TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

019b3836-22d7-70d4-8f04-697b1924f6d7

complete
Chain ID
1
Address
Block Number
Created
Fri, Dec 19, 2025 8:03 PM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
2
Validated
2
Source
Bytecode only
Review Backing
Present
Best current signal
Untrusted CALL target/value reachable
crit 0 high 2 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
363 artifact.fetch complete 1 / 3 3 months ago
364 tool.cast_disasm complete 1 / 3 3 months ago
43355 analysis.bundle complete 1 / 3 1 week ago
43356 capability.graph complete 1 / 3 1 week ago
43357 detector.run complete 1 / 3 1 week ago
43358 validation.fork complete 1 / 3 1 week ago
78221 report.consolidate complete 1 / 6 1 week ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no
Implementation:
Verified Source: no

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate
Job Status
complete
Attempts
1 / 6
Findings
2
No findings?
no
Summary
The bytecode appears to implement a keyed registry with per-record owner checks, a 5 ETH payment threshold, reverse-name style storage, and one value-bearing external call. Two issues are meaningful from bytecode alone: the payable acquisition path fails open and can trap ETH on invalid attempts, and the 5 ETH payout path mutates storage before an unchecked external CALL, which can strand refunds if the recipient call fails. Selector/function names are inferred only from bytecode structure, so exact business semantics remain uncertain.
View stdout
{"no_findings":false,"summary":"The bytecode appears to implement a keyed registry with per-record owner checks, a 5 ETH payment threshold, reverse-name style storage, and one value-bearing external call. Two issues are meaningful from bytecode alone: the payable acquisition path fails open and can trap ETH on invalid attempts, and the 5 ETH payout path mutates storage before an unchecked external CALL, which can strand refunds if the recipient call fails. Selector/function names are inferred only from bytecode structure, so exact business semantics remain uncertain.","findings":[{"severity":"high","category":"other","title":"Payable acquisition path returns success on failed preconditions, trapping ETH","exploit_scenario":"The routine behind selector 0xae999ece appears to be a payable registration/acquisition path. It checks an owner-like slot at key+3, compares CALLVALUE against the embedded constant 0x4563918244f40000 (5 ether), and also checks a length-like value. If any check fails, execution jumps to the shared POP/JUMP return path instead of reverting. An attacker or malicious frontend can deliberately submit already-owned, oversized, or underfunded registrations; the transaction still succeeds and any ETH sent remains in the contract.","recommendation":"Make failed acquisition attempts revert. If the intended behavior is conditional acceptance, explicitly refund msg.value on rejection instead of returning success.","evidence":"At pc 0x091e-0x0956 the contract loads key+3, checks for zero, compares CALLVALUE to 0x4563918244f40000, and evaluates a length-like bound. Failure jumps to pc 0x06c5/0x06c3, which only unwinds the stack and returns to the dispatcher STOP path; there is no REVERT and no compensating transfer.","locations":["selector:0xae999ece","pc:0x091e","pc:0x0943","pc:0x0956","pc:0x06c5"]},{"severity":"medium","category":"other","title":"Unchecked 5 ETH external CALL after state mutation can strand refunds","exploit_scenario":"The owner-gated routine behind selector 0xb5754045 appears to clear or rewrite several storage fields for a record and then perform a 5 ETH CALL to a computed recipient. Because the CALL result is discarded, a reverting or non-payable recipient can make the transfer fail while the prior state changes remain committed. If this path is meant to release a deposit or settle a record, the caller can lose the right to retry the refund and the ether stays trapped in the contract.","recommendation":"Use a checked CALL and revert on failure, or switch to a pull-payment model where the recipient withdraws separately. If the state must change first, persist a claimable balance instead of assuming the transfer succeeded.","evidence":"In the 0x098a routine reached from selector 0xb5754045, storage is written at pc 0x09f8, 0x0a02, 0x0a09, and 0x0a16 before a value-bearing CALL at pc 0x0a37. The call embeds the same 5 ether constant 0x4563918244f40000, uses a computed target, and the return value is immediately POP'd rather than checked.","locations":["selector:0xb5754045","pc:0x09f8","pc:0x0a02","pc:0x0a09","pc:0x0a16","pc:0x0a37"]}]}
View stderr
OpenAI Codex v0.118.0 (research preview)
--------
workdir: /tmp/codex-i34svh9b
model: gpt-5.4
provider: openai
approval: never
sandbox: read-only
reasoning effort: high
reasoning summaries: none
session id: 019d5a72-a109-74a2-b710-6f8c6a8f9c47
--------
user
You are a security auditor. You ONLY have runtime bytecode + analysis artifacts.
You MUST read `BYTECODE_BUNDLE.json` before concluding; it contains the bytecode summary,
evidence bundle, callsites, storage slots, and detector findings.

Special cases when reasoning from bytecode (be explicit about uncertainty):
- Selector inference is best-effort; missing selectors are common.
- Fallback/receive paths may be the only entrypoints.
- CALL vs DELEGATECALL semantics differ; DELEGATECALL executes in caller storage.
- Proxy patterns (EIP-1967, minimal proxies, beacon) change which storage is authoritative.
- Storage slots are raw; mappings/arrays appear via keccak patterns, names are unknown.
- Guard detection is heuristic; absence of guards does NOT mean unguarded.
- Returndata checking is unknown unless explicitly shown in evidence.
- Precompiles (0x1..0x9) and common ERC20 transfer selectors may appear; do not over-claim.

Output MUST be valid JSON matching the provided schema.
- If you find nothing meaningful: set no_findings=true and findings=[].
- Otherwise: set no_findings=false and include findings with severity/category/title.
- Locations can be pc references like "pc:0x123" or selectors like "selector:0xa9059cbb".

Focus on: reentrancy, access control, upgradeability/proxy issues, signature validation,
accounting/invariant breaks, dangerous delegatecall, and untrusted external calls.
Be conservative: if evidence is weak, mark severity low/medium and explain why.
warning: Codex could not find system bubblewrap on PATH. Please install bubblewrap with your package manager. Codex will use the vendored bubblewrap in the meantime.
  → Inspect BYTECODE_BUNDLE.json and supporting artifacts to understand the contract architecture and evidence
  • Evaluate potential security issues from bytecode-level evidence, focusing on requested categories
  • Produce JSON report matching the required schema
exec
/bin/bash -lc pwd in /tmp/codex-i34svh9b
 succeeded in 0ms:
/tmp/codex-i34svh9b

exec
/bin/bash -lc 'rg --files' in /tmp/codex-i34svh9b
 succeeded in 0ms:
BYTECODE_BUNDLE.json
codex-output-schema.json

exec
/bin/bash -lc "sed -n '1,260p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
 succeeded in 0ms:
{
  "analysis_artifact": {
    "address": "0x0e5e2b9341341ade98f510ad9a744e01f3b29f03",
    "artifact_hash": "0xab671457d7f2c62e8a7f2129a7e1e2307acf47bc35ed289029289e3f547a7c18",
    "artifact_json": {
      "auth": {
        "guards": []
      },
      "basic_blocks": [
        {
          "end_pc": 10,
          "hash": "0x44b9496415b5809b15099b83c849935ad9891afc24dcc2240de0222f3d58d087",
          "opcodes": [
            "PUSH1",
            "PUSH1",
            "MSTORE",
            "CALLDATASIZE",
            "ISZERO",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 0
        },
        {
          "end_pc": 30,
          "hash": "0x0b87532a62385629a76fb3bcff5334263664d35f49f5e8e6aed3d378c36828ba",
          "opcodes": [
            "PUSH1",
            "PUSH1",
            "EXP",
            "PUSH1",
            "CALLDATALOAD",
            "DIV",
            "PUSH4",
            "OP_81",
            "EQ",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 11
        },
        {
          "end_pc": 41,
          "hash": "0x56843a24cfbcf172a710eb9b3da451f5d016f02966562b2da10bc3a13746606f",
          "opcodes": [
            "OP_80",
            "PUSH4",
            "EQ",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 31
        },
        {
          "end_pc": 52,
          "hash": "0x059538b22bbd02a446d49b6d27b83626ab97b7bfaa381d4af2c4799921cd9ea9",
          "opcodes": [
            "OP_80",
            "PUSH4",
            "EQ",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 42
        },
        {
          "end_pc": 63,
          "hash": "0x0dacc07d92d3a11bb86231bc9e0dac212999ca45a733e86190f6dd2718b0665f",
          "opcodes": [
            "OP_80",
            "PUSH4",
            "EQ",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 53
        },
        {
          "end_pc": 74,
          "hash": "0x523c13ccb04754d987451d49a8296345ef52e11eee8157d592b21cbbff73420a",
          "opcodes": [
            "OP_80",
            "PUSH4",
            "EQ",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 64
        },
        {
          "end_pc": 85,
          "hash": "0x190aeb7c03d7f97920022a96f7fdc921596a18da866dd429fa5954780ed8268a",
          "opcodes": [
            "OP_80",
            "PUSH4",
            "EQ",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 75
        },
        {
          "end_pc": 96,
          "hash": "0x958c157ccd8d1f5c97de8512100943774c06dcd761041b91b77dcaecb8bf98ad",
          "opcodes": [
            "OP_80",
            "PUSH4",
            "EQ",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 86
        },
        {
          "end_pc": 107,
          "hash": "0x439821237a16b00442a86433c8c91b9b69a6ea2f5a90751460c02036835e4afa",
          "opcodes": [
            "OP_80",
            "PUSH4",
            "EQ",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 97
        },
        {
          "end_pc": 118,
          "hash": "0xe8ce482e35cf9de104fbc681a40258c7da2861d618328adcce741fbc0a7b3c59",
          "opcodes": [
            "OP_80",
            "PUSH4",
            "EQ",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 108
        },
        {
          "end_pc": 129,
          "hash": "0x451d8df5efaf3d211f01b13a7e2e1c7691e8303b5662b77d05147c5c0996f399",
          "opcodes": [
            "OP_80",
            "PUSH4",
            "EQ",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 119
        },
        {
          "end_pc": 140,
          "hash": "0x617abeba635433e794db39310bcd1b93105490c336a3d028759beeb08d8b9033",
          "opcodes": [
            "OP_80",
            "PUSH4",
            "EQ",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 130
        },
        {
          "end_pc": 151,
          "hash": "0x3c1b0a8bc6cd2e3e1fe603408fe52c9bedf3235fb7563e8299d502f87d29002a",
          "opcodes": [
            "OP_80",
            "PUSH4",
            "EQ",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 141
        },
        {
          "end_pc": 162,
          "hash": "0xeb63698be90c4dbc58f6e33e6f16de473f76f6b38ac6479776289b236c1375de",
          "opcodes": [
            "OP_80",
            "PUSH4",
            "EQ",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 152
        },
        {
          "end_pc": 164,
          "hash": "0xd80b4574c7824875825a613ae53ec96b009aff7eec435ac8917ac4b672d18ea2",
          "opcodes": [
            "JUMPDEST",
            "STOP"
          ],
          "start_pc": 163
        },
        {
          "end_pc": 213,
          "hash": "0x65597272b5bf2296810b55ec6e832723f81977bff597af3790e35b1223be8916",
          "opcodes": [
            "JUMPDEST",
            "PUSH2",
            "PUSH1",
            "CALLDATALOAD",
            "PUSH1",
            "OP_80",
            "MLOAD",
            "PUSH1",
            "OP_81",
            "ADD",
            "OP_90",
            "OP_91",
            "MSTORE",
            "PUSH1",
            "OP_81",
            "MSTORE",
            "PUSH1",
            "PUSH1",
            "EXP",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "OP_83",
            "AND",
            "PUSH1",
            "PUSH1",
            "EXP",
            "OP_81",
            "LT",
            "ISZERO",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 165
        },
        {
          "end_pc": 275,
          "hash": "0xd4c02429791ba15ce6ad913c96dc6c5331c3a963e02563b126f1bb48fff914b0",
          "opcodes": [
            "ADD",
            "OP_80",
            "SLOAD",
            "PUSH1",
            "OP_80",
            "MLOAD",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "OP_85",
            "AND",
            "ISZERO",
            "PUSH2",
            "MUL",
            "PUSH1",
            "NOT",
            "ADD",
            "OP_90",
            "OP_94",
            "AND",
            "OP_93",

