWAP3
00000104: MSTORE
00000105: DUP2
00000106: DUP2
00000107: MSTORE
00000108: SWAP3
00000109: SWAP2
0000010a: DUP4
0000010b: ADD
0000010c: DUP3
0000010d: DUP3
0000010e: DUP1
0000010f: ISZERO
00000110: PUSH2 0x0a92
00000113: JUMPI
00000114: DUP1
00000115: PUSH1 0x1f
00000117: LT
00000118: PUSH2 0x0a67
0000011b: JUMPI
0000011c: PUSH2 0x0100
0000011f: DUP1
00000120: DUP4
00000121: SLOAD
00000122: DIV
00000123: MUL
00000124: DUP4
00000125: MSTORE
00000126: SWAP2
00000127: PUSH1 0x20
00000129: ADD
0000012a: SWAP2
0000012b: PUSH2 0x0a92
0000012e: JUMP
0000012f: JUMPDEST
00000130: PUSH2 0x00a3
00000133: PUSH1 0x04
00000135: DUP1
00000136: DUP1
00000137: CALLDATALOAD
00000138: SWAP1
00000139: PUSH1 0x20
0000013b: ADD
0000013c: SWAP1
0000013d: DUP3
0000013e: ADD
0000013f: DUP1
00000140: CALLDATALOAD
00000141: SWAP1
00000142: PUSH1 0x20
00000144: ADD
00000145: SWAP2
00000146: SWAP2
00000147: SWAP1
00000148: DUP1
00000149: DUP1
0000014a: PUSH1 0x1f
0000014c: ADD
0000014d: PUSH1 0x20
0000014f: DUP1
00000150: SWAP2
00000151: DIV
00000152: MUL
00000153: PUSH1 0x20
00000155: ADD
00000156: PUSH1 0x40
00000158: MLOAD
00000159: SWAP1
0000015a: DUP2
0000015b: ADD
0000015c: PUSH1 0x40
0000015e: MSTORE
0000015f: DUP1
00000160: SWAP4
00000161: SWAP3
00000162: SWAP2
00000163: SWAP1
00000164: DUP2
00000165: DUP2
00000166: MSTORE
00000167: PUSH1 0x20
00000169: ADD
0000016a: DUP4
0000016b: DUP4
0000016c: DUP1
0000016d: DUP3
0000016e: DUP5
0000016f: CALLDATACOPY
00000170: POP
00000171: SWAP5
00000172: SWAP7
00000173: POP
00000174: POP
00000175: SWAP4
00000176: CALLDATALOAD
00000177: SWAP4
00000178: POP
00000179: POP
0000017a: POP
0000017b: POP
0000017c: DUP2
0000017d: CALLER
0000017e: PUSH1 0x01
00000180: PUSH1 0xa0
00000182: PUSH1 0x02
00000184: EXP
00000185: SUB
00000186: AND
00000187: PUSH2 0x06c9
0000018a: DUP3
0000018b: JUMPDEST
0000018c: PUSH1 0x00
0000018e: PUSH1 0x00
00000190: PUSH1 0x00
00000192: POP
00000193: PUSH1 0x08
00000195: DUP4
00000196: PUSH1 0x40
00000198: MLOAD
00000199: DUP1
0000019a: DUP3
0000019b: DUP1
0000019c: MLOAD
0000019d: SWAP1
0000019e: PUSH1 0x20
000001a0: ADD
000001a1: SWAP1
000001a2: DUP1
000001a3: DUP4
000001a4: DUP4
000001a5: DUP3
000001a6: SWAP1
000001a7: PUSH1 0x00
000001a9: PUSH1 0x04
000001ab: PUSH1 0x20
000001ad: DUP5
000001ae: PUSH1 0x1f
000001b0: ADD
000001b1: DIV
000001b2: PUSH1 0x03
000001b4: MUL
000001b5: PUSH1 0x0f
000001b7: ADD
000001b8: CALL
000001b9: POP
000001ba: SWAP1
000001bb: SWAP2
000001bc: ADD
000001bd: DUP3
000001be: SWAP1
000001bf: SUB
000001c0: SWAP1
000001c1: SWAP2
000001c2: KECCAK256
000001c3: SWAP3
000001c4: SWAP1
000001c5: SWAP3
000001c6: DIV
000001c7: SWAP2
000001c8: POP
000001c9: POP
000001ca: PUSH1 0xfd
000001cc: PUSH1 0x02
000001ce: EXP
000001cf: DUP2
000001d0: LT
000001d1: ISZERO
000001d2: PUSH2 0x0002
000001d5: JUMPI
exec
/bin/bash -lc 'cast disassemble "$(python3 - <<'"'PY'
import json
with open('BYTECODE_BUNDLE.json') as f:
data=json.load(f)
print(data['artifact']['runtime_bytecode']['full'])
PY
)\" | sed -n '321,640p'" in /tmp/codex-i34svh9b
succeeded in 0ms:
000001d6: PUSH1 0x04
000001d8: MUL
000001d9: SWAP1
000001da: POP
000001db: SWAP1
000001dc: POP
000001dd: PUSH2 0x076e
000001e0: JUMP
000001e1: JUMPDEST
000001e2: PUSH2 0x00a3
000001e5: PUSH1 0x04
000001e7: DUP1
000001e8: DUP1
000001e9: CALLDATALOAD
000001ea: SWAP1
000001eb: PUSH1 0x20
000001ed: ADD
000001ee: SWAP1
000001ef: DUP3
000001f0: ADD
000001f1: DUP1
000001f2: CALLDATALOAD
000001f3: SWAP1
000001f4: PUSH1 0x20
000001f6: ADD
000001f7: SWAP2
000001f8: SWAP2
000001f9: SWAP1
000001fa: DUP1
000001fb: DUP1
000001fc: PUSH1 0x1f
000001fe: ADD
000001ff: PUSH1 0x20
00000201: DUP1
00000202: SWAP2
00000203: DIV
00000204: MUL
00000205: PUSH1 0x20
00000207: ADD
00000208: PUSH1 0x40
0000020a: MLOAD
0000020b: SWAP1
0000020c: DUP2
0000020d: ADD
0000020e: PUSH1 0x40
00000210: MSTORE
00000211: DUP1
00000212: SWAP4
00000213: SWAP3
00000214: SWAP2
00000215: SWAP1
00000216: DUP2
00000217: DUP2
00000218: MSTORE
00000219: PUSH1 0x20
0000021b: ADD
0000021c: DUP4
0000021d: DUP4
0000021e: DUP1
0000021f: DUP3
00000220: DUP5
00000221: CALLDATACOPY
00000222: POP
00000223: SWAP5
00000224: SWAP7
00000225: POP
00000226: POP
00000227: SWAP4
00000228: CALLDATALOAD
00000229: SWAP4
0000022a: POP
0000022b: POP
0000022c: POP
0000022d: POP
0000022e: DUP2
0000022f: CALLER
00000230: PUSH1 0x01
00000232: PUSH1 0xa0
00000234: PUSH1 0x02
00000236: EXP
00000237: SUB
00000238: AND
00000239: PUSH2 0x06e6
0000023c: DUP3
0000023d: PUSH2 0x018b
00000240: JUMP
00000241: JUMPDEST
00000242: PUSH2 0x0632
00000245: PUSH1 0x04
00000247: DUP1
00000248: DUP1
00000249: CALLDATALOAD
0000024a: SWAP1
0000024b: PUSH1 0x20
0000024d: ADD
0000024e: SWAP1
0000024f: DUP3
00000250: ADD
00000251: DUP1
00000252: CALLDATALOAD
00000253: SWAP1
00000254: PUSH1 0x20
00000256: ADD
00000257: SWAP2
00000258: SWAP2
00000259: SWAP1
0000025a: DUP1
0000025b: DUP1
0000025c: PUSH1 0x1f
0000025e: ADD
0000025f: PUSH1 0x20
00000261: DUP1
00000262: SWAP2
00000263: DIV
00000264: MUL
00000265: PUSH1 0x20
00000267: ADD
00000268: PUSH1 0x40
0000026a: MLOAD
0000026b: SWAP1
0000026c: DUP2
0000026d: ADD
0000026e: PUSH1 0x40
00000270: MSTORE
00000271: DUP1
00000272: SWAP4
00000273: SWAP3
00000274: SWAP2
00000275: SWAP1
00000276: DUP2
00000277: DUP2
00000278: MSTORE
00000279: PUSH1 0x20
0000027b: ADD
0000027c: DUP4
0000027d: DUP4
0000027e: DUP1
0000027f: DUP3
00000280: DUP5
00000281: CALLDATACOPY
00000282: POP
00000283: SWAP5
00000284: SWAP7
00000285: POP
00000286: POP
00000287: POP
00000288: POP
00000289: POP
0000028a: POP
0000028b: POP
0000028c: PUSH1 0x00
0000028e: PUSH2 0x0761
00000291: DUP3
00000292: PUSH2 0x018b
00000295: JUMP
00000296: JUMPDEST
00000297: PUSH2 0x0632
0000029a: PUSH1 0x04
0000029c: DUP1
0000029d: DUP1
0000029e: CALLDATALOAD
0000029f: SWAP1
000002a0: PUSH1 0x20
000002a2: ADD
000002a3: SWAP1
000002a4: DUP3
000002a5: ADD
000002a6: DUP1
000002a7: CALLDATALOAD
000002a8: SWAP1
000002a9: PUSH1 0x20
000002ab: ADD
000002ac: SWAP2
000002ad: SWAP2
000002ae: SWAP1
000002af: DUP1
000002b0: DUP1
000002b1: PUSH1 0x1f
000002b3: ADD
000002b4: PUSH1 0x20
000002b6: DUP1
000002b7: SWAP2
000002b8: DIV
000002b9: MUL
000002ba: PUSH1 0x20
000002bc: ADD
000002bd: PUSH1 0x40
000002bf: MLOAD
000002c0: SWAP1
000002c1: DUP2
000002c2: ADD
000002c3: PUSH1 0x40
000002c5: MSTORE
000002c6: DUP1
000002c7: SWAP4
000002c8: SWAP3
000002c9: SWAP2
000002ca: SWAP1
000002cb: DUP2
000002cc: DUP2
000002cd: MSTORE
000002ce: PUSH1 0x20
000002d0: ADD
000002d1: DUP4
000002d2: DUP4
000002d3: DUP1
000002d4: DUP3
000002d5: DUP5
000002d6: CALLDATACOPY
000002d7: POP
000002d8: SWAP5
000002d9: SWAP7
000002da: POP
000002db: POP
000002dc: POP
000002dd: POP
000002de: POP
000002df: POP
000002e0: POP
000002e1: PUSH1 0x00
000002e3: PUSH2 0x0773
000002e6: DUP3
000002e7: PUSH2 0x018b
000002ea: JUMP
000002eb: JUMPDEST
000002ec: PUSH2 0x00a3
000002ef: PUSH1 0x04
000002f1: DUP1
000002f2: DUP1
000002f3: CALLDATALOAD
000002f4: SWAP1
000002f5: PUSH1 0x20
000002f7: ADD
000002f8: SWAP1
000002f9: DUP3
000002fa: ADD
000002fb: DUP1
000002fc: CALLDATALOAD
000002fd: SWAP1
000002fe: PUSH1 0x20
00000300: ADD
00000301: SWAP2
00000302: SWAP2
00000303: SWAP1
00000304: DUP1
00000305: DUP1
00000306: PUSH1 0x1f
00000308: ADD
00000309: PUSH1 0x20
0000030b: DUP1
0000030c: SWAP2
0000030d: DIV
0000030e: MUL
0000030f: PUSH1 0x20
00000311: ADD
00000312: PUSH1 0x40
00000314: MLOAD
00000315: SWAP1
00000316: DUP2
00000317: ADD
00000318: PUSH1 0x40
0000031a: MSTORE
0000031b: DUP1
0000031c: SWAP4
0000031d: SWAP3
0000031e: SWAP2
0000031f: SWAP1
00000320: DUP2
00000321: DUP2
00000322: MSTORE
00000323: PUSH1 0x20
00000325: ADD
00000326: DUP4
00000327: DUP4
00000328: DUP1
00000329: DUP3
0000032a: DUP5
0000032b: CALLDATACOPY
0000032c: POP
0000032d: SWAP5
0000032e: SWAP7
0000032f: POP
00000330: POP
00000331: POP
00000332: POP
00000333: POP
00000334: POP
00000335: POP
00000336: PUSH1 0x00
00000338: PUSH2 0x091e
0000033b: DUP3
0000033c: PUSH2 0x018b
0000033f: JUMP
00000340: JUMPDEST
00000341: PUSH2 0x00a3
00000344: PUSH1 0x04
00000346: DUP1
00000347: DUP1
00000348: CALLDATALOAD
00000349: SWAP1
0000034a: PUSH1 0x20
0000034c: ADD
0000034d: SWAP1
0000034e: DUP3
0000034f: ADD
00000350: DUP1
00000351: CALLDATALOAD
00000352: SWAP1
00000353: PUSH1 0x20
00000355: ADD
00000356: SWAP2
00000357: SWAP2
00000358: SWAP1
00000359: DUP1
0000035a: DUP1
0000035b: PUSH1 0x1f
0000035d: ADD
0000035e: PUSH1 0x20
00000360: DUP1
00000361: SWAP2
exec
/bin/bash -lc 'cast disassemble "$(python3 - <<'"'PY'
import json
with open('BYTECODE_BUNDLE.json') as f:
data=json.load(f)
print(data['artifact']['runtime_bytecode']['full'])
PY
)\" | sed -n '641,960p'" in /tmp/codex-i34svh9b
succeeded in 0ms:
00000362: DIV
00000363: MUL
00000364: PUSH1 0x20
00000366: ADD
00000367: PUSH1 0x40
00000369: MLOAD
0000036a: SWAP1
0000036b: DUP2
0000036c: ADD
0000036d: PUSH1 0x40
0000036f: MSTORE
00000370: DUP1
00000371: SWAP4
00000372: SWAP3
00000373: SWAP2
00000374: SWAP1
00000375: DUP2
00000376: DUP2
00000377: MSTORE
00000378: PUSH1 0x20
0000037a: ADD
0000037b: DUP4
0000037c: DUP4
0000037d: DUP1
0000037e: DUP3
0000037f: DUP5
00000380: CALLDATACOPY
00000381: POP
00000382: SWAP5
00000383: SWAP7
00000384: POP
00000385: POP
00000386: SWAP4
00000387: CALLDATALOAD
00000388: SWAP4
00000389: POP
0000038a: POP
0000038b: POP
0000038c: POP
0000038d: DUP2
0000038e: CALLER
0000038f: PUSH1 0x01
00000391: PUSH1 0xa0
00000393: PUSH1 0x02
00000395: EXP
00000396: SUB
00000397: AND
00000398: PUSH2 0x098a
0000039b: DUP3
0000039c: PUSH2 0x018b
0000039f: JUMP
000003a0: JUMPDEST
000003a1: PUSH2 0x00a3
000003a4: PUSH1 0x04
000003a6: DUP1
000003a7: DUP1
000003a8: CALLDATALOAD
000003a9: SWAP1
000003aa: PUSH1 0x20
000003ac: ADD
000003ad: SWAP1
000003ae: DUP3
000003af: ADD
000003b0: DUP1
000003b1: CALLDATALOAD
000003b2: SWAP1
000003b3: PUSH1 0x20
000003b5: ADD
000003b6: SWAP2
000003b7: SWAP2
000003b8: SWAP1
000003b9: DUP1
000003ba: DUP1
000003bb: PUSH1 0x1f
000003bd: ADD
000003be: PUSH1 0x20
000003c0: DUP1
000003c1: SWAP2
000003c2: DIV
000003c3: MUL
000003c4: PUSH1 0x20
000003c6: ADD
000003c7: PUSH1 0x40
000003c9: MLOAD
000003ca: SWAP1
000003cb: DUP2
000003cc: ADD
000003cd: PUSH1 0x40
000003cf: MSTORE
000003d0: DUP1
000003d1: SWAP4
000003d2: SWAP3
000003d3: SWAP2
000003d4: SWAP1
000003d5: DUP2
000003d6: DUP2
000003d7: MSTORE
000003d8: PUSH1 0x20
000003da: ADD
000003db: DUP4
000003dc: DUP4
000003dd: DUP1
000003de: DUP3
000003df: DUP5
000003e0: CALLDATACOPY
000003e1: POP
000003e2: SWAP5
000003e3: SWAP7
000003e4: POP
000003e5: POP
000003e6: POP
000003e7: POP
000003e8: POP
000003e9: POP
000003ea: POP
000003eb: CALLER
000003ec: PUSH1 0x01
000003ee: PUSH1 0xa0
000003f0: PUSH1 0x02
000003f2: EXP
000003f3: SUB
000003f4: AND
000003f5: PUSH2 0x0820
000003f8: DUP3
000003f9: PUSH2 0x018b
000003fc: JUMP
000003fd: JUMPDEST
000003fe: PUSH2 0x00a3
00000401: PUSH1 0x04
00000403: DUP1
00000404: DUP1
00000405: CALLDATALOAD
00000406: SWAP1
00000407: PUSH1 0x20
00000409: ADD
0000040a: SWAP1
0000040b: DUP3
0000040c: ADD
0000040d: DUP1
0000040e: CALLDATALOAD
0000040f: SWAP1
00000410: PUSH1 0x20
00000412: ADD
00000413: SWAP2
00000414: SWAP2
00000415: SWAP1
00000416: DUP1
00000417: DUP1
00000418: PUSH1 0x1f
0000041a: ADD
0000041b: PUSH1 0x20
0000041d: DUP1
0000041e: SWAP2
0000041f: DIV
00000420: MUL
00000421: PUSH1 0x20
00000423: ADD
00000424: PUSH1 0x40
00000426: MLOAD
00000427: SWAP1
00000428: DUP2
00000429: ADD
0000042a: PUSH1 0x40
0000042c: MSTORE
0000042d: DUP1
0000042e: SWAP4
0000042f: SWAP3
00000430: SWAP2
00000431: SWAP1
00000432: DUP2
00000433: DUP2
00000434: MSTORE
00000435: PUSH1 0x20
00000437: ADD
00000438: DUP4
00000439: DUP4
0000043a: DUP1
0000043b: DUP3
0000043c: DUP5
0000043d: CALLDATACOPY
0000043e: POP
0000043f: SWAP5
00000440: SWAP7
00000441: POP
00000442: POP
00000443: SWAP4
00000444: CALLDATALOAD
00000445: SWAP4
00000446: POP
00000447: POP
00000448: POP
00000449: POP
0000044a: DUP2
0000044b: CALLER
0000044c: PUSH1 0x01
0000044e: PUSH1 0xa0
00000450: PUSH1 0x02
00000452: EXP
00000453: SUB
00000454: AND
00000455: PUSH2 0x0792
00000458: DUP3
00000459: PUSH2 0x018b
0000045c: JUMP
0000045d: JUMPDEST
0000045e: PUSH2 0x064f
00000461: PUSH1 0x04
00000463: DUP1
00000464: DUP1
00000465: CALLDATALOAD
00000466: SWAP1
00000467: PUSH1 0x20
00000469: ADD
0000046a: SWAP1
0000046b: DUP3
0000046c: ADD
0000046d: DUP1
0000046e: CALLDATALOAD
0000046f: SWAP1
00000470: PUSH1 0x20
00000472: ADD
00000473: SWAP2
00000474: SWAP2
00000475: SWAP1
00000476: DUP1
00000477: DUP1
00000478: PUSH1 0x1f
0000047a: ADD
0000047b: PUSH1 0x20
0000047d: DUP1
0000047e: SWAP2
0000047f: DIV
00000480: MUL
00000481: PUSH1 0x20
00000483: ADD
00000484: PUSH1 0x40
00000486: MLOAD
00000487: SWAP1
00000488: DUP2
00000489: ADD
0000048a: PUSH1 0x40
0000048c: MSTORE
0000048d: DUP1
0000048e: SWAP4
0000048f: SWAP3
00000490: SWAP2
00000491: SWAP1
00000492: DUP2
00000493: DUP2
00000494: MSTORE
00000495: PUSH1 0x20
00000497: ADD
00000498: DUP4
00000499: DUP4
0000049a: DUP1
0000049b: DUP3
0000049c: DUP5
0000049d: CALLDATACOPY
0000049e: POP
0000049f: SWAP5
000004a0: SWAP7
000004a1: POP
000004a2: POP
000004a3: POP
000004a4: POP
000004a5: POP
000004a6: POP
000004a7: POP
000004a8: PUSH1 0x00
000004aa: PUSH2 0x0787
000004ad: DUP3
000004ae: PUSH2 0x018b
000004b1: JUMP
000004b2: JUMPDEST
000004b3: PUSH2 0x0632
000004b6: PUSH1 0x04
000004b8: DUP1
000004b9: DUP1
000004ba: CALLDATALOAD
000004bb: SWAP1
000004bc: PUSH1 0x20
000004be: ADD
000004bf: SWAP1
000004c0: DUP3
000004c1: ADD
000004c2: DUP1
000004c3: CALLDATALOAD
000004c4: SWAP1
000004c5: PUSH1 0x20
000004c7: ADD
000004c8: SWAP2
000004c9: SWAP2
000004ca: SWAP1
000004cb: DUP1
000004cc: DUP1
000004cd: PUSH1 0x1f
000004cf: ADD
000004d0: PUSH1 0x20
000004d2: DUP1
000004d3: SWAP2
000004d4: DIV
000004d5: MUL
000004d6: PUSH1 0x20
000004d8: ADD
000004d9: PUSH1 0x40
000004db: MLOAD
000004dc: SWAP1
000004dd: DUP2
000004de: ADD
000004df: PUSH1 0x40
000004e1: MSTORE
000004e2: DUP1
000004e3: SWAP4
000004e4: SWAP3
000004e5: SWAP2
000004e6: SWAP1
000004e7: DUP2
000004e8: DUP2
000004e9: MSTORE
000004ea: PUSH1 0x20
exec
/bin/bash -lc 'cast disassemble "$(python3 - <<'"'PY'
import json
with open('BYTECODE_BUNDLE.json') as f:
data=json.load(f)
print(data['artifact']['runtime_bytecode']['full'])
PY
)\" | sed -n '961,1280p'" in /tmp/codex-i34svh9b
succeeded in 0ms:
000004ec: ADD
000004ed: DUP4
000004ee: DUP4
000004ef: DUP1
000004f0: DUP3
000004f1: DUP5
000004f2: CALLDATACOPY
000004f3: POP
000004f4: SWAP5
000004f5: SWAP7
000004f6: POP
000004f7: POP
000004f8: POP
000004f9: POP
000004fa: POP
000004fb: POP
000004fc: POP
000004fd: PUSH1 0x00
000004ff: PUSH2 0x0a53
00000502: DUP3
00000503: PUSH2 0x018b
00000506: JUMP
00000507: JUMPDEST
00000508: PUSH2 0x0661
0000050b: PUSH1 0x04
0000050d: DUP1
0000050e: DUP1
0000050f: CALLDATALOAD
00000510: SWAP1
00000511: PUSH1 0x20
00000513: ADD
00000514: SWAP1
00000515: DUP3
00000516: ADD
00000517: DUP1
00000518: CALLDATALOAD
00000519: SWAP1
0000051a: PUSH1 0x20
0000051c: ADD
0000051d: SWAP2
0000051e: SWAP2
0000051f: SWAP1
00000520: DUP1
00000521: DUP1
00000522: PUSH1 0x1f
00000524: ADD
00000525: PUSH1 0x20
00000527: DUP1
00000528: SWAP2
00000529: DIV
0000052a: MUL
0000052b: PUSH1 0x20
0000052d: ADD
0000052e: PUSH1 0x40
00000530: MLOAD
00000531: SWAP1
00000532: DUP2
00000533: ADD
00000534: PUSH1 0x40
00000536: MSTORE
00000537: DUP1
00000538: SWAP4
00000539: SWAP3
0000053a: SWAP2
0000053b: SWAP1
0000053c: DUP2
0000053d: DUP2
0000053e: MSTORE
0000053f: PUSH1 0x20
00000541: ADD
00000542: DUP4
00000543: DUP4
00000544: DUP1
00000545: DUP3
00000546: DUP5
00000547: CALLDATACOPY
00000548: POP
00000549: SWAP5
0000054a: SWAP7
0000054b: POP
0000054c: POP
0000054d: POP
0000054e: POP
0000054f: POP
00000550: POP
00000551: POP
00000552: PUSH1 0x00
00000554: PUSH1 0x00
00000556: PUSH1 0x00
00000558: PUSH1 0x00
0000055a: PUSH1 0x00
0000055c: PUSH2 0x0732
0000055f: DUP7
00000560: PUSH2 0x018b
00000563: JUMP
00000564: JUMPDEST
00000565: PUSH2 0x00a3
00000568: PUSH1 0x04
0000056a: DUP1
0000056b: DUP1
0000056c: CALLDATALOAD
0000056d: SWAP1
0000056e: PUSH1 0x20
00000570: ADD
00000571: SWAP1
00000572: DUP3
00000573: ADD
00000574: DUP1
00000575: CALLDATALOAD
00000576: SWAP1
00000577: PUSH1 0x20
00000579: ADD
0000057a: SWAP2
0000057b: SWAP2
0000057c: SWAP1
0000057d: DUP1
0000057e: DUP1
0000057f: PUSH1 0x1f
00000581: ADD
00000582: PUSH1 0x20
00000584: DUP1
00000585: SWAP2
00000586: DIV
00000587: MUL
00000588: PUSH1 0x20
0000058a: ADD
0000058b: PUSH1 0x40
0000058d: MLOAD
0000058e: SWAP1
0000058f: DUP2
00000590: ADD
00000591: PUSH1 0x40
00000593: MSTORE
00000594: DUP1
00000595: SWAP4
00000596: SWAP3
00000597: SWAP2
00000598: SWAP1
00000599: DUP2
0000059a: DUP2
0000059b: MSTORE
0000059c: PUSH1 0x20
0000059e: ADD
0000059f: DUP4
000005a0: DUP4
000005a1: DUP1
000005a2: DUP3
000005a3: DUP5
000005a4: CALLDATACOPY
000005a5: POP
000005a6: SWAP5
000005a7: SWAP7
000005a8: POP
000005a9: POP
000005aa: SWAP4
000005ab: CALLDATALOAD
000005ac: SWAP4
000005ad: POP
000005ae: POP
000005af: POP
000005b0: POP
000005b1: DUP2
000005b2: CALLER
000005b3: PUSH1 0x01
000005b5: PUSH1 0xa0
000005b7: PUSH1 0x02
000005b9: EXP
000005ba: SUB
000005bb: AND
000005bc: PUSH2 0x07e1
000005bf: DUP3
000005c0: PUSH2 0x018b
000005c3: JUMP
000005c4: JUMPDEST
000005c5: PUSH1 0x40
000005c7: MLOAD
000005c8: DUP1
000005c9: DUP1
000005ca: PUSH1 0x20
000005cc: ADD
000005cd: DUP3
000005ce: DUP2
000005cf: SUB
000005d0: DUP3
000005d1: MSTORE
000005d2: DUP4
000005d3: DUP2
000005d4: DUP2
000005d5: MLOAD
000005d6: DUP2
000005d7: MSTORE
000005d8: PUSH1 0x20
000005da: ADD
000005db: SWAP2
000005dc: POP
000005dd: DUP1
000005de: MLOAD
000005df: SWAP1
000005e0: PUSH1 0x20
000005e2: ADD
000005e3: SWAP1
000005e4: DUP1
000005e5: DUP4
000005e6: DUP4
000005e7: DUP3
000005e8: SWAP1
000005e9: PUSH1 0x00
000005eb: PUSH1 0x04
000005ed: PUSH1 0x20
000005ef: DUP5
000005f0: PUSH1 0x1f
000005f2: ADD
000005f3: DIV
000005f4: PUSH1 0x03
000005f6: MUL
000005f7: PUSH1 0x0f
000005f9: ADD
000005fa: CALL
000005fb: POP
000005fc: SWAP1
000005fd: POP
000005fe: SWAP1
000005ff: DUP2
00000600: ADD
00000601: SWAP1
00000602: PUSH1 0x1f
00000604: AND
00000605: DUP1
00000606: ISZERO
00000607: PUSH2 0x0624
0000060a: JUMPI
0000060b: DUP1
0000060c: DUP3
0000060d: SUB
0000060e: DUP1
0000060f: MLOAD
00000610: PUSH1 0x01
00000612: DUP4
00000613: PUSH1 0x20
00000615: SUB
00000616: PUSH2 0x0100
00000619: EXP
0000061a: SUB
0000061b: NOT
0000061c: AND
0000061d: DUP2
0000061e: MSTORE
0000061f: PUSH1 0x20
00000621: ADD
00000622: SWAP2
00000623: POP
00000624: JUMPDEST
00000625: POP
00000626: SWAP3
00000627: POP
00000628: POP
00000629: POP
0000062a: PUSH1 0x40
0000062c: MLOAD
0000062d: DUP1
0000062e: SWAP2
0000062f: SUB
00000630: SWAP1
00000631: RETURN
00000632: JUMPDEST
00000633: PUSH1 0x40
00000635: DUP1
00000636: MLOAD
00000637: PUSH1 0x01
00000639: PUSH1 0xa0
0000063b: PUSH1 0x02
0000063d: EXP
0000063e: SUB
0000063f: SWAP3
00000640: SWAP1
00000641: SWAP3
00000642: AND
00000643: DUP3
00000644: MSTORE
00000645: MLOAD
00000646: SWAP1
00000647: DUP2
00000648: SWAP1
00000649: SUB
0000064a: PUSH1 0x20
0000064c: ADD
0000064d: SWAP1
0000064e: RETURN
0000064f: JUMPDEST
00000650: PUSH1 0x40
00000652: DUP1
00000653: MLOAD
00000654: SWAP2
00000655: DUP3
00000656: MSTORE
00000657: MLOAD
00000658: SWAP1
00000659: DUP2
0000065a: SWAP1
0000065b: SUB
0000065c: PUSH1 0x20
0000065e: ADD
0000065f: SWAP1
00000660: RETURN
00000661: JUMPDEST
00000662: PUSH1 0x40
00000664: DUP1
00000665: MLOAD
00000666: PUSH1 0x01
00000668: PUSH1 0xa0
0000066a: PUSH1 0x02
0000066c: EXP
0000066d: SUB
0000066e: SWAP6
0000066f: DUP7
00000670: AND
00000671: DUP2
00000672: MSTORE
00000673: SWAP4
00000674: DUP6
exec
/bin/bash -lc 'cast disassemble "$(python3 - <<'"'PY'
import json
with open('BYTECODE_BUNDLE.json') as f:
data=json.load(f)
print(data['artifact']['runtime_bytecode']['full'])
PY
)\" | sed -n '1281,1600p'" in /tmp/codex-i34svh9b
succeeded in 0ms:
00000675: AND
00000676: PUSH1 0x20
00000678: DUP6
00000679: ADD
0000067a: MSTORE
0000067b: DUP4
0000067c: DUP2
0000067d: ADD
0000067e: SWAP3
0000067f: SWAP1
00000680: SWAP3
00000681: MSTORE
00000682: SWAP1
00000683: SWAP3
00000684: AND
00000685: PUSH1 0x60
00000687: DUP3
00000688: ADD
00000689: MSTORE
0000068a: SWAP1
0000068b: MLOAD
0000068c: SWAP1
0000068d: DUP2
0000068e: SWAP1
0000068f: SUB
00000690: PUSH1 0x80
00000692: ADD
00000693: SWAP1
00000694: RETURN
00000695: JUMPDEST
00000696: PUSH1 0x03
00000698: ADD
00000699: DUP1
0000069a: SLOAD
0000069b: PUSH1 0x01
0000069d: PUSH1 0xa0
0000069f: PUSH1 0x02
000006a1: EXP
000006a2: SUB
000006a3: NOT
000006a4: AND
000006a5: SWAP1
000006a6: SWAP2
000006a7: OR
000006a8: SWAP1
000006a9: SSTORE
000006aa: PUSH1 0x40
000006ac: MLOAD
000006ad: DUP4
000006ae: SWAP1
000006af: PUSH1 0x00
000006b1: DUP1