exec
/bin/bash -lc "sed -n '261,520p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
 succeeded in 0ms:
            "OP_90",
            "OP_93",
            "DIV",
            "PUSH1",
            "OP_81",
            "ADD",
            "OP_84",
            "OP_90",
            "DIV",
            "OP_84",
            "MUL",
            "OP_82",
            "ADD",
            "OP_84",
            "ADD",
            "OP_90",
            "OP_92",
            "MSTORE",
            "OP_81",
            "OP_81",
            "MSTORE",
            "OP_92",
            "OP_91",
            "OP_83",
            "ADD",
            "OP_82",
            "OP_82",
            "OP_80",
            "ISZERO",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 214
        },
        {
          "end_pc": 283,
          "hash": "0xde9d4c24cbc6ab93adbfa7ba85fdbbb112b74639278492201c72d3d3c8599419",
          "opcodes": [
            "OP_80",
            "PUSH1",
            "LT",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 276
        },
        {
          "end_pc": 302,
          "hash": "0x40aa599523fba9053d55c921f003267e78ffce7e028fdd07195f19765f50fcf4",
          "opcodes": [
            "PUSH2",
            "OP_80",
            "OP_83",
            "SLOAD",
            "DIV",
            "MUL",
            "OP_83",
            "MSTORE",
            "OP_91",
            "PUSH1",
            "ADD",
            "OP_91",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 284
        },
        {
          "end_pc": 394,
          "hash": "0x810dbcc6786920c155ab801be98b78307ffea8e7257b2f78edf1022f80608122",
          "opcodes": [
            "JUMPDEST",
            "PUSH2",
            "PUSH1",
            "OP_80",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_90",
            "OP_82",
            "ADD",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_91",
            "OP_91",
            "OP_90",
            "OP_80",
            "OP_80",
            "PUSH1",
            "ADD",
            "PUSH1",
            "OP_80",
            "OP_91",
            "DIV",
            "MUL",
            "PUSH1",
            "ADD",
            "PUSH1",
            "MLOAD",
            "OP_90",
            "OP_81",
            "ADD",
            "PUSH1",
            "MSTORE",
            "OP_80",
            "OP_93",
            "OP_92",
            "OP_91",
            "OP_90",
            "OP_81",
            "OP_81",
            "MSTORE",
            "PUSH1",
            "ADD",
            "OP_83",
            "OP_83",
            "OP_80",
            "OP_82",
            "OP_84",
            "CALLDATACOPY",
            "POP",
            "OP_94",
            "OP_96",
            "POP",
            "POP",
            "OP_93",
            "CALLDATALOAD",
            "OP_93",
            "POP",
            "POP",
            "POP",
            "POP",
            "OP_81",
            "CALLER",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "AND",
            "PUSH2",
            "OP_82"
          ],
          "start_pc": 303
        },
        {
          "end_pc": 469,
          "hash": "0x7136678124d560fefd69881d15dc5d174958fa56a052a071a63ba415c4e9892b",
          "opcodes": [
            "JUMPDEST",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "POP",
            "PUSH1",
            "OP_83",
            "PUSH1",
            "MLOAD",
            "OP_80",
            "OP_82",
            "OP_80",
            "MLOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_90",
            "OP_80",
            "OP_83",
            "OP_83",
            "OP_82",
            "OP_90",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "OP_84",
            "PUSH1",
            "ADD",
            "DIV",
            "PUSH1",
            "MUL",
            "PUSH1",
            "ADD",
            "CALL",
            "POP",
            "OP_90",
            "OP_91",
            "ADD",
            "OP_82",
            "OP_90",
            "SUB",
            "OP_90",
            "OP_91",
            "SHA3",
            "OP_92",
            "OP_90",
            "OP_92",
            "DIV",
            "OP_91",
            "POP",
            "POP",
            "PUSH1",
            "PUSH1",
            "EXP",
            "OP_81",
            "LT",
            "ISZERO",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 395
        },
        {
          "end_pc": 480,
          "hash": "0x3016c5ec3a01cae8750be7154915913e6f5cc88f8c204ba173fdad43342ae7bd",
          "opcodes": [
            "PUSH1",
            "MUL",
            "OP_90",
            "POP",
            "OP_90",
            "POP",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 470
        },
        {
          "end_pc": 576,
          "hash": "0xfd8f4d8468fcddaaf00f5186688063bab493e09b47db99e18d8b7523d4493ce0",
          "opcodes": [
            "JUMPDEST",
            "PUSH2",
            "PUSH1",
            "OP_80",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_90",
            "OP_82",
            "ADD",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_91",
            "OP_91",
            "OP_90",
            "OP_80",
            "OP_80",
            "PUSH1",
            "ADD",
            "PUSH1",

exec
/bin/bash -lc "sed -n '521,780p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
 succeeded in 0ms:
            "OP_80",
            "OP_91",
            "DIV",
            "MUL",
            "PUSH1",
            "ADD",
            "PUSH1",
            "MLOAD",
            "OP_90",
            "OP_81",
            "ADD",
            "PUSH1",
            "MSTORE",
            "OP_80",
            "OP_93",
            "OP_92",
            "OP_91",
            "OP_90",
            "OP_81",
            "OP_81",
            "MSTORE",
            "PUSH1",
            "ADD",
            "OP_83",
            "OP_83",
            "OP_80",
            "OP_82",
            "OP_84",
            "CALLDATACOPY",
            "POP",
            "OP_94",
            "OP_96",
            "POP",
            "POP",
            "OP_93",
            "CALLDATALOAD",
            "OP_93",
            "POP",
            "POP",
            "POP",
            "POP",
            "OP_81",
            "CALLER",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "AND",
            "PUSH2",
            "OP_82",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 481
        },
        {
          "end_pc": 661,
          "hash": "0xd27ffb61ba973d559f9dccc2caae1aafa5e2abe8c4f3cd2992fb8b0ed2b22c49",
          "opcodes": [
            "JUMPDEST",
            "PUSH2",
            "PUSH1",
            "OP_80",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_90",
            "OP_82",
            "ADD",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_91",
            "OP_91",
            "OP_90",
            "OP_80",
            "OP_80",
            "PUSH1",
            "ADD",
            "PUSH1",
            "OP_80",
            "OP_91",
            "DIV",
            "MUL",
            "PUSH1",
            "ADD",
            "PUSH1",
            "MLOAD",
            "OP_90",
            "OP_81",
            "ADD",
            "PUSH1",
            "MSTORE",
            "OP_80",
            "OP_93",
            "OP_92",
            "OP_91",
            "OP_90",
            "OP_81",
            "OP_81",
            "MSTORE",
            "PUSH1",
            "ADD",
            "OP_83",
            "OP_83",
            "OP_80",
            "OP_82",
            "OP_84",
            "CALLDATACOPY",
            "POP",
            "OP_94",
            "OP_96",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "PUSH1",
            "PUSH2",
            "OP_82",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 577
        },
        {
          "end_pc": 746,
          "hash": "0xdc62c41b0f53c62a687be38bf51945188732bc9bc50b7c18ef5c96d7b8d4fd7f",
          "opcodes": [
            "JUMPDEST",
            "PUSH2",
            "PUSH1",
            "OP_80",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_90",
            "OP_82",
            "ADD",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_91",
            "OP_91",
            "OP_90",
            "OP_80",
            "OP_80",
            "PUSH1",
            "ADD",
            "PUSH1",
            "OP_80",
            "OP_91",
            "DIV",
            "MUL",
            "PUSH1",
            "ADD",
            "PUSH1",
            "MLOAD",
            "OP_90",
            "OP_81",
            "ADD",
            "PUSH1",
            "MSTORE",
            "OP_80",
            "OP_93",
            "OP_92",
            "OP_91",
            "OP_90",
            "OP_81",
            "OP_81",
            "MSTORE",
            "PUSH1",
            "ADD",
            "OP_83",
            "OP_83",
            "OP_80",
            "OP_82",
            "OP_84",
            "CALLDATACOPY",
            "POP",
            "OP_94",
            "OP_96",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "PUSH1",
            "PUSH2",
            "OP_82",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 662
        },
        {
          "end_pc": 831,
          "hash": "0x1bbb9f186e1f80d7523ab6e7c86c5aeed9a6411e2e3c346ed8a435d7405822f9",
          "opcodes": [
            "JUMPDEST",
            "PUSH2",
            "PUSH1",
            "OP_80",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_90",
            "OP_82",
            "ADD",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_91",
            "OP_91",
            "OP_90",
            "OP_80",
            "OP_80",
            "PUSH1",
            "ADD",
            "PUSH1",
            "OP_80",
            "OP_91",
            "DIV",
            "MUL",
            "PUSH1",
            "ADD",
            "PUSH1",
            "MLOAD",
            "OP_90",
            "OP_81",
            "ADD",
            "PUSH1",
            "MSTORE",
            "OP_80",
            "OP_93",
            "OP_92",
            "OP_91",
            "OP_90",
            "OP_81",
            "OP_81",
            "MSTORE",
            "PUSH1",
            "ADD",