000006b2: MLOAD
000006b3: PUSH1 0x20
000006b5: PUSH2 0x0a9e
000006b8: DUP4
000006b9: CODECOPY
000006ba: DUP2
000006bb: MLOAD
000006bc: SWAP2
000006bd: MSTORE
000006be: SWAP1
000006bf: PUSH1 0x00
000006c1: SWAP1
000006c2: LOG2
000006c3: JUMPDEST
000006c4: POP
000006c5: JUMPDEST
000006c6: POP
000006c7: POP
000006c8: JUMP
000006c9: JUMPDEST
000006ca: PUSH1 0x03
000006cc: ADD
000006cd: SLOAD
000006ce: PUSH1 0x01
000006d0: PUSH1 0xa0
000006d2: PUSH1 0x02
000006d4: EXP
000006d5: SUB
000006d6: AND
000006d7: EQ
000006d8: ISZERO
000006d9: PUSH2 0x06c3
000006dc: JUMPI
000006dd: DUP2
000006de: PUSH2 0x0695
000006e1: DUP5
000006e2: PUSH2 0x018b
000006e5: JUMP
000006e6: JUMPDEST
000006e7: PUSH1 0x03
000006e9: ADD
000006ea: SLOAD
000006eb: PUSH1 0x01
000006ed: PUSH1 0xa0
000006ef: PUSH1 0x02
000006f1: EXP
000006f2: SUB
000006f3: AND
000006f4: EQ
000006f5: ISZERO
000006f6: PUSH2 0x06c3
000006f9: JUMPI
000006fa: DUP2
000006fb: PUSH2 0x0703
000006fe: DUP5
000006ff: PUSH2 0x018b
00000702: JUMP
00000703: JUMPDEST
00000704: DUP1
00000705: SLOAD
00000706: PUSH1 0x01
00000708: PUSH1 0xa0
0000070a: PUSH1 0x02
0000070c: EXP
0000070d: SUB
0000070e: NOT
0000070f: AND
00000710: SWAP1
00000711: SWAP2
00000712: OR
00000713: SWAP1
00000714: SSTORE
00000715: PUSH1 0x40
00000717: MLOAD
00000718: DUP4
00000719: SWAP1
0000071a: PUSH1 0x00
0000071c: DUP1
0000071d: MLOAD
0000071e: PUSH1 0x20
00000720: PUSH2 0x0a9e
00000723: DUP4
00000724: CODECOPY
00000725: DUP2
00000726: MLOAD
00000727: SWAP2
00000728: MSTORE
00000729: SWAP1
0000072a: PUSH1 0x00
0000072c: SWAP1
0000072d: LOG2
0000072e: POP
0000072f: POP
00000730: POP
00000731: JUMP
00000732: JUMPDEST
00000733: PUSH1 0x03
00000735: DUP2
00000736: ADD
00000737: SLOAD
00000738: DUP2
00000739: SLOAD
0000073a: PUSH1 0x01
0000073c: DUP4
0000073d: ADD
0000073e: SLOAD
0000073f: PUSH1 0x02
00000741: SWAP4
00000742: SWAP1
00000743: SWAP4
00000744: ADD
00000745: SLOAD
00000746: PUSH1 0x01
00000748: PUSH1 0xa0
0000074a: PUSH1 0x02
0000074c: EXP
0000074d: SUB
0000074e: SWAP2
0000074f: DUP3
00000750: AND
00000751: SWAP11
00000752: SWAP4
00000753: DUP3
00000754: AND
00000755: SWAP10
00000756: POP
00000757: SWAP8
00000758: POP
00000759: AND
0000075a: SWAP5
0000075b: POP
0000075c: SWAP3
0000075d: POP
0000075e: POP
0000075f: POP
00000760: JUMP
00000761: JUMPDEST
00000762: SLOAD
00000763: PUSH1 0x01
00000765: PUSH1 0xa0
00000767: PUSH1 0x02
00000769: EXP
0000076a: SUB
0000076b: AND
0000076c: SWAP1
0000076d: POP
0000076e: JUMPDEST
0000076f: SWAP2
00000770: SWAP1
00000771: POP
00000772: JUMP
00000773: JUMPDEST
00000774: PUSH1 0x01
00000776: ADD
00000777: SLOAD
00000778: PUSH1 0x01
0000077a: PUSH1 0xa0
0000077c: PUSH1 0x02
0000077e: EXP
0000077f: SUB
00000780: AND
00000781: SWAP1
00000782: POP
00000783: PUSH2 0x076e
00000786: JUMP
00000787: JUMPDEST
00000788: PUSH1 0x02
0000078a: ADD
0000078b: SLOAD
0000078c: SWAP1
0000078d: POP
0000078e: PUSH2 0x076e
00000791: JUMP
00000792: JUMPDEST
00000793: PUSH1 0x03
00000795: ADD
00000796: SLOAD
00000797: PUSH1 0x01
00000799: PUSH1 0xa0
0000079b: PUSH1 0x02
0000079d: EXP
0000079e: SUB
0000079f: AND
000007a0: EQ
000007a1: ISZERO
000007a2: PUSH2 0x06c3
000007a5: JUMPI
000007a6: DUP2
000007a7: PUSH2 0x07af
000007aa: DUP5
000007ab: PUSH2 0x018b
000007ae: JUMP
000007af: JUMPDEST
000007b0: PUSH1 0x01
000007b2: ADD
000007b3: DUP1
000007b4: SLOAD
000007b5: PUSH1 0x01
000007b7: PUSH1 0xa0
000007b9: PUSH1 0x02
000007bb: EXP
000007bc: SUB
000007bd: NOT
000007be: AND
000007bf: SWAP1
000007c0: SWAP2
000007c1: OR
000007c2: SWAP1
000007c3: SSTORE
000007c4: PUSH1 0x40
000007c6: MLOAD
000007c7: DUP4
000007c8: SWAP1
000007c9: PUSH1 0x00
000007cb: DUP1
000007cc: MLOAD
000007cd: PUSH1 0x20
000007cf: PUSH2 0x0a9e
000007d2: DUP4
000007d3: CODECOPY
000007d4: DUP2
000007d5: MLOAD
000007d6: SWAP2
000007d7: MSTORE
000007d8: SWAP1
000007d9: PUSH1 0x00
000007db: SWAP1
000007dc: LOG2
000007dd: POP
000007de: POP
000007df: POP
000007e0: JUMP
000007e1: JUMPDEST
000007e2: PUSH1 0x03
000007e4: ADD
000007e5: SLOAD
000007e6: PUSH1 0x01
000007e8: PUSH1 0xa0
000007ea: PUSH1 0x02
000007ec: EXP
000007ed: SUB
000007ee: AND
000007ef: EQ
000007f0: ISZERO
000007f1: PUSH2 0x06c3
000007f4: JUMPI
000007f5: DUP2
000007f6: PUSH2 0x07fe
000007f9: DUP5
000007fa: PUSH2 0x018b
000007fd: JUMP
000007fe: JUMPDEST
000007ff: PUSH1 0x02
00000801: ADD
00000802: SSTORE
00000803: PUSH1 0x40
00000805: MLOAD
00000806: DUP4
00000807: SWAP1
00000808: PUSH1 0x00
0000080a: DUP1
0000080b: MLOAD
0000080c: PUSH1 0x20
0000080e: PUSH2 0x0a9e
00000811: DUP4
00000812: CODECOPY
00000813: DUP2
00000814: MLOAD
exec
/bin/bash -lc 'cast disassemble "$(python3 - <<'"'PY'
import json
with open('BYTECODE_BUNDLE.json') as f:
data=json.load(f)
print(data['artifact']['runtime_bytecode']['full'])
PY
)\" | sed -n '1601,1920p'" in /tmp/codex-i34svh9b
succeeded in 0ms:
00000815: SWAP2
00000816: MSTORE
00000817: SWAP1
00000818: PUSH1 0x00
0000081a: SWAP1
0000081b: LOG2
0000081c: POP
0000081d: POP
0000081e: POP
0000081f: JUMP
00000820: JUMPDEST
00000821: SLOAD
00000822: PUSH1 0x01
00000824: PUSH1 0xa0
00000826: PUSH1 0x02
00000828: EXP
00000829: SUB
0000082a: AND
0000082b: EQ
0000082c: ISZERO
0000082d: PUSH2 0x08e7
00000830: JUMPI
00000831: PUSH1 0x40
00000833: MLOAD
00000834: DUP2
00000835: SWAP1
00000836: PUSH1 0x01
00000838: PUSH1 0xa0
0000083a: PUSH1 0x02
0000083c: EXP
0000083d: SUB
0000083e: CALLER
0000083f: AND
00000840: SWAP1
00000841: PUSH32 0xd31658ff34e42040e5b3559456497d23086d2b4c8ceb1d63798f3dbd3a8e0579
00000862: SWAP1
00000863: PUSH1 0x00
00000865: SWAP1
00000866: LOG3
00000867: DUP1
00000868: PUSH1 0xff
0000086a: PUSH1 0x02
0000086c: EXP
0000086d: PUSH1 0x01
0000086f: PUSH1 0xa0
00000871: PUSH1 0x02
00000873: EXP
00000874: SUB
00000875: CALLER
00000876: AND
00000877: PUSH1 0xa0
00000879: PUSH1 0x02
0000087b: EXP
0000087c: DUP2
0000087d: LT
0000087e: ISZERO
0000087f: PUSH2 0x0002
00000882: JUMPI
00000883: ADD
00000884: PUSH1 0x00
00000886: POP
00000887: SWAP1
00000888: DUP1
00000889: MLOAD
0000088a: SWAP1
0000088b: PUSH1 0x20
0000088d: ADD
0000088e: SWAP1
0000088f: DUP3
00000890: DUP1
00000891: SLOAD
00000892: PUSH1 0x01
00000894: DUP2
00000895: PUSH1 0x01
00000897: AND
00000898: ISZERO
00000899: PUSH2 0x0100
0000089c: MUL
0000089d: SUB
0000089e: AND
0000089f: PUSH1 0x02
000008a1: SWAP1
000008a2: DIV
000008a3: SWAP1
000008a4: PUSH1 0x00
000008a6: MSTORE
000008a7: PUSH1 0x20
000008a9: PUSH1 0x00
000008ab: KECCAK256
000008ac: SWAP1
000008ad: PUSH1 0x1f
000008af: ADD
000008b0: PUSH1 0x20
000008b2: SWAP1
000008b3: DIV
000008b4: DUP2
000008b5: ADD
000008b6: SWAP3
000008b7: DUP3
000008b8: PUSH1 0x1f
000008ba: LT
000008bb: PUSH2 0x08ea
000008be: JUMPI
000008bf: DUP1
000008c0: MLOAD
000008c1: PUSH1 0xff
000008c3: NOT
000008c4: AND
000008c5: DUP4
000008c6: DUP1
000008c7: ADD
000008c8: OR
000008c9: DUP6
000008ca: SSTORE
000008cb: JUMPDEST
000008cc: POP
000008cd: PUSH2 0x06c3
000008d0: SWAP3
000008d1: SWAP2
000008d2: POP
000008d3: JUMPDEST
000008d4: DUP1
000008d5: DUP3
000008d6: GT
000008d7: ISZERO
000008d8: PUSH2 0x091a
000008db: JUMPI
000008dc: PUSH1 0x00
000008de: DUP2
000008df: SSTORE
000008e0: PUSH1 0x01
000008e2: ADD
000008e3: PUSH2 0x08d3
000008e6: JUMP
000008e7: JUMPDEST
000008e8: POP
000008e9: JUMP
000008ea: JUMPDEST
000008eb: DUP3
000008ec: DUP1
000008ed: ADD
000008ee: PUSH1 0x01
000008f0: ADD
000008f1: DUP6
000008f2: SSTORE
000008f3: DUP3
000008f4: ISZERO
000008f5: PUSH2 0x08cb
000008f8: JUMPI
000008f9: SWAP2
000008fa: DUP3
000008fb: ADD
000008fc: JUMPDEST
000008fd: DUP3
000008fe: DUP2
000008ff: GT
00000900: ISZERO
00000901: PUSH2 0x08cb
00000904: JUMPI
00000905: DUP3
00000906: MLOAD
00000907: DUP3
00000908: PUSH1 0x00
0000090a: POP
0000090b: SSTORE
0000090c: SWAP2
0000090d: PUSH1 0x20
0000090f: ADD
00000910: SWAP2
00000911: SWAP1
00000912: PUSH1 0x01
00000914: ADD
00000915: SWAP1
00000916: PUSH2 0x08fc
00000919: JUMP
0000091a: JUMPDEST
0000091b: POP
0000091c: SWAP1
0000091d: JUMP
0000091e: JUMPDEST
0000091f: PUSH1 0x03
00000921: DUP2
00000922: ADD
00000923: SLOAD
00000924: SWAP1
00000925: SWAP2
00000926: POP
00000927: PUSH1 0x01
00000929: PUSH1 0xa0
0000092b: PUSH1 0x02
0000092d: EXP
0000092e: SUB
0000092f: AND
00000930: PUSH1 0x00
00000932: EQ
00000933: DUP1
00000934: ISZERO
00000935: PUSH2 0x0946
00000938: JUMPI
00000939: POP
0000093a: PUSH8 0x4563918244f40000
00000943: CALLVALUE
00000944: LT
00000945: ISZERO
00000946: JUMPDEST
00000947: DUP1
00000948: ISZERO
00000949: PUSH2 0x0954
0000094c: JUMPI
0000094d: POP
0000094e: PUSH1 0x09
00000950: DUP3
00000951: MLOAD
00000952: LT
00000953: ISZERO
00000954: JUMPDEST
00000955: ISZERO
00000956: PUSH2 0x06c5
00000959: JUMPI
0000095a: PUSH1 0x03
0000095c: DUP2
0000095d: ADD
0000095e: DUP1
0000095f: SLOAD
00000960: PUSH1 0x01
00000962: PUSH1 0xa0
00000964: PUSH1 0x02
00000966: EXP
00000967: SUB
00000968: NOT
00000969: AND
0000096a: CALLER
0000096b: OR
0000096c: SWAP1
0000096d: SSTORE
0000096e: PUSH1 0x40
00000970: MLOAD
00000971: DUP3
00000972: SWAP1
00000973: PUSH1 0x00
00000975: DUP1
00000976: MLOAD
00000977: PUSH1 0x20
00000979: PUSH2 0x0a9e
0000097c: DUP4
0000097d: CODECOPY
0000097e: DUP2
0000097f: MLOAD
00000980: SWAP2
00000981: MSTORE
00000982: SWAP1
00000983: PUSH1 0x00
00000985: SWAP1
00000986: LOG2
00000987: POP
00000988: POP
00000989: JUMP
0000098a: JUMPDEST
0000098b: PUSH1 0x03
0000098d: ADD
0000098e: SLOAD
0000098f: PUSH1 0x01
00000991: PUSH1 0xa0
00000993: PUSH1 0x02
00000995: EXP
00000996: SUB
00000997: AND
00000998: EQ
00000999: ISZERO
0000099a: PUSH2 0x06c3
0000099d: JUMPI
0000099e: PUSH1 0x00
000009a0: PUSH1 0x00
000009a2: POP
000009a3: PUSH1 0x08
000009a5: DUP5
000009a6: PUSH1 0x40
000009a8: MLOAD
000009a9: DUP1
000009aa: DUP3
000009ab: DUP1
000009ac: MLOAD
000009ad: SWAP1
000009ae: PUSH1 0x20
000009b0: ADD
000009b1: SWAP1
000009b2: DUP1
000009b3: DUP4
000009b4: DUP4
000009b5: DUP3
000009b6: SWAP1
000009b7: PUSH1 0x00
000009b9: PUSH1 0x04
000009bb: PUSH1 0x20
000009bd: DUP5
000009be: PUSH1 0x1f
000009c0: ADD
000009c1: DIV
000009c2: PUSH1 0x03
000009c4: MUL
000009c5: PUSH1 0x0f
000009c7: ADD
000009c8: CALL
000009c9: POP
000009ca: SWAP1
000009cb: SWAP2
000009cc: ADD
000009cd: DUP3
000009ce: SWAP1
000009cf: SUB
000009d0: SWAP1
000009d1: SWAP2
000009d2: KECCAK256
000009d3: SWAP3
000009d4: SWAP1
000009d5: SWAP3
000009d6: DIV
000009d7: SWAP2
000009d8: POP
000009d9: POP
exec
/bin/bash -lc 'cast disassemble "$(python3 - <<'"'PY'
import json
with open('BYTECODE_BUNDLE.json') as f:
data=json.load(f)
print(data['artifact']['runtime_bytecode']['full'])
PY
)\" | sed -n '1921,2240p'" in /tmp/codex-i34svh9b
succeeded in 0ms:
000009da: PUSH1 0xfd
000009dc: PUSH1 0x02
000009de: EXP
000009df: DUP2
000009e0: LT
000009e1: ISZERO
000009e2: PUSH2 0x0002
000009e5: JUMPI
000009e6: PUSH1 0x04
000009e8: MUL
000009e9: DUP1
000009ea: SLOAD
000009eb: PUSH1 0x01
000009ed: PUSH1 0xa0
000009ef: PUSH1 0x02
000009f1: EXP
000009f2: SUB
000009f3: NOT
000009f4: SWAP1
000009f5: DUP2
000009f6: AND
000009f7: DUP3
000009f8: SSTORE
000009f9: PUSH1 0x01
000009fb: DUP3
000009fc: ADD
000009fd: DUP1
000009fe: SLOAD
000009ff: DUP3
00000a00: AND
00000a01: SWAP1
00000a02: SSTORE
00000a03: PUSH1 0x02
00000a05: DUP3
00000a06: ADD
00000a07: DUP4
00000a08: SWAP1
00000a09: SSTORE
00000a0a: PUSH1 0x03
00000a0c: SWAP2
00000a0d: SWAP1
00000a0e: SWAP2
00000a0f: ADD
00000a10: DUP1
00000a11: SLOAD
00000a12: SWAP1
00000a13: SWAP2
00000a14: AND
00000a15: SWAP1
00000a16: SSTORE
00000a17: PUSH1 0x40
00000a19: MLOAD
00000a1a: PUSH1 0x01
00000a1c: PUSH1 0xa0
00000a1e: PUSH1 0x02
00000a20: EXP
00000a21: SUB
00000a22: DUP5
00000a23: AND
00000a24: SWAP2
00000a25: SWAP1
00000a26: PUSH8 0x4563918244f40000
00000a2f: SWAP1
00000a30: DUP3
00000a31: DUP2
00000a32: DUP2
00000a33: DUP2
00000a34: DUP6
00000a35: DUP9
00000a36: DUP4
00000a37: CALL
00000a38: POP
00000a39: DUP7
00000a3a: SWAP4
00000a3b: POP
00000a3c: PUSH1 0x00
00000a3e: DUP1
00000a3f: MLOAD
00000a40: PUSH1 0x20
00000a42: PUSH2 0x0a9e
00000a45: DUP4
00000a46: CODECOPY
00000a47: DUP2
00000a48: MLOAD
00000a49: SWAP2
00000a4a: MSTORE
00000a4b: SWAP3
00000a4c: SWAP2
00000a4d: POP
00000a4e: LOG2
00000a4f: POP
00000a50: POP
00000a51: POP
00000a52: JUMP
00000a53: JUMPDEST
00000a54: PUSH1 0x03
00000a56: ADD
00000a57: SLOAD
00000a58: PUSH1 0x01
00000a5a: PUSH1 0xa0
00000a5c: PUSH1 0x02
00000a5e: EXP
00000a5f: SUB
00000a60: AND
00000a61: SWAP1
00000a62: POP
00000a63: PUSH2 0x076e
00000a66: JUMP
00000a67: JUMPDEST
00000a68: DUP3
00000a69: ADD
00000a6a: SWAP2
00000a6b: SWAP1
00000a6c: PUSH1 0x00
00000a6e: MSTORE
00000a6f: PUSH1 0x20
00000a71: PUSH1 0x00
00000a73: KECCAK256
00000a74: SWAP1
00000a75: JUMPDEST
00000a76: DUP2
00000a77: SLOAD
00000a78: DUP2
00000a79: MSTORE
00000a7a: SWAP1
00000a7b: PUSH1 0x01
00000a7d: ADD
00000a7e: SWAP1
00000a7f: PUSH1 0x20
00000a81: ADD
00000a82: DUP1
00000a83: DUP4
00000a84: GT
00000a85: PUSH2 0x0a75
00000a88: JUMPI
00000a89: DUP3
00000a8a: SWAP1
00000a8b: SUB
00000a8c: PUSH1 0x1f
00000a8e: AND
00000a8f: DUP3
00000a90: ADD
00000a91: SWAP2
00000a92: JUMPDEST
00000a93: POP
00000a94: POP
00000a95: POP
00000a96: POP
00000a97: POP
00000a98: SWAP1
00000a99: POP
00000a9a: PUSH2 0x076e
00000a9d: JUMP
00000a9e: SHR
00000a9f: UNKNOWN(0xF7)
00000aa0: PUSH6 0x2f1f9289dc41
00000aa7: PUSH23
Finished reading the bytecode bundle and traced the meaningful state-changing paths. The remaining work is to serialize the audit conclusions into the required JSON schema.
✓ Inspect BYTECODE_BUNDLE.json and supporting artifacts to understand the contract architecture and evidence
✓ Evaluate potential security issues from bytecode-level evidence, focusing on requested categories
→ Produce JSON report matching the required schema
codex
{"no_findings":false,"summary":"The bytecode appears to implement a keyed registry with per-record owner checks, a 5 ETH payment threshold, reverse-name style storage, and one value-bearing external call. Two issues are meaningful from bytecode alone: the payable acquisition path fails open and can trap ETH on invalid attempts, and the 5 ETH payout path mutates storage before an unchecked external CALL, which can strand refunds if the recipient call fails. Selector/function names are inferred only from bytecode structure, so exact business semantics remain uncertain.","findings":[{"severity":"high","category":"other","title":"Payable acquisition path returns success on failed preconditions, trapping ETH","exploit_scenario":"The routine behind selector 0xae999ece appears to be a payable registration/acquisition path. It checks an owner-like slot at key+3, compares CALLVALUE against the embedded constant 0x4563918244f40000 (5 ether), and also checks a length-like value. If any check fails, execution jumps to the shared POP/JUMP return path instead of reverting. An attacker or malicious frontend can deliberately submit already-owned, oversized, or underfunded registrations; the transaction still succeeds and any ETH sent remains in the contract.","recommendation":"Make failed acquisition attempts revert. If the intended behavior is conditional acceptance, explicitly refund msg.value on rejection instead of returning success.","evidence":"At pc 0x091e-0x0956 the contract loads key+3, checks for zero, compares CALLVALUE to 0x4563918244f40000, and evaluates a length-like bound. Failure jumps to pc 0x06c5/0x06c3, which only unwinds the stack and returns to the dispatcher STOP path; there is no REVERT and no compensating transfer.","locations":["selector:0xae999ece","pc:0x091e","pc:0x0943","pc:0x0956","pc:0x06c5"]},{"severity":"medium","category":"other","title":"Unchecked 5 ETH external CALL after state mutation can strand refunds","exploit_scenario":"The owner-gated routine behind selector 0xb5754045 appears to clear or rewrite several storage fields for a record and then perform a 5 ETH CALL to a computed recipient. Because the CALL result is discarded, a reverting or non-payable recipient can make the transfer fail while the prior state changes remain committed. If this path is meant to release a deposit or settle a record, the caller can lose the right to retry the refund and the ether stays trapped in the contract.","recommendation":"Use a checked CALL and revert on failure, or switch to a pull-payment model where the recipient withdraws separately. If the state must change first, persist a claimable balance instead of assuming the transfer succeeded.","evidence":"In the 0x098a routine reached from selector 0xb5754045, storage is written at pc 0x09f8, 0x0a02, 0x0a09, and 0x0a16 before a value-bearing CALL at pc 0x0a37. The call embeds the same 5 ether constant 0x4563918244f40000, uses a computed target, and the return value is immediately POP'd rather than checked.","locations":["selector:0xb5754045","pc:0x09f8","pc:0x0a02","pc:0x0a09","pc:0x0a16","pc:0x0a37"]}]}
tokens used
74,488
{
"codex": {
"ran_at": "2026-04-04T21:46:59.997853+00:00",
"returncode": 0
},
"project": {
"mode": "bytecode",
"bytecode_length": 5502,
"bytecode_truncated": false,
"capability_graph_present": true,
"analysis_artifact_present": true
},
"summary": "The bytecode appears to implement a keyed registry with per-record owner checks, a 5 ETH payment threshold, reverse-name style storage, and one value-bearing external call. Two issues are meaningful from bytecode alone: the payable acquisition path fails open and can trap ETH on invalid attempts, and the 5 ETH payout path mutates storage before an unchecked external CALL, which can strand refunds if the recipient call fails. Selector/function names are inferred only from bytecode structure, so exact business semantics remain uncertain.",
"raw_final": {
"summary": "The bytecode appears to implement a keyed registry with per-record owner checks, a 5 ETH payment threshold, reverse-name style storage, and one value-bearing external call. Two issues are meaningful from bytecode alone: the payable acquisition path fails open and can trap ETH on invalid attempts, and the 5 ETH payout path mutates storage before an unchecked external CALL, which can strand refunds if the recipient call fails. Selector/function names are inferred only from bytecode structure, so exact business semantics remain uncertain.",
"findings": [
{
"title": "Payable acquisition path returns success on failed preconditions, trapping ETH",
"category": "other",
"evidence": "At pc 0x091e-0x0956 the contract loads key+3, checks for zero, compares CALLVALUE to 0x4563918244f40000, and evaluates a length-like bound. Failure jumps to pc 0x06c5/0x06c3, which only unwinds the stack and returns to the dispatcher STOP path; there is no REVERT and no compensating transfer.",
"severity": "high",
"locations": [
"selector:0xae999ece",
"pc:0x091e",
"pc:0x0943",
"pc:0x0956",
"pc:0x06c5"
],
"recommendation": "Make failed acquisition attempts revert. If the intended behavior is conditional acceptance, explicitly refund msg.value on rejection instead of returning success.",
"exploit_scenario": "The routine behind selector 0xae999ece appears to be a payable registration/acquisition path. It checks an owner-like slot at key+3, compares CALLVALUE against the embedded constant 0x4563918244f40000 (5 ether), and also checks a length-like value. If any check fails, execution jumps to the shared POP/JUMP return path instead of reverting. An attacker or malicious frontend can deliberately submit already-owned, oversized, or underfunded registrations; the transaction still succeeds and any ETH sent remains in the contract."
},
{
"title": "Unchecked 5 ETH external CALL after state mutation can strand refunds",
"category": "other",
"evidence": "In the 0x098a routine reached from selector 0xb5754045, storage is written at pc 0x09f8, 0x0a02, 0x0a09, and 0x0a16 before a value-bearing CALL at pc 0x0a37. The call embeds the same 5 ether constant 0x4563918244f40000, uses a computed target, and the return value is immediately POP'd rather than checked.",
"severity": "medium",
"locations": [
"selector:0xb5754045",
"pc:0x09f8",
"pc:0x0a02",
"pc:0x0a09",
"pc:0x0a16",
"pc:0x0a37"
],
"recommendation": "Use a checked CALL and revert on failure, or switch to a pull-payment model where the recipient withdraws separately. If the state must change first, persist a claimable balance instead of assuming the transfer succeeded.",
"exploit_scenario": "The owner-gated routine behind selector 0xb5754045 appears to clear or rewrite several storage fields for a record and then perform a 5 ETH CALL to a computed recipient. Because the CALL result is discarded, a reverting or non-payable recipient can make the transfer fail while the prior state changes remain committed. If this path is meant to release a deposit or settle a record, the caller can lose the right to retry the refund and the ether stays trapped in the contract."