exec
/bin/bash -lc "sed -n '781,1040p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
 succeeded in 0ms:
            "OP_83",
            "OP_83",
            "OP_80",
            "OP_82",
            "OP_84",
            "CALLDATACOPY",
            "POP",
            "OP_94",
            "OP_96",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "PUSH1",
            "PUSH2",
            "OP_82",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 747
        },
        {
          "end_pc": 927,
          "hash": "0x315e87d68d17e16adc47ac113c75daf38e6a3a71549e013d57043d0b0b682fe9",
          "opcodes": [
            "JUMPDEST",
            "PUSH2",
            "PUSH1",
            "OP_80",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_90",
            "OP_82",
            "ADD",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_91",
            "OP_91",
            "OP_90",
            "OP_80",
            "OP_80",
            "PUSH1",
            "ADD",
            "PUSH1",
            "OP_80",
            "OP_91",
            "DIV",
            "MUL",
            "PUSH1",
            "ADD",
            "PUSH1",
            "MLOAD",
            "OP_90",
            "OP_81",
            "ADD",
            "PUSH1",
            "MSTORE",
            "OP_80",
            "OP_93",
            "OP_92",
            "OP_91",
            "OP_90",
            "OP_81",
            "OP_81",
            "MSTORE",
            "PUSH1",
            "ADD",
            "OP_83",
            "OP_83",
            "OP_80",
            "OP_82",
            "OP_84",
            "CALLDATACOPY",
            "POP",
            "OP_94",
            "OP_96",
            "POP",
            "POP",
            "OP_93",
            "CALLDATALOAD",
            "OP_93",
            "POP",
            "POP",
            "POP",
            "POP",
            "OP_81",
            "CALLER",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "AND",
            "PUSH2",
            "OP_82",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 832
        },
        {
          "end_pc": 1020,
          "hash": "0xdc9744506a95f4a7fcde8b27158b83f937ec9f88420edefeed80105617522a02",
          "opcodes": [
            "JUMPDEST",
            "PUSH2",
            "PUSH1",
            "OP_80",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_90",
            "OP_82",
            "ADD",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_91",
            "OP_91",
            "OP_90",
            "OP_80",
            "OP_80",
            "PUSH1",
            "ADD",
            "PUSH1",
            "OP_80",
            "OP_91",
            "DIV",
            "MUL",
            "PUSH1",
            "ADD",
            "PUSH1",
            "MLOAD",
            "OP_90",
            "OP_81",
            "ADD",
            "PUSH1",
            "MSTORE",
            "OP_80",
            "OP_93",
            "OP_92",
            "OP_91",
            "OP_90",
            "OP_81",
            "OP_81",
            "MSTORE",
            "PUSH1",
            "ADD",
            "OP_83",
            "OP_83",
            "OP_80",
            "OP_82",
            "OP_84",
            "CALLDATACOPY",
            "POP",
            "OP_94",
            "OP_96",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "CALLER",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "AND",
            "PUSH2",
            "OP_82",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 928
        },
        {
          "end_pc": 1116,
          "hash": "0x4404bcee10e689bd455371e02633d8f381cabad8c35aebc84454f8895e8f3061",
          "opcodes": [
            "JUMPDEST",
            "PUSH2",
            "PUSH1",
            "OP_80",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_90",
            "OP_82",
            "ADD",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_91",
            "OP_91",
            "OP_90",
            "OP_80",
            "OP_80",
            "PUSH1",
            "ADD",
            "PUSH1",
            "OP_80",
            "OP_91",
            "DIV",
            "MUL",
            "PUSH1",
            "ADD",
            "PUSH1",
            "MLOAD",
            "OP_90",
            "OP_81",
            "ADD",
            "PUSH1",
            "MSTORE",
            "OP_80",
            "OP_93",
            "OP_92",
            "OP_91",
            "OP_90",
            "OP_81",
            "OP_81",
            "MSTORE",
            "PUSH1",
            "ADD",
            "OP_83",
            "OP_83",
            "OP_80",
            "OP_82",
            "OP_84",
            "CALLDATACOPY",
            "POP",
            "OP_94",
            "OP_96",
            "POP",
            "POP",
            "OP_93",
            "CALLDATALOAD",
            "OP_93",
            "POP",
            "POP",
            "POP",

exec
/bin/bash -lc "sed -n '1041,1300p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
 succeeded in 0ms:
            "POP",
            "OP_81",
            "CALLER",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "AND",
            "PUSH2",
            "OP_82",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 1021
        },
        {
          "end_pc": 1201,
          "hash": "0x0f0bdd29e9205e8d06fb592a78525d7eff2d8ced609ce62a885dad46c227b33e",
          "opcodes": [
            "JUMPDEST",
            "PUSH2",
            "PUSH1",
            "OP_80",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_90",
            "OP_82",
            "ADD",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_91",
            "OP_91",
            "OP_90",
            "OP_80",
            "OP_80",
            "PUSH1",
            "ADD",
            "PUSH1",
            "OP_80",
            "OP_91",
            "DIV",
            "MUL",
            "PUSH1",
            "ADD",
            "PUSH1",
            "MLOAD",
            "OP_90",
            "OP_81",
            "ADD",
            "PUSH1",
            "MSTORE",
            "OP_80",
            "OP_93",
            "OP_92",
            "OP_91",
            "OP_90",
            "OP_81",
            "OP_81",
            "MSTORE",
            "PUSH1",
            "ADD",
            "OP_83",
            "OP_83",
            "OP_80",
            "OP_82",
            "OP_84",
            "CALLDATACOPY",
            "POP",
            "OP_94",
            "OP_96",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "PUSH1",
            "PUSH2",
            "OP_82",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 1117
        },
        {
          "end_pc": 1286,
          "hash": "0x55449b08b04d50dfb779a97ea506d16a01c22caebd8f033dcb6338d729247c8a",
          "opcodes": [
            "JUMPDEST",
            "PUSH2",
            "PUSH1",
            "OP_80",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_90",
            "OP_82",
            "ADD",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_91",
            "OP_91",
            "OP_90",
            "OP_80",
            "OP_80",
            "PUSH1",
            "ADD",
            "PUSH1",
            "OP_80",
            "OP_91",
            "DIV",
            "MUL",
            "PUSH1",
            "ADD",
            "PUSH1",
            "MLOAD",
            "OP_90",
            "OP_81",
            "ADD",
            "PUSH1",
            "MSTORE",
            "OP_80",
            "OP_93",
            "OP_92",
            "OP_91",
            "OP_90",
            "OP_81",
            "OP_81",
            "MSTORE",
            "PUSH1",
            "ADD",
            "OP_83",
            "OP_83",
            "OP_80",
            "OP_82",
            "OP_84",
            "CALLDATACOPY",
            "POP",
            "OP_94",
            "OP_96",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "PUSH1",
            "PUSH2",
            "OP_82",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 1202
        },
        {
          "end_pc": 1379,
          "hash": "0x4700dc329fafff0bc6f70a3dc72bd3680d2137e5826ef887a8f66a7fd5086c9d",
          "opcodes": [
            "JUMPDEST",
            "PUSH2",
            "PUSH1",
            "OP_80",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_90",
            "OP_82",
            "ADD",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_91",
            "OP_91",
            "OP_90",
            "OP_80",
            "OP_80",
            "PUSH1",
            "ADD",
            "PUSH1",
            "OP_80",
            "OP_91",
            "DIV",
            "MUL",
            "PUSH1",
            "ADD",
            "PUSH1",
            "MLOAD",
            "OP_90",
            "OP_81",
            "ADD",
            "PUSH1",
            "MSTORE",
            "OP_80",
            "OP_93",
            "OP_92",
            "OP_91",
            "OP_90",
            "OP_81",
            "OP_81",
            "MSTORE",
            "PUSH1",
            "ADD",
            "OP_83",
            "OP_83",
            "OP_80",
            "OP_82",
            "OP_84",
            "CALLDATACOPY",
            "POP",
            "OP_94",
            "OP_96",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "PUSH2",
            "OP_86",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 1287
        },
        {
          "end_pc": 1475,
          "hash": "0xe67f76d2f3fcfed5fe80312ee16b86840468423343109bfc8655a11d34a4df9b",
          "opcodes": [
            "JUMPDEST",
            "PUSH2",
            "PUSH1",
            "OP_80",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",

exec
/bin/bash -lc "sed -n '1301,1560p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
 succeeded in 0ms:
            "ADD",
            "OP_90",
            "OP_82",
            "ADD",
            "OP_80",
            "CALLDATALOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_91",
            "OP_91",
            "OP_90",
            "OP_80",
            "OP_80",
            "PUSH1",
            "ADD",
            "PUSH1",
            "OP_80",
            "OP_91",
            "DIV",
            "MUL",
            "PUSH1",
            "ADD",
            "PUSH1",
            "MLOAD",
            "OP_90",
            "OP_81",
            "ADD",
            "PUSH1",
            "MSTORE",
            "OP_80",
            "OP_93",
            "OP_92",
            "OP_91",
            "OP_90",
            "OP_81",
            "OP_81",
            "MSTORE",
            "PUSH1",
            "ADD",
            "OP_83",
            "OP_83",
            "OP_80",
            "OP_82",
            "OP_84",
            "CALLDATACOPY",
            "POP",
            "OP_94",
            "OP_96",
            "POP",
            "POP",
            "OP_93",
            "CALLDATALOAD",
            "OP_93",
            "POP",
            "POP",
            "POP",
            "POP",
            "OP_81",
            "CALLER",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "AND",
            "PUSH2",
            "OP_82",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 1380
        },
        {
          "end_pc": 1546,
          "hash": "0x9bd7a67223d32a93314976f541c1c87dc40b843d7a8257be282f991dacf41773",
          "opcodes": [
            "JUMPDEST",
            "PUSH1",
            "MLOAD",
            "OP_80",
            "OP_80",
            "PUSH1",
            "ADD",
            "OP_82",
            "OP_81",
            "SUB",
            "OP_82",
            "MSTORE",
            "OP_83",
            "OP_81",
            "OP_81",
            "MLOAD",
            "OP_81",
            "MSTORE",
            "PUSH1",
            "ADD",
            "OP_91",
            "POP",
            "OP_80",
            "MLOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_90",
            "OP_80",
            "OP_83",
            "OP_83",
            "OP_82",
            "OP_90",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "OP_84",
            "PUSH1",
            "ADD",
            "DIV",
            "PUSH1",
            "MUL",
            "PUSH1",
            "ADD",
            "CALL",
            "POP",
            "OP_90",
            "POP",
            "OP_90",
            "OP_81",
            "ADD",
            "OP_90",
            "PUSH1",
            "AND",
            "OP_80",
            "ISZERO",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 1476
        },
        {
          "end_pc": 1571,
          "hash": "0x51d9d829c9d21c4fd80459e7b646f6c1ebed60daa83c83a67ff2398ab051eb7c",
          "opcodes": [
            "OP_80",
            "OP_82",
            "SUB",
            "OP_80",
            "MLOAD",
            "PUSH1",
            "OP_83",
            "PUSH1",
            "SUB",
            "PUSH2",
            "EXP",
            "SUB",
            "NOT",
            "AND",
            "OP_81",
            "MSTORE",
            "PUSH1",
            "ADD",
            "OP_91",
            "POP"
          ],
          "start_pc": 1547
        },
        {
          "end_pc": 1585,
          "hash": "0xa18bc431fa5567633a272ad933ca3f56085b598aaa5e436f43473e02404d780c",
          "opcodes": [
            "JUMPDEST",
            "POP",
            "OP_92",
            "POP",
            "POP",
            "POP",
            "PUSH1",
            "MLOAD",
            "OP_80",
            "OP_91",
            "SUB",
            "OP_90",
            "RETURN"
          ],
          "start_pc": 1572
        },
        {
          "end_pc": 1614,
          "hash": "0x095fceb81117169d2ade9eb96a2ea9e3c188a7b48f57c2fd6e28444258283cec",
          "opcodes": [
            "JUMPDEST",
            "PUSH1",
            "OP_80",
            "MLOAD",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "OP_92",
            "OP_90",
            "OP_92",
            "AND",
            "OP_82",
            "MSTORE",
            "MLOAD",
            "OP_90",
            "OP_81",
            "OP_90",
            "SUB",
            "PUSH1",
            "ADD",
            "OP_90",
            "RETURN"
          ],
          "start_pc": 1586
        },
        {
          "end_pc": 1632,
          "hash": "0xfd30ef1e3f62579f5b2013ae858c815a9a43476c1f6e6850db8c2e3dba55bc8a",
          "opcodes": [
            "JUMPDEST",
            "PUSH1",
            "OP_80",
            "MLOAD",
            "OP_91",
            "OP_82",
            "MSTORE",
            "MLOAD",
            "OP_90",
            "OP_81",
            "OP_90",
            "SUB",
            "PUSH1",
            "ADD",
            "OP_90",
            "RETURN"
          ],
          "start_pc": 1615
        },
        {
          "end_pc": 1684,
          "hash": "0x675280c2a5ebf290cf4db78d3f1c9beebf76be569cedda5303651a4eb142214c",
          "opcodes": [
            "JUMPDEST",
            "PUSH1",
            "OP_80",
            "MLOAD",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "OP_95",
            "OP_86",
            "AND",
            "OP_81",
            "MSTORE",
            "OP_93",
            "OP_85",
            "AND",

exec
/bin/bash -lc "sed -n '1561,1820p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
 succeeded in 0ms:
            "PUSH1",
            "OP_85",
            "ADD",
            "MSTORE",
            "OP_83",
            "OP_81",
            "ADD",
            "OP_92",
            "OP_90",
            "OP_92",
            "MSTORE",
            "OP_90",
            "OP_92",
            "AND",
            "PUSH1",
            "OP_82",
            "ADD",
            "MSTORE",
            "OP_90",
            "MLOAD",
            "OP_90",
            "OP_81",
            "OP_90",
            "SUB",
            "PUSH1",
            "ADD",
            "OP_90",
            "RETURN"
          ],
          "start_pc": 1633
        },
        {
          "end_pc": 1730,
          "hash": "0x1b6ea00474dafd843430dbc30fa5dd95cd708425754bb4b64bda8fa743a8b77e",
          "opcodes": [
            "JUMPDEST",
            "PUSH1",
            "ADD",
            "OP_80",
            "SLOAD",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "NOT",
            "AND",
            "OP_90",
            "OP_91",
            "OR",
            "OP_90",
            "SSTORE",
            "PUSH1",
            "MLOAD",
            "OP_83",
            "OP_90",
            "PUSH1",
            "OP_80",
            "MLOAD",
            "PUSH1",
            "PUSH2",
            "OP_83",
            "CODECOPY",
            "OP_81",
            "MLOAD",
            "OP_91",
            "MSTORE",
            "OP_90",
            "PUSH1",
            "OP_90",
            "OP_A2"
          ],
          "start_pc": 1685
        },
        {
          "end_pc": 1732,
          "hash": "0x3cb9f038c01a626984d69d67acdbcdd8262079cb12f3b138de8e0cff581962a7",
          "opcodes": [
            "JUMPDEST",
            "POP"
          ],
          "start_pc": 1731
        },
        {
          "end_pc": 1736,
          "hash": "0xa06d5219dd3292f91e3edd455dc495c81e1591e7d7430005e5f88d46d38d7716",
          "opcodes": [
            "JUMPDEST",
            "POP",
            "POP",
            "JUMP"
          ],
          "start_pc": 1733
        },
        {
          "end_pc": 1756,
          "hash": "0x65d95aad2589b86a0b3e889106b340dde00a6251d3031ccbfc3adb55e2646e50",
          "opcodes": [
            "JUMPDEST",
            "PUSH1",
            "ADD",
            "SLOAD",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "AND",
            "EQ",
            "ISZERO",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 1737
        },
        {
          "end_pc": 1765,
          "hash": "0xd03ba9efc4a348eaac4d8fa6217f211b964d4bbb0d5cc854d65401c5f1669416",
          "opcodes": [
            "OP_81",
            "PUSH2",
            "OP_84",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 1757
        },
        {
          "end_pc": 1785,
          "hash": "0x1a7d89a6d920165d672d21e04ecc5b6a38a2e1286d09820560ac1252ddb792a5",
          "opcodes": [
            "JUMPDEST",
            "PUSH1",
            "ADD",
            "SLOAD",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "AND",
            "EQ",
            "ISZERO",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 1766
        },
        {
          "end_pc": 1794,
          "hash": "0x3045006ee924fae881169945500770c1d4a9dccfd176e6beff60d4733c3c8081",
          "opcodes": [
            "OP_81",
            "PUSH2",
            "OP_84",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 1786
        },
        {
          "end_pc": 1841,
          "hash": "0xadb7d77c92a0f7e6e9e6827f2e978c19a0e30cc08b6db61398756a43cbcb58eb",
          "opcodes": [
            "JUMPDEST",
            "OP_80",
            "SLOAD",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "NOT",
            "AND",
            "OP_90",
            "OP_91",
            "OR",
            "OP_90",
            "SSTORE",
            "PUSH1",
            "MLOAD",
            "OP_83",
            "OP_90",
            "PUSH1",
            "OP_80",
            "MLOAD",
            "PUSH1",
            "PUSH2",
            "OP_83",
            "CODECOPY",
            "OP_81",
            "MLOAD",
            "OP_91",
            "MSTORE",
            "OP_90",
            "PUSH1",
            "OP_90",
            "OP_A2",
            "POP",
            "POP",
            "POP",
            "JUMP"
          ],
          "start_pc": 1795
        },
        {
          "end_pc": 1888,
          "hash": "0xda59a95bebcd296e50f90739315e5e84b17cf03ac1440004f64a905d58e5fbe1",
          "opcodes": [
            "JUMPDEST",
            "PUSH1",
            "OP_81",
            "ADD",
            "SLOAD",
            "OP_81",
            "SLOAD",
            "PUSH1",
            "OP_83",
            "ADD",
            "SLOAD",
            "PUSH1",
            "OP_93",
            "OP_90",
            "OP_93",
            "ADD",
            "SLOAD",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "OP_91",
            "OP_82",
            "AND",
            "OP_9A",
            "OP_93",
            "OP_82",
            "AND",
            "OP_99",
            "POP",
            "OP_97",
            "POP",
            "AND",
            "OP_94",
            "POP",
            "OP_92",
            "POP",
            "POP",
            "POP",
            "JUMP"
          ],
          "start_pc": 1842
        },
        {
          "end_pc": 1901,
          "hash": "0xcfa9f1aa385e680bc9413d59fe1c38c67d53ac2dcab74fcd238a52feb29dabd2",
          "opcodes": [
            "JUMPDEST",
            "SLOAD",
            "PUSH1",

exec
/bin/bash -lc "sed -n '1821,2080p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
 succeeded in 0ms:
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "AND",
            "OP_90",
            "POP"
          ],
          "start_pc": 1889
        },
        {
          "end_pc": 1906,
          "hash": "0x31fc0b69d5834091bd1eb2d6a79251e180e7bfdea4f8a5df88bdb8ce677db679",
          "opcodes": [
            "JUMPDEST",
            "OP_91",
            "OP_90",
            "POP",
            "JUMP"
          ],
          "start_pc": 1902
        },
        {
          "end_pc": 1926,
          "hash": "0xac0ee87018d83cba1de6909f148970b0accb29ecd956580fa9bec77961fed932",
          "opcodes": [
            "JUMPDEST",
            "PUSH1",
            "ADD",
            "SLOAD",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "AND",
            "OP_90",
            "POP",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 1907
        },
        {
          "end_pc": 1937,
          "hash": "0x51c59fc089520141aeacb33357bd913d25392268b29f7c33b813ada6df97c7a6",
          "opcodes": [
            "JUMPDEST",
            "PUSH1",
            "ADD",
            "SLOAD",
            "OP_90",
            "POP",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 1927
        },
        {
          "end_pc": 1957,
          "hash": "0xf78fc57b9ee72fb4b53485393e26c23d654892e9cacef7b75c06b2ec8c9261ba",
          "opcodes": [
            "JUMPDEST",
            "PUSH1",
            "ADD",
            "SLOAD",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "AND",
            "EQ",
            "ISZERO",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 1938
        },
        {
          "end_pc": 1966,
          "hash": "0x3d5babe585585b6ab6b1b7c022b9121a0e80389df2e833e4ceef5d5129f72eef",
          "opcodes": [
            "OP_81",
            "PUSH2",
            "OP_84",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 1958
        },
        {
          "end_pc": 2016,
          "hash": "0x69cebc6a482573de2ebe0608b76ae27a2b19875f5c07e940e499d918a1363fca",
          "opcodes": [
            "JUMPDEST",
            "PUSH1",
            "ADD",
            "OP_80",
            "SLOAD",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "NOT",
            "AND",
            "OP_90",
            "OP_91",
            "OR",
            "OP_90",
            "SSTORE",
            "PUSH1",
            "MLOAD",
            "OP_83",
            "OP_90",
            "PUSH1",
            "OP_80",
            "MLOAD",
            "PUSH1",
            "PUSH2",
            "OP_83",
            "CODECOPY",
            "OP_81",
            "MLOAD",
            "OP_91",
            "MSTORE",
            "OP_90",
            "PUSH1",
            "OP_90",
            "OP_A2",
            "POP",
            "POP",
            "POP",
            "JUMP"
          ],
          "start_pc": 1967
        },
        {
          "end_pc": 2036,
          "hash": "0x96ebdb09fa71484fe62c16733d86d1173f41a86a2a7b5c6b10750321061470c9",
          "opcodes": [
            "JUMPDEST",
            "PUSH1",
            "ADD",
            "SLOAD",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "AND",
            "EQ",
            "ISZERO",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 2017
        },
        {
          "end_pc": 2045,
          "hash": "0xc331810d876a1fbe2c958a6c2318da17680cbee4c3ea0ed4759fcaa387bd70a6",
          "opcodes": [
            "OP_81",
            "PUSH2",
            "OP_84",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 2037
        },
        {
          "end_pc": 2079,
          "hash": "0x6a9577669e848dd2fac0a497033532135b16372733e2aa8eb16bea6edc47eeac",
          "opcodes": [
            "JUMPDEST",
            "PUSH1",
            "ADD",
            "SSTORE",
            "PUSH1",
            "MLOAD",
            "OP_83",
            "OP_90",
            "PUSH1",
            "OP_80",
            "MLOAD",
            "PUSH1",
            "PUSH2",
            "OP_83",
            "CODECOPY",
            "OP_81",
            "MLOAD",
            "OP_91",
            "MSTORE",
            "OP_90",
            "PUSH1",
            "OP_90",
            "OP_A2",
            "POP",
            "POP",
            "POP",
            "JUMP"
          ],
          "start_pc": 2046
        },
        {
          "end_pc": 2096,
          "hash": "0x9b8b6a5400b2e297ae7b20d6f00f568687bc916675f968538840541eb5c0893d",
          "opcodes": [
            "JUMPDEST",
            "SLOAD",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "AND",
            "EQ",
            "ISZERO",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 2080
        },
        {
          "end_pc": 2178,
          "hash": "0xe859ba714c2a165a0d9cb97fa999a01d75268fc33e20de66f965a3237ce3058f",
          "opcodes": [
            "PUSH1",
            "MLOAD",
            "OP_81",
            "OP_90",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "CALLER",
            "AND",
            "OP_90",
            "PUSH32",
            "OP_90",
            "PUSH1",
            "OP_90",
            "OP_A3",
            "OP_80",
            "PUSH1",
            "PUSH1",
            "EXP",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "CALLER",
            "AND",
            "PUSH1",
            "PUSH1",
            "EXP",
            "OP_81",