}
],
"no_findings": false
},
"no_findings": false,
"schema_version": 1
}
00000000: PUSH1 0x60 00000002: PUSH1 0x40 00000004: MSTORE 00000005: CALLDATASIZE 00000006: ISZERO 00000007: PUSH2 0x00a3 0000000a: JUMPI 0000000b: PUSH1 0xe0 0000000d: PUSH1 0x02 0000000f: EXP 00000010: PUSH1 0x00 00000012: CALLDATALOAD 00000013: DIV 00000014: PUSH4 0x01984892 00000019: DUP2 0000001a: EQ 0000001b: PUSH2 0x00a5 0000001e: JUMPI 0000001f: DUP1 00000020: PUSH4 0x092b25e9 00000025: EQ 00000026: PUSH2 0x012f 00000029: JUMPI 0000002a: DUP1 0000002b: PUSH4 0x213b9eb8 00000030: EQ 00000031: PUSH2 0x01e1 00000034: JUMPI 00000035: DUP1 00000036: PUSH4 0x511b1df9 0000003b: EQ 0000003c: PUSH2 0x0241 0000003f: JUMPI 00000040: DUP1 00000041: PUSH4 0x7f445c24 00000046: EQ 00000047: PUSH2 0x0296 0000004a: JUMPI 0000004b: DUP1 0000004c: PUSH4 0xae999ece 00000051: EQ 00000052: PUSH2 0x02eb 00000055: JUMPI 00000056: DUP1 00000057: PUSH4 0xb5754045 0000005c: EQ 0000005d: PUSH2 0x0340 00000060: JUMPI 00000061: DUP1 00000062: PUSH4 0xc47f0027 00000067: EQ 00000068: PUSH2 0x03a0 0000006b: JUMPI 0000006c: DUP1 0000006d: PUSH4 0xccf4f413 00000072: EQ 00000073: PUSH2 0x03fd 00000076: JUMPI 00000077: DUP1 00000078: PUSH4 0xdd54a62f 0000007d: EQ 0000007e: PUSH2 0x045d 00000081: JUMPI 00000082: DUP1 00000083: PUSH4 0xdf55b41a 00000088: EQ 00000089: PUSH2 0x04b2 0000008c: JUMPI 0000008d: DUP1 0000008e: PUSH4 0xe51ace16 00000093: EQ 00000094: PUSH2 0x0507 00000097: JUMPI 00000098: DUP1 00000099: PUSH4 0xfd6f5430 0000009e: EQ 0000009f: PUSH2 0x0564 000000a2: JUMPI 000000a3: JUMPDEST 000000a4: STOP 000000a5: JUMPDEST 000000a6: PUSH2 0x05c4 000000a9: PUSH1 0x04 000000ab: CALLDATALOAD 000000ac: PUSH1 0x40 000000ae: DUP1 000000af: MLOAD 000000b0: PUSH1 0x20 000000b2: DUP2 000000b3: ADD 000000b4: SWAP1 000000b5: SWAP2 000000b6: MSTORE 000000b7: PUSH1 0x00 000000b9: DUP2 000000ba: MSTORE 000000bb: PUSH1 0xff 000000bd: PUSH1 0x02 000000bf: EXP 000000c0: PUSH1 0x01 000000c2: PUSH1 0xa0 000000c4: PUSH1 0x02 000000c6: EXP 000000c7: SUB 000000c8: DUP4 000000c9: AND 000000ca: PUSH1 0xa0 000000cc: PUSH1 0x02 000000ce: EXP 000000cf: DUP2 000000d0: LT 000000d1: ISZERO 000000d2: PUSH2 0x0002 000000d5: JUMPI 000000d6: ADD 000000d7: DUP1 000000d8: SLOAD 000000d9: PUSH1 0x40 000000db: DUP1 000000dc: MLOAD 000000dd: PUSH1 0x20 000000df: PUSH1 0x02 000000e1: PUSH1 0x01 000000e3: DUP6 000000e4: AND 000000e5: ISZERO 000000e6: PUSH2 0x0100 000000e9: MUL 000000ea: PUSH1 0x00 000000ec: NOT 000000ed: ADD 000000ee: SWAP1 000000ef: SWAP5 000000f0: AND 000000f1: SWAP4 000000f2: SWAP1 000000f3: SWAP4 000000f4: DIV 000000f5: PUSH1 0x1f 000000f7: DUP2 000000f8: ADD 000000f9: DUP5 000000fa: SWAP1 000000fb: DIV 000000fc: DUP5 000000fd: MUL 000000fe: DUP3 000000ff: ADD 00000100: DUP5 00000101: ADD 00000102: SWAP1 00000103: SWAP3 00000104: MSTORE 00000105: DUP2 00000106: DUP2 00000107: MSTORE 00000108: SWAP3 00000109: SWAP2 0000010a: DUP4 0000010b: ADD 0000010c: DUP3 0000010d: DUP3 0000010e: DUP1 0000010f: ISZERO 00000110: PUSH2 0x0a92 00000113: JUMPI 00000114: DUP1 00000115: PUSH1 0x1f 00000117: LT 00000118: PUSH2 0x0a67 0000011b: JUMPI 0000011c: PUSH2 0x0100 0000011f: DUP1 00000120: DUP4 00000121: SLOAD 00000122: DIV 00000123: MUL 00000124: DUP4 00000125: MSTORE 00000126: SWAP2 00000127: PUSH1 0x20 00000129: ADD 0000012a: SWAP2 0000012b: PUSH2 0x0a92 0000012e: JUMP 0000012f: JUMPDEST 00000130: PUSH2 0x00a3 00000133: PUSH1 0x04 00000135: DUP1 00000136: DUP1 00000137: CALLDATALOAD 00000138: SWAP1 00000139: PUSH1 0x20 0000013b: ADD 0000013c: SWAP1 0000013d: DUP3 0000013e: ADD 0000013f: DUP1 00000140: CALLDATALOAD 00000141: SWAP1 00000142: PUSH1 0x20 00000144: ADD 00000145: SWAP2 00000146: SWAP2 00000147: SWAP1 00000148: DUP1 00000149: DUP1 0000014a: PUSH1 0x1f 0000014c: ADD 0000014d: PUSH1 0x20 0000014f: DUP1 00000150: SWAP2 00000151: DIV 00000152: MUL 00000153: PUSH1 0x20 00000155: ADD 00000156: PUSH1 0x40 00000158: MLOAD 00000159: SWAP1 0000015a: DUP2 0000015b: ADD 0000015c: PUSH1 0x40 0000015e: MSTORE 0000015f: DUP1 00000160: SWAP4 00000161: SWAP3 00000162: SWAP2 00000163: SWAP1 00000164: DUP2 00000165: DUP2 00000166: MSTORE 00000167: PUSH1 0x20 00000169: ADD 0000016a: DUP4 0000016b: DUP4 0000016c: DUP1 0000016d: DUP3 0000016e: DUP5 0000016f: CALLDATACOPY 00000170: POP 00000171: SWAP5 00000172: SWAP7 00000173: POP 00000174: POP 00000175: SWAP4 00000176: CALLDATALOAD 00000177: SWAP4 00000178: POP 00000179: POP 0000017a: POP 0000017b: POP 0000017c: DUP2 0000017d: CALLER 0000017e: PUSH1 0x01 00000180: PUSH1 0xa0 00000182: PUSH1 0x02 00000184: EXP 00000185: SUB 00000186: AND 00000187: PUSH2 0x06c9 0000018a: DUP3 0000018b: JUMPDEST 0000018c: PUSH1 0x00 0000018e: PUSH1 0x00 00000190: PUSH1 0x00 00000192: POP 00000193: PUSH1 0x08 00000195: DUP4 00000196: PUSH1 0x40 00000198: MLOAD 00000199: DUP1 0000019a: DUP3 0000019b: DUP1 0000019c: MLOAD 0000019d: SWAP1 0000019e: PUSH1 0x20 000001a0: ADD 000001a1: SWAP1 000001a2: DUP1 000001a3: DUP4 000001a4: DUP4 000001a5: DUP3 000001a6: SWAP1 000001a7: PUSH1 0x00 000001a9: PUSH1 0x04 000001ab: PUSH1 0x20 000001ad: DUP5 000001ae: PUSH1 0x1f 000001b0: ADD 000001b1: DIV 000001b2: PUSH1 0x03 000001b4: MUL 000001b5: PUSH1 0x0f 000001b7: ADD 000001b8: CALL 000001b9: POP 000001ba: SWAP1 000001bb: SWAP2 000001bc: ADD 000001bd: DUP3 000001be: SWAP1 000001bf: SUB 000001c0: SWAP1 000001c1: SWAP2 000001c2: KECCAK256 000001c3: SWAP3 000001c4: SWAP1 000001c5: SWAP3 000001c6: DIV 000001c7: SWAP2 000001c8: POP 000001c9: POP 000001ca: PUSH1 0xfd 000001cc: PUSH1 0x02 000001ce: EXP 000001cf: DUP2 000001d0: LT 000001d1: ISZERO 000001d2: PUSH2 0x0002 000001d5: JUMPI 000001d6: PUSH1 0x04 000001d8: MUL 000001d9: SWAP1 000001da: POP 000001db: SWAP1 000001dc: POP 000001dd: PUSH2 0x076e 000001e0: JUMP 000001e1: JUMPDEST 000001e2: PUSH2 0x00a3 000001e5: PUSH1 0x04 000001e7: DUP1 000001e8: DUP1 000001e9: CALLDATALOAD 000001ea: SWAP1 000001eb: PUSH1 0x20 000001ed: ADD 000001ee: SWAP1 000001ef: DUP3 000001f0: ADD 000001f1: DUP1 000001f2: CALLDATALOAD 000001f3: SWAP1 000001f4: PUSH1 0x20 000001f6: ADD 000001f7: SWAP2 000001f8: SWAP2 000001f9: SWAP1 000001fa: DUP1 000001fb: DUP1 000001fc: PUSH1 0x1f 000001fe: ADD 000001ff: PUSH1 0x20 00000201: DUP1 00000202: SWAP2 00000203: DIV 00000204: MUL 00000205: PUSH1 0x20 00000207: ADD 00000208: PUSH1 0x40 0000020a: MLOAD 0000020b: SWAP1 0000020c: DUP2 0000020d: ADD 0000020e: PUSH1 0x40 00000210: MSTORE 00000211: DUP1 00000212: SWAP4 00000213: SWAP3 00000214: SWAP2 00000215: SWAP1 00000216: DUP2 00000217: DUP2 00000218: MSTORE 00000219: PUSH1 0x20 0000021b: ADD 0000021c: DUP4 0000021d: DUP4 0000021e: DUP1 0000021f: DUP3 00000220: DUP5 00000221: CALLDATACOPY 00000222: POP 00000223: SWAP5 00000224: SWAP7 00000225: POP 00000226: POP 00000227: SWAP4 00000228: CALLDATALOAD 00000229: SWAP4 0000022a: POP 0000022b: POP 0000022c: POP 0000022d: POP 0000022e: DUP2 0000022f: CALLER 00000230: PUSH1 0x01 00000232: PUSH1 0xa0 00000234: PUSH1 0x02 00000236: EXP 00000237: SUB 00000238: AND 00000239: PUSH2 0x06e6 0000023c: DUP3 0000023d: PUSH2 0x018b 00000240: JUMP 00000241: JUMPDEST 00000242: PUSH2 0x0632 00000245: PUSH1 0x04 00000247: DUP1 00000248: DUP1 00000249: CALLDATALOAD 0000024a: SWAP1 0000024b: PUSH1 0x20 0000024d: ADD 0000024e: SWAP1 0000024f: DUP3 00000250: ADD 00000251: DUP1 00000252: CALLDATALOAD 00000253: SWAP1 00000254: PUSH1 0x20 00000256: ADD 00000257: SWAP2 00000258: SWAP2 00000259: SWAP1 0000025a: DUP1 0000025b: DUP1 0000025c: PUSH1 0x1f 0000025e: ADD 0000025f: PUSH1 0x20 00000261: DUP1 00000262: SWAP2 00000263: DIV 00000264: MUL 00000265: PUSH1 0x20 00000267: ADD 00000268: PUSH1 0x40 0000026a: MLOAD 0000026b: SWAP1 0000026c: DUP2 0000026d: ADD 0000026e: PUSH1 0x40 00000270: MSTORE 00000271: DUP1 00000272: SWAP4 00000273: SWAP3 00000274: SWAP2 00000275: SWAP1 00000276: DUP2 00000277: DUP2 00000278: MSTORE 00000279: PUSH1 0x20 0000027b: ADD 0000027c: DUP4 0000027d: DUP4 0000027e: DUP1 0000027f: DUP3 00000280: DUP5 00000281: CALLDATACOPY 00000282: POP 00000283: SWAP5 00000284: SWAP7 00000285: POP 00000286: POP 00000287: POP 00000288: POP 00000289: POP 0000028a: POP 0000028b: POP 0000028c: PUSH1 0x00 0000028e: PUSH2 0x0761 00000291: DUP3 00000292: PUSH2 0x018b 00000295: JUMP 00000296: JUMPDEST 00000297: PUSH2 0x0632 0000029a: PUSH1 0x04 0000029c: DUP1 0000029d: DUP1 0000029e: CALLDATALOAD 0000029f: SWAP1 000002a0: PUSH1 0x20 000002a2: ADD 000002a3: SWAP1 000002a4: DUP3 000002a5: ADD 000002a6: DUP1 000002a7: CALLDATALOAD 000002a8: SWAP1 000002a9: PUSH1 0x20 000002ab: ADD 000002ac: SWAP2 000002ad: SWAP2 000002ae: SWAP1 000002af: DUP1 000002b0: DUP1 000002b1: PUSH1 0x1f 000002b3: ADD 000002b4: PUSH1 0x20 000002b6: DUP1 000002b7: SWAP2 000002b8: DIV 000002b9: MUL 000002ba: PUSH1 0x20 000002bc: ADD 000002bd: PUSH1 0x40 000002bf: MLOAD 000002c0: SWAP1 000002c1: DUP2 000002c2: ADD 000002c3: PUSH1 0x40 000002c5: MSTORE 000002c6: DUP1 000002c7: SWAP4 000002c8: SWAP3 000002c9: SWAP2 000002ca: SWAP1 000002cb: DUP2 000002cc: DUP2 000002cd: MSTORE 000002ce: PUSH1 0x20 000002d0: ADD 000002d1: DUP4 000002d2: DUP4 000002d3: DUP1 000002d4: DUP3 000002d5: DUP5 000002d6: CALLDATACOPY 000002d7: POP 000002d8: SWAP5 000002d9: SWAP7 000002da: POP 000002db: POP 000002dc: POP 000002dd: POP 000002de: POP 000002df: POP 000002e0: POP 000002e1: PUSH1 0x00 000002e3: PUSH2 0x0773 000002e6: DUP3 000002e7: PUSH2 0x018b 000002ea: JUMP 000002eb: JUMPDEST 000002ec: PUSH2 0x00a3 000002ef: PUSH1 0x04 000002f1: DUP1 000002f2: DUP1 000002f3: CALLDATALOAD 000002f4: SWAP1 000002f5: PUSH1 0x20 000002f7: ADD 000002f8: SWAP1 000002f9: DUP3 000002fa: ADD 000002fb: DUP1 000002fc: CALLDATALOAD 000002fd: SWAP1 000002fe: PUSH1 0x20 00000300: ADD 00000301: SWAP2 00000302: SWAP2 00000303: SWAP1 00000304: DUP1 00000305: DUP1 00000306: PUSH1 0x1f 00000308: ADD 00000309: PUSH1 0x20 0000030b: DUP1 0000030c: SWAP2 0000030d: DIV 0000030e: MUL 0000030f: PUSH1 0x20 00000311: ADD 00000312: PUSH1 0x40 00000314: MLOAD 00000315: SWAP1 00000316: DUP2 00000317: ADD 00000318: PUSH1 0x40 0000031a: MSTORE 0000031b: DUP1 0000031c: SWAP4 0000031d: SWAP3 0000031e: SWAP2 0000031f: SWAP1 00000320: DUP2 00000321: DUP2 00000322: MSTORE 00000323: PUSH1 0x20 00000325: ADD 00000326: DUP4 00000327: DUP4 00000328: DUP1 00000329: DUP3 0000032a: DUP5 0000032b: CALLDATACOPY 0000032c: POP 0000032d: SWAP5 0000032e: SWAP7 0000032f: POP 00000330: POP 00000331: POP 00000332: POP 00000333: POP 00000334: POP 00000335: POP 00000336: PUSH1 0x00 00000338: PUSH2 0x091e 0000033b: DUP3 0000033c: PUSH2 0x018b 0000033f: JUMP 00000340: JUMPDEST 00000341: PUSH2 0x00a3 00000344: PUSH1 0x04 00000346: DUP1 00000347: DUP1 00000348: CALLDATALOAD 00000349: SWAP1 0000034a: PUSH1 0x20 0000034c: ADD 0000034d: SWAP1 0000034e: DUP3 0000034f: ADD 00000350: DUP1 00000351: CALLDATALOAD 00000352: SWAP1 00000353: PUSH1 0x20 00000355: ADD 00000356: SWAP2 00000357: SWAP2 00000358: SWAP1 00000359: DUP1 0000035a: DUP1 0000035b: PUSH1 0x1f 0000035d: ADD 0000035e: PUSH1 0x20 00000360: DUP1 00000361: SWAP2 00000362: DIV 00000363: MUL 00000364: PUSH1 0x20 00000366: ADD 00000367: PUSH1 0x40 00000369: MLOAD 0000036a: SWAP1 0000036b: DUP2 0000036c: ADD 0000036d: PUSH1 0x40 0000036f: MSTORE 00000370: DUP1 00000371: SWAP4 00000372: SWAP3 00000373: SWAP2 00000374: SWAP1 00000375: DUP2 00000376: DUP2 00000377: MSTORE 00000378: PUSH1 0x20 0000037a: ADD 0000037b: DUP4 0000037c: DUP4 0000037d: DUP1 0000037e: DUP3 0000037f: DUP5 00000380: CALLDATACOPY 00000381: POP 00000382: SWAP5 00000383: SWAP7 00000384: POP 00000385: POP 00000386: SWAP4 00000387: CALLDATALOAD 00000388: SWAP4 00000389: POP 0000038a: POP 0000038b: POP 0000038c: POP 0000038d: DUP2 0000038e: CALLER 0000038f: PUSH1 0x01 00000391: PUSH1 0xa0 00000393: PUSH1 0x02 00000395: EXP 00000396: SUB 00000397: AND 00000398: PUSH2 0x098a 0000039b: DUP3 0000039c: PUSH2 0x018b 0000039f: JUMP 000003a0: JUMPDEST 000003a1: PUSH2 0x00a3 000003a4: PUSH1 0x04 000003a6: DUP1 000003a7: DUP1 000003a8: CALLDATALOAD 000003a9: SWAP1 000003aa: PUSH1 0x20 000003ac: ADD 000003ad: SWAP1 000003ae: DUP3 000003af: ADD 000003b0: DUP1 000003b1: CALLDATALOAD 000003b2: SWAP1 000003b3: PUSH1 0x20 000003b5: ADD 000003b6: SWAP2 000003b7: SWAP2 000003b8: SWAP1 000003b9: DUP1 000003ba: DUP1 000003bb: PUSH1 0x1f 000003bd: ADD 000003be: PUSH1 0x20 000003c0: DUP1 000003c1: SWAP2 000003c2: DIV 000003c3: MUL 000003c4: PUSH1 0x20 000003c6: ADD 000003c7: PUSH1 0x40 000003c9: MLOAD 000003ca: SWAP1 000003cb: DUP2 000003cc: ADD 000003cd: PUSH1 0x40 000003cf: MSTORE 000003d0: DUP1 000003d1: SWAP4 000003d2: SWAP3 000003d3: SWAP2 000003d4: SWAP1 000003d5: DUP2 000003d6: DUP2 000003d7: MSTORE 000003d8: PUSH1 0x20 000003da: ADD 000003db: DUP4 000003dc: DUP4 000003dd: DUP1 000003de: DUP3 000003df: DUP5 000003e0: CALLDATACOPY 000003e1: POP 000003e2: SWAP5 000003e3: SWAP7 000003e4: POP 000003e5: POP 000003e6: POP 000003e7: POP 000003e8: POP 000003e9: POP 000003ea: POP 000003eb: CALLER 000003ec: PUSH1 0x01 000003ee: PUSH1 0xa0 000003f0: PUSH1 0x02 000003f2: EXP 000003f3: SUB 000003f4: AND 000003f5: PUSH2 0x0820 000003f8: DUP3 000003f9: PUSH2 0x018b 000003fc: JUMP 000003fd: JUMPDEST 000003fe: PUSH2 0x00a3 00000401: PUSH1 0x04 00000403: DUP1 00000404: DUP1 00000405: CALLDATALOAD 00000406: SWAP1 00000407: PUSH1 0x20 00000409: ADD 0000040a: SWAP1 0000040b: DUP3 0000040c: ADD 0000040d: DUP1 0000040e: CALLDATALOAD 0000040f: SWAP1 00000410: PUSH1 0x20 00000412: ADD 00000413: SWAP2 00000414: SWAP2 00000415: SWAP1 00000416: DUP1 00000417: DUP1 00000418: PUSH1 0x1f 0000041a: ADD 0000041b: PUSH1 0x20 0000041d: DUP1 0000041e: SWAP2 0000041f: DIV 00000420: MUL 00000421: PUSH1 0x20 00000423: ADD 00000424: PUSH1 0x40 00000426: MLOAD 00000427: SWAP1 00000428: DUP2 00000429: ADD 0000042a: PUSH1 0x40 0000042c: MSTORE 0000042d: DUP1 0000042e: SWAP4 0000042f: SWAP3 00000430: SWAP2 00000431: SWAP1 00000432: DUP2 00000433: DUP2 00000434: MSTORE 00000435: PUSH1 0x20 00000437: ADD 00000438: DUP4 00000439: DUP4 0000043a: DUP1 0000043b: DUP3 0000043c: DUP5 0000043d: CALLDATACOPY 0000043e: POP 0000043f: SWAP5 00000440: SWAP7 00000441: POP 00000442: POP 00000443: SWAP4 00000444: CALLDATALOAD 00000445: SWAP4 00000446: POP 00000447: POP 00000448: POP 00000449: POP 0000044a: DUP2 0000044b: CALLER 0000044c: PUSH1 0x01 0000044e: PUSH1 0xa0 00000450: PUSH1 0x02 00000452: EXP 00000453: SUB 00000454: AND 00000455: PUSH2 0x0792 00000458: DUP3 00000459: PUSH2 0x018b 0000045c: JUMP 0000045d: JUMPDEST 0000045e: PUSH2 0x064f 00000461: PUSH1 0x04 00000463: DUP1 00000464: DUP1 00000465: CALLDATALOAD 00000466: SWAP1 00000467: PUSH1 0x20 00000469: ADD 0000046a: SWAP1 0000046b: DUP3 0000046c: ADD 0000046d: DUP1 0000046e: CALLDATALOAD 0000046f: SWAP1 00000470: PUSH1 0x20 00000472: ADD 00000473: SWAP2 00000474: SWAP2 00000475: SWAP1 00000476: DUP1 00000477: DUP1 00000478: PUSH1 0x1f 0000047a: ADD 0000047b: PUSH1 0x20 0000047d: DUP1 0000047e: SWAP2 0000047f: DIV 00000480: MUL 00000481: PUSH1 0x20 00000483: ADD 00000484: PUSH1 0x40 00000486: MLOAD 00000487: SWAP1 00000488: DUP2 00000489: ADD 0000048a: PUSH1 0x40 0000048c: MSTORE 0000048d: DUP1 0000048e: SWAP4 0000048f: SWAP3 00000490: SWAP2 00000491: SWAP1 00000492: DUP2 00000493: DUP2 00000494: MSTORE 00000495: PUSH1 0x20 00000497: ADD 00000498: DUP4 00000499: DUP4 0000049a: DUP1 0000049b: DUP3 0000049c: DUP5 0000049d: CALLDATACOPY 0000049e: POP 0000049f: SWAP5 000004a0: SWAP7 000004a1: POP 000004a2: POP 000004a3: POP 000004a4: POP 000004a5: POP 000004a6: POP 000004a7: POP 000004a8: PUSH1 0x00 000004aa: PUSH2 0x0787 000004ad: DUP3 000004ae: PUSH2 0x018b 000004b1: JUMP 000004b2: JUMPDEST 000004b3: PUSH2 0x0632 000004b6: PUSH1 0x04 000004b8: DUP1 000004b9: DUP1 000004ba: CALLDATALOAD 000004bb: SWAP1 000004bc: PUSH1 0x20 000004be: ADD 000004bf: SWAP1 000004c0: DUP3 000004c1: ADD 000004c2: DUP1 000004c3: CALLDATALOAD 000004c4: SWAP1 000004c5: PUSH1 0x20 000004c7: ADD 000004c8: SWAP2 000004c9: SWAP2 000004ca: SWAP1 000004cb: DUP1 000004cc: DUP1 000004cd: PUSH1 0x1f 000004cf: ADD 000004d0: PUSH1 0x20 000004d2: DUP1 000004d3: SWAP2 000004d4: DIV 000004d5: MUL 000004d6: PUSH1 0x20 000004d8: ADD 000004d9: PUSH1 0x40 000004db: MLOAD 000004dc: SWAP1 000004dd: DUP2 000004de: ADD 000004df: PUSH1 0x40 000004e1: MSTORE 000004e2: DUP1 000004e3: SWAP4 000004e4: SWAP3 000004e5: SWAP2 000004e6: SWAP1 000004e7: DUP2 000004e8: DUP2 000004e9: MSTORE 000004ea: PUSH1 0x20 000004ec: ADD 000004ed: DUP4 000004ee: DUP4 000004ef: DUP1 000004f0: DUP3 000004f1: DUP5 000004f2: CALLDATACOPY 000004f3: POP 000004f4: SWAP5 000004f5: SWAP7 000004f6: POP 000004f7: POP 000004f8: POP 000004f9: POP 000004fa: POP 000004fb: POP 000004fc: POP 000004fd: PUSH1 0x00 000004ff: PUSH2 0x0a53 00000502: DUP3 00000503: PUSH2 0x018b 00000506: JUMP 00000507: JUMPDEST 00000508: PUSH2 0x0661 0000050b: PUSH1 0x04 0000050d: DUP1 0000050e: DUP1 0000050f: CALLDATALOAD 00000510: SWAP1 00000511: PUSH1 0x20 00000513: ADD 00000514: SWAP1 00000515: DUP3 00000516: ADD 00000517: DUP1 00000518: CALLDATALOAD 00000519: SWAP1 0000051a: PUSH1 0x20 0000051c: ADD 0000051d: SWAP2 0000051e: SWAP2 0000051f: SWAP1 00000520: DUP1 00000521: DUP1 00000522: PUSH1 0x1f 00000524: ADD 00000525: PUSH1 0x20 00000527: DUP1 00000528: SWAP2 00000529: DIV 0000052a: MUL 0000052b: PUSH1 0x20 0000052d: ADD 0000052e: PUSH1 0x40 00000530: MLOAD 00000531: SWAP1 00000532: DUP2 00000533: ADD 00000534: PUSH1 0x40 00000536: MSTORE 00000537: DUP1 00000538: SWAP4 00000539: SWAP3 0000053a: SWAP2 0000053b: SWAP1 0000053c: DUP2 0000053d: DUP2 0000053e: MSTORE 0000053f: PUSH1 0x20 00000541: ADD 00000542: DUP4 00000543: DUP4 00000544: DUP1 00000545: DUP3 00000546: DUP5 00000547: CALLDATACOPY 00000548: POP 00000549: SWAP5 0000054a: SWAP7 0000054b: POP 0000054c: POP 0000054d: POP 0000054e: POP 0000054f: POP 00000550: POP 00000551: POP 00000552: PUSH1 0x00 00000554: PUSH1 0x00 00000556: PUSH1 0x00 00000558: PUSH1 0x00 0000055a: PUSH1 0x00 0000055c: PUSH2 0x0732 0000055f: DUP7 00000560: PUSH2 0x018b 00000563: JUMP 00000564: JUMPDEST 00000565: PUSH2 0x00a3 00000568: PUSH1 0x04 0000056a: DUP1 0000056b: DUP1 0000056c: CALLDATALOAD 0000056d: SWAP1 0000056e: PUSH1 0x20 00000570: ADD 00000571: SWAP1 00000572: DUP3 00000573: ADD 00000574: DUP1 00000575: CALLDATALOAD 00000576: SWAP1 00000577: PUSH1 0x20 00000579: ADD 0000057a: SWAP2 0000057b: SWAP2 0000057c: SWAP1 0000057d: DUP1 0000057e: DUP1 0000057f: PUSH1 0x1f 00000581: ADD 00000582: PUSH1 0x20 00000584: DUP1 00000585: SWAP2 00000586: DIV 00000587: MUL 00000588: PUSH1 0x20 0000058a: ADD 0000058b: PUSH1 0x40 0000058d: MLOAD 0000058e: SWAP1 0000058f: DUP2 00000590: ADD 00000591: PUSH1 0x40 00000593: MSTORE 00000594: DUP1 00000595: SWAP4 00000596: SWAP3 00000597: SWAP2 00000598: SWAP1 00000599: DUP2 0000059a: DUP2 0000059b: MSTORE 0000059c: PUSH1 0x20 0000059e: ADD 0000059f: DUP4 000005a0: DUP4 000005a1: DUP1 000005a2: DUP3 000005a3: DUP5 000005a4: CALLDATACOPY 000005a5: POP 000005a6: SWAP5 000005a7: SWAP7 000005a8: POP 000005a9: POP 000005aa: SWAP4 000005ab: CALLDATALOAD 000005ac: SWAP4 000005ad: POP 000005ae: POP 000005af: POP 000005b0: POP 000005b1: DUP2 000005b2: CALLER 000005b3: PUSH1 0x01 000005b5: PUSH1 0xa0 000005b7: PUSH1 0x02 000005b9: EXP 000005ba: SUB 000005bb: AND 000005bc: PUSH2 0x07e1 000005bf: DUP3 000005c0: PUSH2 0x018b 000005c3: JUMP 000005c4: JUMPDEST 000005c5: PUSH1 0x40 000005c7: MLOAD 000005c8: DUP1 000005c9: DUP1 000005ca: PUSH1 0x20 000005cc: ADD 000005cd: DUP3 000005ce: DUP2 000005cf: SUB 000005d0: DUP3 000005d1: MSTORE 000005d2: DUP4 000005d3: DUP2 000005d4: DUP2 000005d5: MLOAD 000005d6: DUP2 000005d7: MSTORE 000005d8: PUSH1 0x20 000005da: ADD 000005db: SWAP2 000005dc: POP 000005dd: DUP1 000005de: MLOAD 000005df: SWAP1 000005e0: PUSH1 0x20 000005e2: ADD 000005e3: SWAP1 000005e4: DUP1 000005e5: DUP4 000005e6: DUP4 000005e7: DUP3 000005e8: SWAP1 000005e9: PUSH1 0x00 000005eb: PUSH1 0x04 000005ed: PUSH1 0x20 000005ef: DUP5 000005f0: PUSH1 0x1f 000005f2: ADD 000005f3: DIV 000005f4: PUSH1 0x03 000005f6: MUL 000005f7: PUSH1 0x0f 000005f9: ADD 000005fa: CALL 000005fb: POP 000005fc: SWAP1 000005fd: POP 000005fe: SWAP1 000005ff: DUP2 00000600: ADD 00000601: SWAP1 00000602: PUSH1 0x1f 00000604: AND 00000605: DUP1 00000606: ISZERO 00000607: PUSH2 0x0624 0000060a: JUMPI 0000060b: DUP1 0000060c: DUP3 0000060d: SUB 0000060e: DUP1 0000060f: MLOAD 00000610: PUSH1 0x01 00000612: DUP4 00000613: PUSH1 0x20 00000615: SUB 00000616: PUSH2 0x0100 00000619: EXP 0000061a: SUB 0000061b: NOT 0000061c: AND 0000061d: DUP2 0000061e: MSTORE 0000061f: PUSH1 0x20 00000621: ADD 00000622: SWAP2 00000623: POP 00000624: JUMPDEST 00000625: POP 00000626: SWAP3 00000627: POP 00000628: POP 00000629: POP 0000062a: PUSH1 0x40 0000062c: MLOAD 0000062d: DUP1 0000062e: SWAP2 0000062f: SUB 00000630: SWAP1 00000631: RETURN 00000632: JUMPDEST 00000633: PUSH1 0x40 00000635: DUP1 00000636: MLOAD 00000637: PUSH1 0x01 00000639: PUSH1 0xa0 0000063b: PUSH1 0x02 0000063d: EXP 0000063e: SUB 0000063f: SWAP3 00000640: SWAP1 00000641: SWAP3 00000642: AND 00000643: DUP3 00000644: MSTORE 00000645: MLOAD 00000646: SWAP1 00000647: DUP2 00000648: SWAP1 00000649: SUB 0000064a: PUSH1 0x20 0000064c: ADD 0000064d: SWAP1 0000064e: RETURN 0000064f: JUMPDEST 00000650: PUSH1 0x40 00000652: DUP1 00000653: MLOAD 00000654: SWAP2 00000655: DUP3 00000656: MSTORE 00000657: MLOAD 00000658: SWAP1 00000659: DUP2 0000065a: SWAP1 0000065b: SUB 0000065c: PUSH1 0x20 0000065e: ADD 0000065f: SWAP1 00000660: RETURN 00000661: JUMPDEST 00000662: PUSH1 0x40 00000664: DUP1 00000665: MLOAD 00000666: PUSH1 0x01 00000668: PUSH1 0xa0 0000066a: PUSH1 0x02 0000066c: EXP 0000066d: SUB 0000066e: SWAP6 0000066f: DUP7 00000670: AND 00000671: DUP2 00000672: MSTORE 00000673: SWAP4 00000674: DUP6 00000675: AND 00000676: PUSH1 0x20 00000678: DUP6 00000679: ADD 0000067a: MSTORE 0000067b: DUP4 0000067c: DUP2 0000067d: ADD 0000067e: SWAP3 0000067f: SWAP1 00000680: SWAP3 00000681: MSTORE 00000682: SWAP1 00000683: SWAP3 00000684: AND 00000685: PUSH1 0x60 00000687: DUP3 00000688: ADD 00000689: MSTORE 0000068a: SWAP1 0000068b: MLOAD 0000068c: SWAP1 0000068d: DUP2 0000068e: SWAP1 0000068f: SUB 00000690: PUSH1 0x80 00000692: ADD 00000693: SWAP1 00000694: RETURN 00000695: JUMPDEST 00000696: PUSH1 0x03 00000698: ADD 00000699: DUP1 0000069a: SLOAD 0000069b: PUSH1 0x01 0000069d: PUSH1 0xa0 0000069f: PUSH1 0x02 000006a1: EXP 000006a2: SUB 000006a3: NOT 000006a4: AND 000006a5: SWAP1 000006a6: SWAP2 000006a7: OR 000006a8: SWAP1 000006a9: SSTORE 000006aa: PUSH1 0x40 000006ac: MLOAD 000006ad: DUP4 000006ae: SWAP1 000006af: PUSH1 0x00 000006b1: DUP1 000006b2: MLOAD 000006b3: PUSH1 0x20 000006b5: PUSH2 0x0a9e 000006b8: DUP4 000006b9: CODECOPY 000006ba: DUP2 000006bb: MLOAD 000006bc: SWAP2 000006bd: MSTORE 000006be: SWAP1 000006bf: PUSH1 0x00 000006c1: SWAP1 000006c2: LOG2 000006c3: JUMPDEST 000006c4: POP 000006c5: JUMPDEST 000006c6: POP 000006c7: POP 000006c8: JUMP 000006c9: JUMPDEST 000006ca: PUSH1 0x03 000006cc: ADD 000006cd: SLOAD 000006ce: PUSH1 0x01 000006d0: PUSH1 0xa0 000006d2: PUSH1 0x02 000006d4: EXP 000006d5: SUB 000006d6: AND 000006d7: EQ 000006d8: ISZERO 000006d9: PUSH2 0x06c3 000006dc: JUMPI 000006dd: DUP2 000006de: PUSH2 0x0695 000006e1: DUP5 000006e2: PUSH2 0x018b 000006e5: JUMP 000006e6: JUMPDEST 000006e7: PUSH1 0x03 000006e9: ADD 000006ea: SLOAD 000006eb: PUSH1 0x01 000006ed: PUSH1 0xa0 000006ef: PUSH1 0x02 000006f1: EXP 000006f2: SUB 000006f3: AND 000006f4: EQ 000006f5: ISZERO 000006f6: PUSH2 0x06c3 000006f9: JUMPI 000006fa: DUP2 000006fb: PUSH2 0x0703 000006fe: DUP5 000006ff: PUSH2 0x018b 00000702: JUMP 00000703: JUMPDEST 00000704: DUP1 00000705: SLOAD 00000706: PUSH1 0x01 00000708: PUSH1 0xa0 0000070a: PUSH1 0x02 0000070c: EXP 0000070d: SUB 0000070e: NOT 0000070f: AND 00000710: SWAP1 00000711: SWAP2 00000712: OR 00000713: SWAP1 00000714: SSTORE 00000715: PUSH1 0x40 00000717: MLOAD 00000718: DUP4 00000719: SWAP1 0000071a: PUSH1 0x00 0000071c: DUP1 0000071d: MLOAD 0000071e: PUSH1 0x20 00000720: PUSH2 0x0a9e 00000723: DUP4 00000724: CODECOPY 00000725: DUP2 00000726: MLOAD 00000727: SWAP2 00000728: MSTORE 00000729: SWAP1 0000072a: PUSH1 0x00 0000072c: SWAP1 0000072d: LOG2 0000072e: POP 0000072f: POP 00000730: POP 00000731: JUMP 00000732: JUMPDEST 00000733: PUSH1 0x03 00000735: DUP2 00000736: ADD 00000737: SLOAD 00000738: DUP2 00000739: SLOAD 0000073a: PUSH1 0x01 0000073c: DUP4 0000073d: ADD 0000073e: SLOAD 0000073f: PUSH1 0x02 00000741: SWAP4 00000742: SWAP1 00000743: SWAP4 00000744: ADD 00000745: SLOAD 00000746: PUSH1 0x01 00000748: PUSH1 0xa0 0000074a: PUSH1 0x02 0000074c: EXP 0000074d: SUB 0000074e: SWAP2 0000074f: DUP3 00000750: AND 00000751: SWAP11 00000752: SWAP4 00000753: DUP3 00000754: AND 00000755: SWAP10 00000756: POP 00000757: SWAP8 00000758: POP 00000759: AND 0000075a: SWAP5 0000075b: POP 0000075c: SWAP3 0000075d: POP 0000075e: POP 0000075f: POP 00000760: JUMP 00000761: JUMPDEST 00000762: SLOAD 00000763: PUSH1 0x01 00000765: PUSH1 0xa0 00000767: PUSH1 0x02 00000769: EXP 0000076a: SUB 0000076b: AND 0000076c: SWAP1 0000076d: POP 0000076e: JUMPDEST 0000076f: SWAP2 00000770: SWAP1 00000771: POP 00000772: JUMP 00000773: JUMPDEST 00000774: PUSH1 0x01 00000776: ADD 00000777: SLOAD 00000778: PUSH1 0x01 0000077a: PUSH1 0xa0 0000077c: PUSH1 0x02 0000077e: EXP 0000077f: SUB 00000780: AND 00000781: SWAP1 00000782: POP 00000783: PUSH2 0x076e 00000786: JUMP 00000787: JUMPDEST 00000788: PUSH1 0x02 0000078a: ADD 0000078b: SLOAD 0000078c: SWAP1 0000078d: POP 0000078e: PUSH2 0x076e 00000791: JUMP 00000792: JUMPDEST 00000793: PUSH1 0x03 00000795: ADD 00000796: SLOAD 00000797: PUSH1 0x01 00000799: PUSH1 0xa0 0000079b: PUSH1 0x02 0000079d: EXP 0000079e: SUB 0000079f: AND 000007a0: EQ 000007a1: ISZERO 000007a2: PUSH2 0x06c3 000007a5: JUMPI 000007a6: DUP2 000007a7: PUSH2 0x07af 000007aa: DUP5 000007ab: PUSH2 0x018b 000007ae: JUMP 000007af: JUMPDEST 000007b0: PUSH1 0x01 000007b2: ADD 000007b3: DUP1 000007b4: SLOAD 000007b5: PUSH1 0x01 000007b7: PUSH1 0xa0 000007b9: PUSH1 0x02 000007bb: EXP 000007bc: SUB 000007bd: NOT 000007be: AND 000007bf: SWAP1 000007c0: SWAP2 000007c1: OR 000007c2: SWAP1 000007c3: SSTORE 000007c4: PUSH1 0x40 000007c6: MLOAD 000007c7: DUP4 000007c8: SWAP1 000007c9: PUSH1 0x00 000007cb: DUP1 000007cc: MLOAD 000007cd: PUSH1 0x20 000007cf: PUSH2 0x0a9e 000007d2: DUP4 000007d3: CODECOPY 000007d4: DUP2 000007d5: MLOAD 000007d6: SWAP2 000007d7: MSTORE 000007d8: SWAP1 000007d9: PUSH1 0x00 000007db: SWAP1 000007dc: LOG2 000007dd: POP 000007de: POP 000007df: POP 000007e0: JUMP 000007e1: JUMPDEST 000007e2: PUSH1 0x03 000007e4: ADD 000007e5: SLOAD 000007e6: PUSH1 0x01 000007e8: PUSH1 0xa0 000007ea: PUSH1 0x02 000007ec: EXP 000007ed: SUB 000007ee: AND 000007ef: EQ 000007f0: ISZERO 000007f1: PUSH2 0x06c3 000007f4: JUMPI 000007f5: DUP2 000007f6: PUSH2 0x07fe 000007f9: DUP5 000007fa: PUSH2 0x018b 000007fd: JUMP 000007fe: JUMPDEST 000007ff: PUSH1 0x02 00000801: ADD 00000802: SSTORE 00000803: PUSH1 0x40 00000805: MLOAD 00000806: DUP4 00000807: SWAP1 00000808: PUSH1 0x00 0000080a: DUP1 0000080b: MLOAD 0000080c: PUSH1 0x20 0000080e: PUSH2 0x0a9e 00000811: DUP4 00000812: CODECOPY 00000813: DUP2 00000814: MLOAD 00000815: SWAP2 00000816: MSTORE 00000817: SWAP1 00000818: PUSH1 0x00 0000081a: SWAP1 0000081b: LOG2 0000081c: POP 0000081d: POP 0000081e: POP 0000081f: JUMP 00000820: JUMPDEST 00000821: SLOAD 00000822: PUSH1 0x01 00000824: PUSH1 0xa0 00000826: PUSH1 0x02 00000828: EXP 00000829: SUB 0000082a: AND 0000082b: EQ 0000082c: ISZERO 0000082d: PUSH2 0x08e7 00000830: JUMPI 00000831: PUSH1 0x40 00000833: MLOAD 00000834: DUP2 00000835: SWAP1 00000836: PUSH1 0x01 00000838: PUSH1 0xa0 0000083a: PUSH1 0x02 0000083c: EXP 0000083d: SUB 0000083e: CALLER 0000083f: AND 00000840: SWAP1 00000841: PUSH32 0xd31658ff34e42040e5b3559456497d23086d2b4c8ceb1d63798f3dbd3a8e0579 00000862: SWAP1 00000863: PUSH1 0x00 00000865: SWAP1 00000866: LOG3 00000867: DUP1 00000868: PUSH1 0xff 0000086a: PUSH1 0x02 0000086c: EXP 0000086d: PUSH1 0x01 0000086f: PUSH1 0xa0 00000871: PUSH1 0x02 00000873: EXP 00000874: SUB 00000875: CALLER 00000876: AND 00000877: PUSH1 0xa0 00000879: PUSH1 0x02 0000087b: EXP 0000087c: DUP2 0000087d: LT 0000087e: ISZERO 0000087f: PUSH2 0x0002 00000882: JUMPI 00000883: ADD 00000884: PUSH1 0x00 00000886: POP 00000887: SWAP1 00000888: DUP1 00000889: MLOAD 0000088a: SWAP1 0000088b: PUSH1 0x20 0000088d: ADD 0000088e: SWAP1 0000088f: DUP3 00000890: DUP1 00000891: SLOAD 00000892: PUSH1 0x01 00000894: DUP2 00000895: PUSH1 0x01 00000897: AND 00000898: ISZERO 00000899: PUSH2 0x0100 0000089c: MUL 0000089d: SUB 0000089e: AND 0000089f: PUSH1 0x02 000008a1: SWAP1 000008a2: DIV 000008a3: SWAP1 000008a4: PUSH1 0x00 000008a6: MSTORE 000008a7: PUSH1 0x20 000008a9: PUSH1 0x00 000008ab: KECCAK256 000008ac: SWAP1 000008ad: PUSH1 0x1f 000008af: ADD 000008b0: PUSH1 0x20 000008b2: SWAP1 000008b3: DIV 000008b4: DUP2 000008b5: ADD 000008b6: SWAP3 000008b7: DUP3 000008b8: PUSH1 0x1f 000008ba: LT 000008bb: PUSH2 0x08ea 000008be: JUMPI 000008bf: DUP1 000008c0: MLOAD 000008c1: PUSH1 0xff 000008c3: NOT 000008c4: AND 000008c5: DUP4 000008c6: DUP1 000008c7: ADD 000008c8: OR 000008c9: DUP6 000008ca: SSTORE 000008cb: JUMPDEST 000008cc: POP 000008cd: PUSH2 0x06c3 000008d0: SWAP3 000008d1: SWAP2 000008d2: POP 000008d3: JUMPDEST 000008d4: DUP1 000008d5: DUP3 000008d6: GT 000008d7: ISZERO 000008d8: PUSH2 0x091a 000008db: JUMPI 000008dc: PUSH1 0x00 000008de: DUP2 000008df: SSTORE 000008e0: PUSH1 0x01 000008e2: ADD 000008e3: PUSH2 0x08d3 000008e6: JUMP 000008e7: JUMPDEST 000008e8: POP 000008e9: JUMP 000008ea: JUMPDEST 000008eb: DUP3 000008ec: DUP1 000008ed: ADD 000008ee: PUSH1 0x01 000008f0: ADD 000008f1: DUP6 000008f2: SSTORE 000008f3: DUP3 000008f4: ISZERO 000008f5: PUSH2 0x08cb 000008f8: JUMPI 000008f9: SWAP2 000008fa: DUP3 000008fb: ADD 000008fc: JUMPDEST 000008fd: DUP3 000008fe: DUP2 000008ff: GT 00000900: ISZERO 00000901: PUSH2 0x08cb 00000904: JUMPI 00000905: DUP3 00000906: MLOAD 00000907: DUP3 00000908: PUSH1 0x00 0000090a: POP 0000090b: SSTORE 0000090c: SWAP2 0000090d: PUSH1 0x20 0000090f: ADD 00000910: SWAP2 00000911: SWAP1 00000912: PUSH1 0x01 00000914: ADD 00000915: SWAP1 00000916: PUSH2 0x08fc 00000919: JUMP 0000091a: JUMPDEST 0000091b: POP 0000091c: SWAP1 0000091d: JUMP 0000091e: JUMPDEST 0000091f: PUSH1 0x03 00000921: DUP2 00000922: ADD 00000923: SLOAD 00000924: SWAP1 00000925: SWAP2 00000926: POP 00000927: PUSH1 0x01 00000929: PUSH1 0xa0 0000092b: PUSH1 0x02 0000092d: EXP 0000092e: SUB 0000092f: AND 00000930: PUSH1 0x00 00000932: EQ 00000933: DUP1 00000934: ISZERO 00000935: PUSH2 0x0946 00000938: JUMPI 00000939: POP 0000093a: PUSH8 0x4563918244f40000 00000943: CALLVALUE 00000944: LT 00000945: ISZERO 00000946: JUMPDEST 00000947: DUP1 00000948: ISZERO 00000949: PUSH2 0x0954 0000094c: JUMPI 0000094d: POP 0000094e: PUSH1 0x09 00000950: DUP3 00000951: MLOAD 00000952: LT 00000953: ISZERO 00000954: JUMPDEST 00000955: ISZERO 00000956: PUSH2 0x06c5 00000959: JUMPI 0000095a: PUSH1 0x03 0000095c: DUP2 0000095d: ADD 0000095e: DUP1 0000095f: SLOAD 00000960: PUSH1 0x01 00000962: PUSH1 0xa0 00000964: PUSH1 0x02 00000966: EXP 00000967: SUB 00000968: NOT 00000969: AND 0000096a: CALLER 0000096b: OR 0000096c: SWAP1 0000096d: SSTORE 0000096e: PUSH1 0x40 00000970: MLOAD 00000971: DUP3 00000972: SWAP1 00000973: PUSH1 0x00 00000975: DUP1 00000976: MLOAD 00000977: PUSH1 0x20 00000979: PUSH2 0x0a9e 0000097c: DUP4 0000097d: CODECOPY 0000097e: DUP2 0000097f: MLOAD 00000980: SWAP2 00000981: MSTORE 00000982: SWAP1 00000983: PUSH1 0x00 00000985: SWAP1 00000986: LOG2 00000987: POP 00000988: POP 00000989: JUMP 0000098a: JUMPDEST 0000098b: PUSH1 0x03 0000098d: ADD 0000098e: SLOAD 0000098f: PUSH1 0x01 00000991: PUSH1 0xa0 00000993: PUSH1 