exec
/bin/bash -lc "sed -n '2081,2340p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
 succeeded in 0ms:
            "LT",
            "ISZERO",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 2097
        },
        {
          "end_pc": 2238,
          "hash": "0xd37ccabf6236a7f14313e50e62ed6a36af8761f56d11dae34499c37b8d2655fe",
          "opcodes": [
            "ADD",
            "PUSH1",
            "POP",
            "OP_90",
            "OP_80",
            "MLOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_90",
            "OP_82",
            "OP_80",
            "SLOAD",
            "PUSH1",
            "OP_81",
            "PUSH1",
            "AND",
            "ISZERO",
            "PUSH2",
            "MUL",
            "SUB",
            "AND",
            "PUSH1",
            "OP_90",
            "DIV",
            "OP_90",
            "PUSH1",
            "MSTORE",
            "PUSH1",
            "PUSH1",
            "SHA3",
            "OP_90",
            "PUSH1",
            "ADD",
            "PUSH1",
            "OP_90",
            "DIV",
            "OP_81",
            "ADD",
            "OP_92",
            "OP_82",
            "PUSH1",
            "LT",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 2179
        },
        {
          "end_pc": 2250,
          "hash": "0x4400c334a70b3b819ab1fe919db3872efd4abbd536510a1b55935c76033d4203",
          "opcodes": [
            "OP_80",
            "MLOAD",
            "PUSH1",
            "NOT",
            "AND",
            "OP_83",
            "OP_80",
            "ADD",
            "OR",
            "OP_85",
            "SSTORE"
          ],
          "start_pc": 2239
        },
        {
          "end_pc": 2258,
          "hash": "0xb7b5ceb412e014d250b13cc1148a0c280aace0492ccb84d4340f1a49a16c4144",
          "opcodes": [
            "JUMPDEST",
            "POP",
            "PUSH2",
            "OP_92",
            "OP_91",
            "POP"
          ],
          "start_pc": 2251
        },
        {
          "end_pc": 2267,
          "hash": "0x599d4b014b3bc13a9c327882ab9064fd277aff73e7fc51c19bcb57f11c3c5339",
          "opcodes": [
            "JUMPDEST",
            "OP_80",
            "OP_82",
            "GT",
            "ISZERO",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 2259
        },
        {
          "end_pc": 2278,
          "hash": "0xe7c78ae4e0fcf08a56f525ee61f3d93259788c33077616c8a2caea7aee95e714",
          "opcodes": [
            "PUSH1",
            "OP_81",
            "SSTORE",
            "PUSH1",
            "ADD",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 2268
        },
        {
          "end_pc": 2281,
          "hash": "0x24c4498d764ee411450192a86f7a85071c4dcbef7359fbddd54ed34f7a98ce0c",
          "opcodes": [
            "JUMPDEST",
            "POP",
            "JUMP"
          ],
          "start_pc": 2279
        },
        {
          "end_pc": 2296,
          "hash": "0xb549d923a0eb08200cd5d4fffbb94bf9606ecd90d6a7c13e74c9c61a1b8e94b3",
          "opcodes": [
            "JUMPDEST",
            "OP_82",
            "OP_80",
            "ADD",
            "PUSH1",
            "ADD",
            "OP_85",
            "SSTORE",
            "OP_82",
            "ISZERO",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 2282
        },
        {
          "end_pc": 2299,
          "hash": "0x66b466d2850505b268b527abfc2e46b400ceb444f9aa56eaef3ab1f83b8876d1",
          "opcodes": [
            "OP_91",
            "OP_82",
            "ADD"
          ],
          "start_pc": 2297
        },
        {
          "end_pc": 2308,
          "hash": "0x65ff1f6627c223d7a6efc050152bfb3b19bfac11063063504f32ac291a3c941a",
          "opcodes": [
            "JUMPDEST",
            "OP_82",
            "OP_81",
            "GT",
            "ISZERO",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 2300
        },
        {
          "end_pc": 2329,
          "hash": "0x1744ba3b8d9bb3c26f96b15f04b891d2904f14f7a07d75e0c7cf0fba2b028085",
          "opcodes": [
            "OP_82",
            "MLOAD",
            "OP_82",
            "PUSH1",
            "POP",
            "SSTORE",
            "OP_91",
            "PUSH1",
            "ADD",
            "OP_91",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_90",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 2309
        },
        {
          "end_pc": 2333,
          "hash": "0x0a3ea09c5a7a9d155ff10040fbc235f2ac09676f11e3aed96977bcda7b4b001d",
          "opcodes": [
            "JUMPDEST",
            "POP",
            "OP_90",
            "JUMP"
          ],
          "start_pc": 2330
        },
        {
          "end_pc": 2360,
          "hash": "0x6473473d59765fc26fbfdaf149cdb601ecf8fbc3ff6ebf34e1a421107e6733da",
          "opcodes": [
            "JUMPDEST",
            "PUSH1",
            "OP_81",
            "ADD",
            "SLOAD",
            "OP_90",
            "OP_91",
            "POP",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "AND",
            "PUSH1",
            "EQ",
            "OP_80",
            "ISZERO",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 2334
        },
        {
          "end_pc": 2373,
          "hash": "0x5c40f9cbf15cbaeadfa7becf155e54faf9062e4ba02d25a7dd5b90df23b32600",
          "opcodes": [
            "POP",
            "PUSH8",
            "CALLVALUE",
            "LT",
            "ISZERO"
          ],
          "start_pc": 2361
        },
        {
          "end_pc": 2380,
          "hash": "0x8aee5472047c32e6c9b1f189dce106da0ac65c870ffbe4e895aa5b43b0e0885f",
          "opcodes": [
            "JUMPDEST",
            "OP_80",
            "ISZERO",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 2374
        },
        {
          "end_pc": 2387,
          "hash": "0xd7cbdb40cbbfe6452b2e86dc385332c1c5d68000983d80869b083ad21623474a",
          "opcodes": [

exec
/bin/bash -lc "sed -n '2341,2600p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
 succeeded in 0ms:
            "POP",
            "PUSH1",
            "OP_82",
            "MLOAD",
            "LT",
            "ISZERO"
          ],
          "start_pc": 2381
        },
        {
          "end_pc": 2393,
          "hash": "0x4ff40fd578984a172cb5aae09fbab86cef5c8b7a9a20720200370d985da9988d",
          "opcodes": [
            "JUMPDEST",
            "ISZERO",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 2388
        },
        {
          "end_pc": 2441,
          "hash": "0xf47bdb6076369ba5277be0bddb166cba3f72d9580d60fe45e201b24a11c5b0d1",
          "opcodes": [
            "PUSH1",
            "OP_81",
            "ADD",
            "OP_80",
            "SLOAD",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "NOT",
            "AND",
            "CALLER",
            "OR",
            "OP_90",
            "SSTORE",
            "PUSH1",
            "MLOAD",
            "OP_82",
            "OP_90",
            "PUSH1",
            "OP_80",
            "MLOAD",
            "PUSH1",
            "PUSH2",
            "OP_83",
            "CODECOPY",
            "OP_81",
            "MLOAD",
            "OP_91",
            "MSTORE",
            "OP_90",
            "PUSH1",
            "OP_90",
            "OP_A2",
            "POP",
            "POP",
            "JUMP"
          ],
          "start_pc": 2394
        },
        {
          "end_pc": 2461,
          "hash": "0x95e083fda678634a54849c865ecd15ce65342800aa4c662c19a00bd58176773a",
          "opcodes": [
            "JUMPDEST",
            "PUSH1",
            "ADD",
            "SLOAD",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "AND",
            "EQ",
            "ISZERO",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 2442
        },
        {
          "end_pc": 2533,
          "hash": "0xc1613122db7948fe7ed03dfd479379c844f83bf1d7edbcdb3c699767b6c54571",
          "opcodes": [
            "PUSH1",
            "PUSH1",
            "POP",
            "PUSH1",
            "OP_84",
            "PUSH1",
            "MLOAD",
            "OP_80",
            "OP_82",
            "OP_80",
            "MLOAD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_90",
            "OP_80",
            "OP_83",
            "OP_83",
            "OP_82",
            "OP_90",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "OP_84",
            "PUSH1",
            "ADD",
            "DIV",
            "PUSH1",
            "MUL",
            "PUSH1",
            "ADD",
            "CALL",
            "POP",
            "OP_90",
            "OP_91",
            "ADD",
            "OP_82",
            "OP_90",
            "SUB",
            "OP_90",
            "OP_91",
            "SHA3",
            "OP_92",
            "OP_90",
            "OP_92",
            "DIV",
            "OP_91",
            "POP",
            "POP",
            "PUSH1",
            "PUSH1",
            "EXP",
            "OP_81",
            "LT",
            "ISZERO",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 2462
        },
        {
          "end_pc": 2642,
          "hash": "0xba72556e8db78c64689c0a53636d2707c07db89fa54f660af239f76c67b28620",
          "opcodes": [
            "PUSH1",
            "MUL",
            "OP_80",
            "SLOAD",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "NOT",
            "OP_90",
            "OP_81",
            "AND",
            "OP_82",
            "SSTORE",
            "PUSH1",
            "OP_82",
            "ADD",
            "OP_80",
            "SLOAD",
            "OP_82",
            "AND",
            "OP_90",
            "SSTORE",
            "PUSH1",
            "OP_82",
            "ADD",
            "OP_83",
            "OP_90",
            "SSTORE",
            "PUSH1",
            "OP_91",
            "OP_90",
            "OP_91",
            "ADD",
            "OP_80",
            "SLOAD",
            "OP_90",
            "OP_91",
            "AND",
            "OP_90",
            "SSTORE",
            "PUSH1",
            "MLOAD",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "OP_84",
            "AND",
            "OP_91",
            "OP_90",
            "PUSH8",
            "OP_90",
            "OP_82",
            "OP_81",
            "OP_81",
            "OP_81",
            "OP_85",
            "OP_88",
            "OP_83",
            "CALL",
            "POP",
            "OP_86",
            "OP_93",
            "POP",
            "PUSH1",
            "OP_80",
            "MLOAD",
            "PUSH1",
            "PUSH2",
            "OP_83",
            "CODECOPY",
            "OP_81",
            "MLOAD",
            "OP_91",
            "MSTORE",
            "OP_92",
            "OP_91",
            "POP",
            "OP_A2",
            "POP",
            "POP",
            "POP",
            "JUMP"
          ],
          "start_pc": 2534
        },
        {
          "end_pc": 2662,
          "hash": "0x70a700e6a5f2f6c4f36c384f5cc3e99c2870e93114fa3036f7c6914a31965af3",
          "opcodes": [
            "JUMPDEST",
            "PUSH1",
            "ADD",
            "SLOAD",
            "PUSH1",
            "PUSH1",
            "PUSH1",
            "EXP",
            "SUB",
            "AND",
            "OP_90",
            "POP",
            "PUSH2",

exec
/bin/bash -lc "sed -n '2601,2860p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
 succeeded in 0ms:
            "JUMP"
          ],
          "start_pc": 2643
        },
        {
          "end_pc": 2676,
          "hash": "0x6b0058e448568a07ec3f347c041a05e83895205831b90ed6677ced561d26bb5e",
          "opcodes": [
            "JUMPDEST",
            "OP_82",
            "ADD",
            "OP_91",
            "OP_90",
            "PUSH1",
            "MSTORE",
            "PUSH1",
            "PUSH1",
            "SHA3",
            "OP_90"
          ],
          "start_pc": 2663
        },
        {
          "end_pc": 2696,
          "hash": "0x7e9b66bb3db47bd594ebeca7e194bc84c79cd5441d4014348c43d4375fbf6d45",
          "opcodes": [
            "JUMPDEST",
            "OP_81",
            "SLOAD",
            "OP_81",
            "MSTORE",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_90",
            "PUSH1",
            "ADD",
            "OP_80",
            "OP_83",
            "GT",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 2677
        },
        {
          "end_pc": 2705,
          "hash": "0x12e16cb397a1bb294267b44bc99abfb9af47494d6aa6ae0d477895930926cb32",
          "opcodes": [
            "OP_82",
            "OP_90",
            "SUB",
            "PUSH1",
            "AND",
            "OP_82",
            "ADD",
            "OP_91"
          ],
          "start_pc": 2697
        },
        {
          "end_pc": 2717,
          "hash": "0x951b2d660f54c562ce551d02c1a25e54c81604b3ba3e9a712aeffa54404d889f",
          "opcodes": [
            "JUMPDEST",
            "POP",
            "POP",
            "POP",
            "POP",
            "POP",
            "OP_90",
            "POP",
            "PUSH2",
            "JUMP"
          ],
          "start_pc": 2706
        },
        {
          "end_pc": 2727,
          "hash": "0xfc6c0f0bbbaa575011f3c62665e44c316159a7ada8db11298aaf6fd254586b40",
          "opcodes": [
            "SHR",
            "OP_F7",
            "PUSH6",
            "PUSH23"
          ],
          "start_pc": 2718
        }
      ],
      "callsites": [
        {
          "opcode": "CALL",
          "pc": 440,
          "returndata_checked": null,
          "target_expression_category": "constant",
          "value_expression_category": "constant_zero"
        },
        {
          "opcode": "CALL",
          "pc": 1530,
          "returndata_checked": null,
          "target_expression_category": "computed",
          "value_expression_category": "computed"
        },
        {
          "opcode": "CALL",
          "pc": 2504,
          "returndata_checked": null,
          "target_expression_category": "computed",
          "value_expression_category": "constant_zero"
        },
        {
          "opcode": "CALL",
          "pc": 2615,
          "returndata_checked": null,
          "target_expression_category": "computed",
          "value_expression_category": "computed"
        }
      ],
      "cfg_edges": [
        {
          "from": "bb:0",
          "to": "bb:163",
          "type": "control_flow"
        },
        {
          "from": "bb:0",
          "to": "bb:11",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:11",
          "to": "bb:165",
          "type": "control_flow"
        },
        {
          "from": "bb:11",
          "to": "bb:31",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:31",
          "to": "bb:303",
          "type": "control_flow"
        },
        {
          "from": "bb:31",
          "to": "bb:42",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:42",
          "to": "bb:481",
          "type": "control_flow"
        },
        {
          "from": "bb:42",
          "to": "bb:53",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:53",
          "to": "bb:577",
          "type": "control_flow"
        },
        {
          "from": "bb:53",
          "to": "bb:64",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:64",
          "to": "bb:662",
          "type": "control_flow"
        },
        {
          "from": "bb:64",
          "to": "bb:75",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:75",
          "to": "bb:747",
          "type": "control_flow"
        },
        {
          "from": "bb:75",
          "to": "bb:86",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:86",
          "to": "bb:832",
          "type": "control_flow"
        },
        {
          "from": "bb:86",
          "to": "bb:97",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:97",
          "to": "bb:928",
          "type": "control_flow"
        },
        {
          "from": "bb:97",
          "to": "bb:108",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:108",
          "to": "bb:1021",
          "type": "control_flow"
        },
        {
          "from": "bb:108",
          "to": "bb:119",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:119",
          "to": "bb:1117",
          "type": "control_flow"
        },
        {
          "from": "bb:119",
          "to": "bb:130",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:130",
          "to": "bb:1202",
          "type": "control_flow"
        },
        {
          "from": "bb:130",
          "to": "bb:141",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:141",
          "to": "bb:1287",
          "type": "control_flow"
        },
        {
          "from": "bb:141",
          "to": "bb:152",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:152",
          "to": "bb:1380",
          "type": "control_flow"
        },
        {
          "from": "bb:152",
          "to": "bb:163",
          "type": "control_flow_fallthrough"
        },

exec
/bin/bash -lc "sed -n '2861,3120p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
 succeeded in 0ms:
        {
          "from": "bb:165",
          "to": "bb:214",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:214",
          "to": "bb:2706",
          "type": "control_flow"
        },
        {
          "from": "bb:214",
          "to": "bb:276",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:276",
          "to": "bb:2663",
          "type": "control_flow"
        },
        {
          "from": "bb:276",
          "to": "bb:284",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:284",
          "to": "bb:2706",
          "type": "control_flow"
        },
        {
          "from": "bb:303",
          "to": "bb:395",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:395",
          "to": "bb:470",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:470",
          "to": "bb:1902",
          "type": "control_flow"
        },
        {
          "from": "bb:481",
          "to": "bb:395",
          "type": "control_flow"
        },
        {
          "from": "bb:577",
          "to": "bb:395",
          "type": "control_flow"
        },
        {
          "from": "bb:662",
          "to": "bb:395",
          "type": "control_flow"
        },
        {
          "from": "bb:747",
          "to": "bb:395",
          "type": "control_flow"
        },
        {
          "from": "bb:832",
          "to": "bb:395",
          "type": "control_flow"
        },
        {
          "from": "bb:928",
          "to": "bb:395",
          "type": "control_flow"
        },
        {
          "from": "bb:1021",
          "to": "bb:395",
          "type": "control_flow"
        },
        {
          "from": "bb:1117",
          "to": "bb:395",
          "type": "control_flow"
        },
        {
          "from": "bb:1202",
          "to": "bb:395",
          "type": "control_flow"
        },
        {
          "from": "bb:1287",
          "to": "bb:395",
          "type": "control_flow"
        },
        {
          "from": "bb:1380",
          "to": "bb:395",
          "type": "control_flow"
        },
        {
          "from": "bb:1476",
          "to": "bb:1572",
          "type": "control_flow"
        },
        {
          "from": "bb:1476",
          "to": "bb:1547",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:1547",
          "to": "bb:1572",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:1685",
          "to": "bb:1731",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:1731",
          "to": "bb:1733",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:1737",
          "to": "bb:1731",
          "type": "control_flow"
        },
        {
          "from": "bb:1737",
          "to": "bb:1757",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:1757",
          "to": "bb:395",
          "type": "control_flow"
        },
        {
          "from": "bb:1766",
          "to": "bb:1731",
          "type": "control_flow"
        },
        {
          "from": "bb:1766",
          "to": "bb:1786",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:1786",
          "to": "bb:395",
          "type": "control_flow"
        },
        {
          "from": "bb:1889",
          "to": "bb:1902",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:1907",
          "to": "bb:1902",
          "type": "control_flow"
        },
        {
          "from": "bb:1927",
          "to": "bb:1902",
          "type": "control_flow"
        },
        {
          "from": "bb:1938",
          "to": "bb:1731",
          "type": "control_flow"
        },
        {
          "from": "bb:1938",
          "to": "bb:1958",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:1958",
          "to": "bb:395",
          "type": "control_flow"
        },
        {
          "from": "bb:2017",
          "to": "bb:1731",
          "type": "control_flow"
        },
        {
          "from": "bb:2017",
          "to": "bb:2037",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:2037",
          "to": "bb:395",
          "type": "control_flow"
        },
        {
          "from": "bb:2080",
          "to": "bb:2279",
          "type": "control_flow"
        },
        {
          "from": "bb:2080",
          "to": "bb:2097",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:2097",
          "to": "bb:2179",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:2179",
          "to": "bb:2282",
          "type": "control_flow"
        },
        {
          "from": "bb:2179",
          "to": "bb:2239",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:2239",
          "to": "bb:2251",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:2251",
          "to": "bb:2259",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:2259",
          "to": "bb:2330",
          "type": "control_flow"
        },
        {
          "from": "bb:2259",
          "to": "bb:2268",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:2268",
          "to": "bb:2259",
          "type": "control_flow"
        },
        {
          "from": "bb:2282",
          "to": "bb:2251",
          "type": "control_flow"
        },
        {
          "from": "bb:2282",
          "to": "bb:2297",
          "type": "control_flow_fallthrough"
        },