0x02 00000995: EXP 00000996: SUB 00000997: AND 00000998: EQ 00000999: ISZERO 0000099a: PUSH2 0x06c3 0000099d: JUMPI 0000099e: PUSH1 0x00 000009a0: PUSH1 0x00 000009a2: POP 000009a3: PUSH1 0x08 000009a5: DUP5 000009a6: PUSH1 0x40 000009a8: MLOAD 000009a9: DUP1 000009aa: DUP3 000009ab: DUP1 000009ac: MLOAD 000009ad: SWAP1 000009ae: PUSH1 0x20 000009b0: ADD 000009b1: SWAP1 000009b2: DUP1 000009b3: DUP4 000009b4: DUP4 000009b5: DUP3 000009b6: SWAP1 000009b7: PUSH1 0x00 000009b9: PUSH1 0x04 000009bb: PUSH1 0x20 000009bd: DUP5 000009be: PUSH1 0x1f 000009c0: ADD 000009c1: DIV 000009c2: PUSH1 0x03 000009c4: MUL 000009c5: PUSH1 0x0f 000009c7: ADD 000009c8: CALL 000009c9: POP 000009ca: SWAP1 000009cb: SWAP2 000009cc: ADD 000009cd: DUP3 000009ce: SWAP1 000009cf: SUB 000009d0: SWAP1 000009d1: SWAP2 000009d2: KECCAK256 000009d3: SWAP3 000009d4: SWAP1 000009d5: SWAP3 000009d6: DIV 000009d7: SWAP2 000009d8: POP 000009d9: POP 000009da: PUSH1 0xfd 000009dc: PUSH1 0x02 000009de: EXP 000009df: DUP2 000009e0: LT 000009e1: ISZERO 000009e2: PUSH2 0x0002 000009e5: JUMPI 000009e6: PUSH1 0x04 000009e8: MUL 000009e9: DUP1 000009ea: SLOAD 000009eb: PUSH1 0x01 000009ed: PUSH1 0xa0 000009ef: PUSH1 0x02 000009f1: EXP 000009f2: SUB 000009f3: NOT 000009f4: SWAP1 000009f5: DUP2 000009f6: AND 000009f7: DUP3 000009f8: SSTORE 000009f9: PUSH1 0x01 000009fb: DUP3 000009fc: ADD 000009fd: DUP1 000009fe: SLOAD 000009ff: DUP3 00000a00: AND 00000a01: SWAP1 00000a02: SSTORE 00000a03: PUSH1 0x02 00000a05: DUP3 00000a06: ADD 00000a07: DUP4 00000a08: SWAP1 00000a09: SSTORE 00000a0a: PUSH1 0x03 00000a0c: SWAP2 00000a0d: SWAP1 00000a0e: SWAP2 00000a0f: ADD 00000a10: DUP1 00000a11: SLOAD 00000a12: SWAP1 00000a13: SWAP2 00000a14: AND 00000a15: SWAP1 00000a16: SSTORE 00000a17: PUSH1 0x40 00000a19: MLOAD 00000a1a: PUSH1 0x01 00000a1c: PUSH1 0xa0 00000a1e: PUSH1 0x02 00000a20: EXP 00000a21: SUB 00000a22: DUP5 00000a23: AND 00000a24: SWAP2 00000a25: SWAP1 00000a26: PUSH8 0x4563918244f40000 00000a2f: SWAP1 00000a30: DUP3 00000a31: DUP2 00000a32: DUP2 00000a33: DUP2 00000a34: DUP6 00000a35: DUP9 00000a36: DUP4 00000a37: CALL 00000a38: POP 00000a39: DUP7 00000a3a: SWAP4 00000a3b: POP 00000a3c: PUSH1 0x00 00000a3e: DUP1 00000a3f: MLOAD 00000a40: PUSH1 0x20 00000a42: PUSH2 0x0a9e 00000a45: DUP4 00000a46: CODECOPY 00000a47: DUP2 00000a48: MLOAD 00000a49: SWAP2 00000a4a: MSTORE 00000a4b: SWAP3 00000a4c: SWAP2 00000a4d: POP 00000a4e: LOG2 00000a4f: POP 00000a50: POP 00000a51: POP 00000a52: JUMP 00000a53: JUMPDEST 00000a54: PUSH1 0x03 00000a56: ADD 00000a57: SLOAD 00000a58: PUSH1 0x01 00000a5a: PUSH1 0xa0 00000a5c: PUSH1 0x02 00000a5e: EXP 00000a5f: SUB 00000a60: AND 00000a61: SWAP1 00000a62: POP 00000a63: PUSH2 0x076e 00000a66: JUMP 00000a67: JUMPDEST 00000a68: DUP3 00000a69: ADD 00000a6a: SWAP2 00000a6b: SWAP1 00000a6c: PUSH1 0x00 00000a6e: MSTORE 00000a6f: PUSH1 0x20 00000a71: PUSH1 0x00 00000a73: KECCAK256 00000a74: SWAP1 00000a75: JUMPDEST 00000a76: DUP2 00000a77: SLOAD 00000a78: DUP2 00000a79: MSTORE 00000a7a: SWAP1 00000a7b: PUSH1 0x01 00000a7d: ADD 00000a7e: SWAP1 00000a7f: PUSH1 0x20 00000a81: ADD 00000a82: DUP1 00000a83: DUP4 00000a84: GT 00000a85: PUSH2 0x0a75 00000a88: JUMPI 00000a89: DUP3 00000a8a: SWAP1 00000a8b: SUB 00000a8c: PUSH1 0x1f 00000a8e: AND 00000a8f: DUP3 00000a90: ADD 00000a91: SWAP2 00000a92: JUMPDEST 00000a93: POP 00000a94: POP 00000a95: POP 00000a96: POP 00000a97: POP 00000a98: SWAP1 00000a99: POP 00000a9a: PUSH2 0x076e 00000a9d: JUMP 00000a9e: SHR 00000a9f: UNKNOWN(0xF7) 00000aa0: PUSH6 0x2f1f9289dc41 00000aa7: PUSH23
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| high | other | detector | Untrusted CALL target/value reachable | 60 | yes | yes |
viewtrace_id: 0x1d75af42b2cd4ccf6a86204d2258d3f365baa73f77ebcfc3a310aa3d9863e3d2
call_targets:
0x0000000000000000000000000000000000000004, 0x0e5e2b9341341ade98f510ad9a744e01f3b29f03
target_varies:
yes
classification:
target_varies
validation_json{
"sink": "CALL",
"errors": 0,
"status": "confirmed",
"attempts": 1,
"trace_id": "0x1d75af42b2cd4ccf6a86204d2258d3f365baa73f77ebcfc3a310aa3d9863e3d2",
"confirmed": true,
"trace_mode": "callTracer",
"call_targets": [
"0x0000000000000000000000000000000000000004",
"0x0e5e2b9341341ade98f510ad9a744e01f3b29f03"
],
"matched_probe": null,
"target_varies": true,
"classification": "target_varies"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x01984892",
"selector": "0x01984892",
"calldata_variants": [
"0x01984892",
"0x019848920000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x092b25e9",
"selector": "0x092b25e9",
"calldata_variants": [
"0x092b25e9",
"0x092b25e90000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x213b9eb8",
"selector": "0x213b9eb8",
"calldata_variants": [
"0x213b9eb8",
"0x213b9eb80000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x511b1df9",
"selector": "0x511b1df9",
"calldata_variants": [
"0x511b1df9",
"0x511b1df90000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x7f445c24",
"selector": "0x7f445c24",
"calldata_variants": [
"0x7f445c24",
"0x7f445c240000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0xae999ece",
"selector": "0xae999ece",
"calldata_variants": [
"0xae999ece",
"0xae999ece0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0xb5754045",
"selector": "0xb5754045",
"calldata_variants": [
"0xb5754045",
"0xb57540450000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0xc47f0027",
"selector": "0xc47f0027",
"calldata_variants": [
"0xc47f0027",
"0xc47f00270000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 1530,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
},
{
"pc": 2504,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "constant_zero",
"target_expression_category": "computed"
},
{
"pc": 2615,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"call_count": 4,
"guards_detected": [],
"untrusted_call_count": 3
}
|
| high | other | detector | ETH value transfer possible | 55 | yes | yes |
viewtrace_id: 0x1d75af42b2cd4ccf6a86204d2258d3f365baa73f77ebcfc3a310aa3d9863e3d2
call_targets:
0x0000000000000000000000000000000000000004, 0x0e5e2b9341341ade98f510ad9a744e01f3b29f03
target_varies:
yes
classification:
target_varies
validation_json{
"sink": "CALL",
"errors": 0,
"status": "confirmed",
"attempts": 1,
"trace_id": "0x1d75af42b2cd4ccf6a86204d2258d3f365baa73f77ebcfc3a310aa3d9863e3d2",
"confirmed": true,
"trace_mode": "callTracer",
"call_targets": [
"0x0000000000000000000000000000000000000004",
"0x0e5e2b9341341ade98f510ad9a744e01f3b29f03"
],
"matched_probe": null,
"target_varies": true,
"classification": "target_varies"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x01984892",
"selector": "0x01984892",
"calldata_variants": [
"0x01984892",
"0x019848920000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x092b25e9",
"selector": "0x092b25e9",
"calldata_variants": [
"0x092b25e9",
"0x092b25e90000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x213b9eb8",
"selector": "0x213b9eb8",
"calldata_variants": [
"0x213b9eb8",
"0x213b9eb80000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x511b1df9",
"selector": "0x511b1df9",
"calldata_variants": [
"0x511b1df9",
"0x511b1df90000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x7f445c24",
"selector": "0x7f445c24",
"calldata_variants": [
"0x7f445c24",
"0x7f445c240000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0xae999ece",
"selector": "0xae999ece",
"calldata_variants": [
"0xae999ece",
"0xae999ece0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0xb5754045",
"selector": "0xb5754045",
"calldata_variants": [
"0xb5754045",
"0xb57540450000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0xc47f0027",
"selector": "0xc47f0027",
"calldata_variants": [
"0xc47f0027",
"0xc47f00270000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 1530,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
},
{
"pc": 2615,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"eth_value_calls": 2,
"guards_detected": []
}
|
| high | other | codex | Payable acquisition path returns success on failed preconditions, trapping ETH | 85 | no | — |
viewevidence_json{
"evidence": "At pc 0x091e-0x0956 the contract loads key+3, checks for zero, compares CALLVALUE to 0x4563918244f40000, and evaluates a length-like bound. Failure jumps to pc 0x06c5/0x06c3, which only unwinds the stack and returns to the dispatcher STOP path; there is no REVERT and no compensating transfer.",
"locations": [
"selector:0xae999ece",
"pc:0x091e",
"pc:0x0943",
"pc:0x0956",
"pc:0x06c5"
],
"recommendation": "Make failed acquisition attempts revert. If the intended behavior is conditional acceptance, explicitly refund msg.value on rejection instead of returning success.",
"exploit_scenario": "The routine behind selector 0xae999ece appears to be a payable registration/acquisition path. It checks an owner-like slot at key+3, compares CALLVALUE against the embedded constant 0x4563918244f40000 (5 ether), and also checks a length-like value. If any check fails, execution jumps to the shared POP/JUMP return path instead of reverting. An attacker or malicious frontend can deliberately submit already-owned, oversized, or underfunded registrations; the transaction still succeeds and any ETH sent remains in the contract."
}
|
| medium | other | codex | Unchecked 5 ETH external CALL after state mutation can strand refunds | 75 | no | — |
viewevidence_json{
"evidence": "In the 0x098a routine reached from selector 0xb5754045, storage is written at pc 0x09f8, 0x0a02, 0x0a09, and 0x0a16 before a value-bearing CALL at pc 0x0a37. The call embeds the same 5 ether constant 0x4563918244f40000, uses a computed target, and the return value is immediately POP'd rather than checked.",
"locations": [
"selector:0xb5754045",
"pc:0x09f8",
"pc:0x0a02",
"pc:0x0a09",
"pc:0x0a16",
"pc:0x0a37"
],
"recommendation": "Use a checked CALL and revert on failure, or switch to a pull-payment model where the recipient withdraws separately. If the state must change first, persist a claimable balance instead of assuming the transfer succeeded.",
"exploit_scenario": "The owner-gated routine behind selector 0xb5754045 appears to clear or rewrite several storage fields for a record and then perform a 5 ETH CALL to a computed recipient. Because the CALL result is discarded, a reverting or non-payable recipient can make the transfer fail while the prior state changes remain committed. If this path is meant to release a deposit or settle a record, the caller can lose the right to retry the refund and the ether stays trapped in the contract."
}
|