exec
/bin/bash -lc "sed -n '3121,3380p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
 succeeded in 0ms:
        {
          "from": "bb:2297",
          "to": "bb:2300",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:2300",
          "to": "bb:2251",
          "type": "control_flow"
        },
        {
          "from": "bb:2300",
          "to": "bb:2309",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:2309",
          "to": "bb:2300",
          "type": "control_flow"
        },
        {
          "from": "bb:2334",
          "to": "bb:2374",
          "type": "control_flow"
        },
        {
          "from": "bb:2334",
          "to": "bb:2361",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:2361",
          "to": "bb:2374",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:2374",
          "to": "bb:2388",
          "type": "control_flow"
        },
        {
          "from": "bb:2374",
          "to": "bb:2381",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:2381",
          "to": "bb:2388",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:2388",
          "to": "bb:1733",
          "type": "control_flow"
        },
        {
          "from": "bb:2388",
          "to": "bb:2394",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:2442",
          "to": "bb:1731",
          "type": "control_flow"
        },
        {
          "from": "bb:2442",
          "to": "bb:2462",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:2462",
          "to": "bb:2534",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:2643",
          "to": "bb:1902",
          "type": "control_flow"
        },
        {
          "from": "bb:2663",
          "to": "bb:2677",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:2677",
          "to": "bb:2677",
          "type": "control_flow"
        },
        {
          "from": "bb:2677",
          "to": "bb:2697",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:2697",
          "to": "bb:2706",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:2706",
          "to": "bb:1902",
          "type": "control_flow"
        }
      ],
      "cfg_hash": "0xb6fb6f3f477b82571ef71458778786f3a1f85b24bb054f14f0f55822dfd4a6a2",
      "dispatcher_type": "selector_jump_table",
      "function_entries": [
        {
          "entry_pc": null,
          "selector": "0x01984892"
        },
        {
          "entry_pc": 557555384,
          "selector": "0x092b25e9"
        },
        {
          "entry_pc": 1360731641,
          "selector": "0x213b9eb8"
        },
        {
          "entry_pc": 2135186468,
          "selector": "0x511b1df9"
        },
        {
          "entry_pc": 2929303246,
          "selector": "0x7f445c24"
        },
        {
          "entry_pc": 3044360261,
          "selector": "0xae999ece"
        },
        {
          "entry_pc": 3296657447,
          "selector": "0xb5754045"
        },
        {
          "entry_pc": 3438605331,
          "selector": "0xc47f0027"
        },
        {
          "entry_pc": 3713312303,
          "selector": "0xccf4f413"
        },
        {
          "entry_pc": 3746935834,
          "selector": "0xdd54a62f"
        },
        {
          "entry_pc": 3843739158,
          "selector": "0xdf55b41a"
        },
        {
          "entry_pc": 4251931696,
          "selector": "0xe51ace16"
        },
        {
          "entry_pc": null,
          "selector": "0xfd6f5430"
        }
      ],
      "functions": [
        {
          "auth": {
            "guards": []
          },
          "entry_pc": null,
          "selector": "0x01984892",
          "sinks": {
            "call": 4,
            "delegatecall": 0,
            "selfdestruct": 0,
            "staticcall": 0
          },
          "storage": {
            "reads": 26,
            "slots": [
              {
                "op": "SLOAD",
                "pc": 289,
                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
              }
            ],
            "writes": 13
          }
        },
        {
          "auth": {
            "guards": []
          },
          "entry_pc": 557555384,
          "selector": "0x092b25e9",
          "sinks": {
            "call": 4,
            "delegatecall": 0,
            "selfdestruct": 0,
            "staticcall": 0
          },
          "storage": {
            "reads": 26,
            "slots": [
              {
                "op": "SLOAD",
                "pc": 289,
                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
              }
            ],
            "writes": 13
          }
        },
        {
          "auth": {
            "guards": []
          },
          "entry_pc": 1360731641,
          "selector": "0x213b9eb8",
          "sinks": {
            "call": 4,
            "delegatecall": 0,
            "selfdestruct": 0,
            "staticcall": 0
          },
          "storage": {
            "reads": 26,
            "slots": [
              {
                "op": "SLOAD",
                "pc": 289,
                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
              }
            ],
            "writes": 13
          }
        },
        {
          "auth": {
            "guards": []
          },
          "entry_pc": 2135186468,
          "selector": "0x511b1df9",
          "sinks": {
            "call": 4,
            "delegatecall": 0,
            "selfdestruct": 0,
            "staticcall": 0
          },
          "storage": {
            "reads": 26,
            "slots": [
              {
                "op": "SLOAD",
                "pc": 289,
                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
              }
            ],
            "writes": 13
          }
        },
        {

exec
/bin/bash -lc "sed -n '3381,3640p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
 succeeded in 0ms:
          "auth": {
            "guards": []
          },
          "entry_pc": 2929303246,
          "selector": "0x7f445c24",
          "sinks": {
            "call": 4,
            "delegatecall": 0,
            "selfdestruct": 0,
            "staticcall": 0
          },
          "storage": {
            "reads": 26,
            "slots": [
              {
                "op": "SLOAD",
                "pc": 289,
                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
              }
            ],
            "writes": 13
          }
        },
        {
          "auth": {
            "guards": []
          },
          "entry_pc": 3044360261,
          "selector": "0xae999ece",
          "sinks": {
            "call": 4,
            "delegatecall": 0,
            "selfdestruct": 0,
            "staticcall": 0
          },
          "storage": {
            "reads": 26,
            "slots": [
              {
                "op": "SLOAD",
                "pc": 289,
                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
              }
            ],
            "writes": 13
          }
        },
        {
          "auth": {
            "guards": []
          },
          "entry_pc": 3296657447,
          "selector": "0xb5754045",
          "sinks": {
            "call": 4,
            "delegatecall": 0,
            "selfdestruct": 0,
            "staticcall": 0
          },
          "storage": {
            "reads": 26,
            "slots": [
              {
                "op": "SLOAD",
                "pc": 289,
                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
              }
            ],
            "writes": 13
          }
        },
        {
          "auth": {
            "guards": []
          },
          "entry_pc": 3438605331,
          "selector": "0xc47f0027",
          "sinks": {
            "call": 4,
            "delegatecall": 0,
            "selfdestruct": 0,
            "staticcall": 0
          },
          "storage": {
            "reads": 26,
            "slots": [
              {
                "op": "SLOAD",
                "pc": 289,
                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
              }
            ],
            "writes": 13
          }
        },
        {
          "auth": {
            "guards": []
          },
          "entry_pc": 3713312303,
          "selector": "0xccf4f413",
          "sinks": {
            "call": 4,
            "delegatecall": 0,
            "selfdestruct": 0,
            "staticcall": 0
          },
          "storage": {
            "reads": 26,
            "slots": [
              {
                "op": "SLOAD",
                "pc": 289,
                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
              }
            ],
            "writes": 13
          }
        },
        {
          "auth": {
            "guards": []
          },
          "entry_pc": 3746935834,
          "selector": "0xdd54a62f",
          "sinks": {
            "call": 4,
            "delegatecall": 0,
            "selfdestruct": 0,
            "staticcall": 0
          },
          "storage": {
            "reads": 26,
            "slots": [
              {
                "op": "SLOAD",
                "pc": 289,
                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
              }
            ],
            "writes": 13
          }
        },
        {
          "auth": {
            "guards": []
          },
          "entry_pc": 3843739158,
          "selector": "0xdf55b41a",
          "sinks": {
            "call": 4,
            "delegatecall": 0,
            "selfdestruct": 0,
            "staticcall": 0
          },
          "storage": {
            "reads": 26,
            "slots": [
              {
                "op": "SLOAD",
                "pc": 289,
                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
              }
            ],
            "writes": 13
          }
        },
        {
          "auth": {
            "guards": []
          },
          "entry_pc": 4251931696,
          "selector": "0xe51ace16",
          "sinks": {
            "call": 4,
            "delegatecall": 0,
            "selfdestruct": 0,
            "staticcall": 0
          },
          "storage": {
            "reads": 26,
            "slots": [
              {
                "op": "SLOAD",
                "pc": 289,
                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
              }
            ],
            "writes": 13
          }
        },
        {
          "auth": {
            "guards": []
          },
          "entry_pc": null,
          "selector": "0xfd6f5430",
          "sinks": {
            "call": 4,
            "delegatecall": 0,
            "selfdestruct": 0,
            "staticcall": 0
          },
          "storage": {
            "reads": 26,
            "slots": [
              {
                "op": "SLOAD",
                "pc": 289,
                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
              }
            ],
            "writes": 13
          }
        }
      ],
      "selectors": [
        "0x01984892",
        "0x092b25e9",
        "0x213b9eb8",
        "0x511b1df9",
        "0x7f445c24",
        "0xae999ece",
        "0xb5754045",
        "0xc47f0027",
        "0xccf4f413",
        "0xdd54a62f",
        "0xdf55b41a",
        "0xe51ace16",
        "0xfd6f5430"
      ],
      "sinks": {
        "call": 4,
        "create": 0,
        "create2": 0,
        "delegatecall": 0,
        "selfdestruct": 0,
        "staticcall": 0,
        "upgrade_slot_write_suspected": false
      },
      "storage": {
        "keccak_count": 4,
        "reads": 26,
        "slots": [
          {
            "op": "SLOAD",
            "pc": 289,
            "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
          }
        ],
        "writes": 13
      },
      "version": "analysis_artifact_v1"
    },
    "block_number": null,
    "chain_id": 1,
    "codehash": "0x442fb089dcd7251563797d1a9528c790baa53b792306a35c6f1fef135793d337",
    "created_at": "2026-04-04T19:45:06.000000Z",
    "id": 1500,
    "updated_at": "2026-04-04T20:42:26.000000Z",

exec
/bin/bash -lc "sed -n '3641,3900p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
 succeeded in 0ms:
    "version": "analysis_artifact_v1"
  },
  "analysis_run": {
    "address": "0x0e5e2b9341341ade98f510ad9a744e01f3b29f03",
    "block_number": null,
    "chain_id": 1,
    "child_links": [],
    "created_at": "2025-12-19T20:03:50.000000Z",
    "id": "019b3836-22d7-70d4-8f04-697b1924f6d7",
    "parent_links": [],
    "status": "running",
    "updated_at": "2026-04-04T19:45:06.000000Z"
  },
  "artifact": {
    "codehash": "0x442fb089dcd7251563797d1a9528c790baa53b792306a35c6f1fef135793d337",
    "compiler_json": {
      "etherscan": {
        "skipped": true
      }
    },
    "implementation_address": null,
    "is_proxy": false,
    "runtime_bytecode": {
      "full": "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",
      "head": null,
      "length": 5502,
      "tail": null,
      "truncated": false
    },
    "verified_source": false
  },
  "capability_graph": {
    "address": "0x0e5e2b9341341ade98f510ad9a744e01f3b29f03",
    "block_number": null,
    "chain_id": 1,
    "codehash": "0x442fb089dcd7251563797d1a9528c790baa53b792306a35c6f1fef135793d337",
    "created_at": "2026-04-04T19:45:07.000000Z",
    "graph_hash": "0xacb8777cbabe43c7ce8ef1bc1851752e61f58a6814de3b048d7cb2a85dc15e27",
    "graph_json": {
      "edges": [
        {
          "from": "bb:0",
          "to": "bb:163",
          "type": "control_flow"
        },
        {
          "from": "bb:0",
          "to": "bb:11",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:11",
          "to": "bb:165",
          "type": "control_flow"
        },
        {
          "from": "bb:11",
          "to": "bb:31",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:31",
          "to": "bb:303",
          "type": "control_flow"
        },
        {
          "from": "bb:31",
          "to": "bb:42",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:42",
          "to": "bb:481",
          "type": "control_flow"
        },
        {
          "from": "bb:42",
          "to": "bb:53",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:53",
          "to": "bb:577",
          "type": "control_flow"
        },
        {
          "from": "bb:53",
          "to": "bb:64",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:64",
          "to": "bb:662",
          "type": "control_flow"
        },
        {
          "from": "bb:64",
          "to": "bb:75",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:75",
          "to": "bb:747",
          "type": "control_flow"
        },
        {
          "from": "bb:75",
          "to": "bb:86",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:86",
          "to": "bb:832",
          "type": "control_flow"
        },
        {
          "from": "bb:86",
          "to": "bb:97",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:97",
          "to": "bb:928",
          "type": "control_flow"
        },
        {
          "from": "bb:97",
          "to": "bb:108",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:108",
          "to": "bb:1021",
          "type": "control_flow"
        },
        {
          "from": "bb:108",
          "to": "bb:119",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:119",
          "to": "bb:1117",
          "type": "control_flow"
        },
        {
          "from": "bb:119",
          "to": "bb:130",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:130",
          "to": "bb:1202",
          "type": "control_flow"
        },
        {
          "from": "bb:130",
          "to": "bb:141",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:141",
          "to": "bb:1287",
          "type": "control_flow"
        },
        {
          "from": "bb:141",
          "to": "bb:152",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:152",
          "to": "bb:1380",
          "type": "control_flow"
        },
        {
          "from": "bb:152",
          "to": "bb:163",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:165",
          "to": "bb:214",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:214",
          "to": "bb:2706",
          "type": "control_flow"
        },
        {
          "from": "bb:214",
          "to": "bb:276",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:276",
          "to": "bb:2663",
          "type": "control_flow"
        },
        {
          "from": "bb:276",
          "to": "bb:284",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:284",
          "to": "bb:2706",
          "type": "control_flow"
        },
        {
          "from": "bb:303",
          "to": "bb:395",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:395",
          "to": "bb:470",
          "type": "control_flow_fallthrough"
        },
        {
          "from": "bb:470",
          "to": "bb:1902",
          "type": "control_flow"
        },
        {
          "from": "bb:481",
          "to": "bb:395",
          "type": "control_flow"
        },
        {
          "from": "bb:577",
          "to": "bb:395",
          "type": "control_flow"
        },
        {
          "from": "bb:662",
          "to": "bb:395",
          "type": "control_flow"
        },
        {
          "from": "bb:747",
          "to": "bb:395",
          "type": "control_flow"
        },
        {
          "from": "bb:832",
          "to": "bb:395",
          "type": "control_flow"
        },
        {
          "from": "bb:928",
          "to": "bb:395",
          "type": "control_flow"
        },
        {
          "from": "bb:1021",
          "to": "bb:395",
          "type": "control_flow"
        },

exec
/bin/bash -lc "rg -n 'detector|evidence|slot|callsite|summary|finding|proxy|event' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
 succeeded in 0ms:
2690:      "callsites": [
3298:            "slots": [
3302:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3322:            "slots": [
3326:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3346:            "slots": [
3350:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3370:            "slots": [
3374:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3394:            "slots": [
3398:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3418:            "slots": [
3422:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3442:            "slots": [
3446:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3466:            "slots": [
3470:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3490:            "slots": [
3494:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3514:            "slots": [
3518:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3538:            "slots": [
3542:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3562:            "slots": [
3566:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3586:            "slots": [
3590:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3619:        "upgrade_slot_write_suspected": false
3624:        "slots": [
3628:            "slot": "0x0000000000000000000000000000000000000000000000000000000000000100"
3662:    "is_proxy": false,
4889:          "type": "callsite"
4895:          "type": "callsite"
4901:          "type": "callsite"
4907:          "type": "callsite"
4998:  "detector_findings": [
5001:      "evidence_json": {
5054:      "evidence_json": {
5099:  "heuristics_summary": {

exec
/bin/bash -lc "sed -n '4840,5135p' BYTECODE_BUNDLE.json" in /tmp/codex-i34svh9b
 succeeded in 0ms:
          "start_pc": 2534,
          "type": "basic_block"
        },
        {
          "end_pc": 2662,
          "hash": "0x70a700e6a5f2f6c4f36c384f5cc3e99c2870e93114fa3036f7c6914a31965af3",
          "id": "bb:2643",
          "start_pc": 2643,
          "type": "basic_block"
        },
        {
          "end_pc": 2676,
          "hash": "0x6b0058e448568a07ec3f347c041a05e83895205831b90ed6677ced561d26bb5e",
          "id": "bb:2663",
          "start_pc": 2663,
          "type": "basic_block"
        },
        {
          "end_pc": 2696,
          "hash": "0x7e9b66bb3db47bd594ebeca7e194bc84c79cd5441d4014348c43d4375fbf6d45",
          "id": "bb:2677",
          "start_pc": 2677,
          "type": "basic_block"
        },
        {
          "end_pc": 2705,
          "hash": "0x12e16cb397a1bb294267b44bc99abfb9af47494d6aa6ae0d477895930926cb32",
          "id": "bb:2697",
          "start_pc": 2697,
          "type": "basic_block"
        },
        {
          "end_pc": 2717,
          "hash": "0x951b2d660f54c562ce551d02c1a25e54c81604b3ba3e9a712aeffa54404d889f",
          "id": "bb:2706",
          "start_pc": 2706,
          "type": "basic_block"
        },
        {
          "end_pc": 2727,
          "hash": "0xfc6c0f0bbbaa575011f3c62665e44c316159a7ada8db11298aaf6fd254586b40",
          "id": "bb:2718",
          "start_pc": 2718,
          "type": "basic_block"
        },
        {
          "id": "call:440",
          "opcode": "CALL",
          "pc": 440,
          "type": "callsite"
        },
        {
          "id": "call:1530",
          "opcode": "CALL",
          "pc": 1530,
          "type": "callsite"
        },
        {
          "id": "call:2504",
          "opcode": "CALL",
          "pc": 2504,
          "type": "callsite"
        },
        {
          "id": "call:2615",
          "opcode": "CALL",
          "pc": 2615,
          "type": "callsite"
        },
        {
          "id": "sink:call",
          "type": "sink"
        },
        {
          "entry_pc": null,
          "id": "fn:0x01984892",
          "selector": "0x01984892",
          "type": "function"
        },
        {
          "entry_pc": 557555384,
          "id": "fn:0x092b25e9",
          "selector": "0x092b25e9",
          "type": "function"
        },
        {
          "entry_pc": 1360731641,
          "id": "fn:0x213b9eb8",
          "selector": "0x213b9eb8",
          "type": "function"
        },
        {
          "entry_pc": 2135186468,
          "id": "fn:0x511b1df9",
          "selector": "0x511b1df9",
          "type": "function"
        },
        {
          "entry_pc": 2929303246,
          "id": "fn:0x7f445c24",
          "selector": "0x7f445c24",
          "type": "function"
        },
        {
          "entry_pc": 3044360261,
          "id": "fn:0xae999ece",
          "selector": "0xae999ece",
          "type": "function"
        },
        {
          "entry_pc": 3296657447,
          "id": "fn:0xb5754045",
          "selector": "0xb5754045",
          "type": "function"
        },
        {
          "entry_pc": 3438605331,
          "id": "fn:0xc47f0027",
          "selector": "0xc47f0027",
          "type": "function"
        },
        {
          "entry_pc": 3713312303,
          "id": "fn:0xccf4f413",
          "selector": "0xccf4f413",
          "type": "function"
        },
        {
          "entry_pc": 3746935834,
          "id": "fn:0xdd54a62f",
          "selector": "0xdd54a62f",
          "type": "function"
        },
        {
          "entry_pc": 3843739158,
          "id": "fn:0xdf55b41a",
          "selector": "0xdf55b41a",
          "type": "function"
        },
        {
          "entry_pc": 4251931696,
          "id": "fn:0xe51ace16",
          "selector": "0xe51ace16",
          "type": "function"
        },
        {
          "entry_pc": null,
          "id": "fn:0xfd6f5430",
          "selector": "0xfd6f5430",
          "type": "function"
        }
      ],
      "version": "capability_graph_v1"
    },
    "id": 1500,
    "updated_at": "2026-04-04T20:42:26.000000Z",
    "version": "capability_graph_v1"
  },
  "detector_findings": [
    {
      "confidence": 60,
      "evidence_json": {
        "call_count": 4,
        "examples": [
          {
            "opcode": "CALL",
            "pc": 1530,
            "returndata_checked": null,
            "target_expression_category": "computed",
            "value_expression_category": "computed"
          },
          {
            "opcode": "CALL",
            "pc": 2504,
            "returndata_checked": null,
            "target_expression_category": "computed",
            "value_expression_category": "constant_zero"
          },
          {
            "opcode": "CALL",
            "pc": 2615,
            "returndata_checked": null,
            "target_expression_category": "computed",
            "value_expression_category": "computed"
          }
        ],
        "guards_detected": [],
        "untrusted_call_count": 3
      },
      "normalized_json": {
        "sink": "CALL"
      },
      "severity": "high",
      "title": "Untrusted CALL target/value reachable",
      "validated": true,
      "validation_json": {
        "attempts": 1,
        "call_targets": [
          "0x0000000000000000000000000000000000000004",
          "0x0e5e2b9341341ade98f510ad9a744e01f3b29f03"
        ],
        "classification": "target_varies",
        "confirmed": true,
        "errors": 0,
        "matched_probe": null,
        "sink": "CALL",
        "status": "confirmed",
        "target_varies": true,
        "trace_id": "0x1d75af42b2cd4ccf6a86204d2258d3f365baa73f77ebcfc3a310aa3d9863e3d2",
        "trace_mode": "callTracer"
      }
    },
    {
      "confidence": 55,
      "evidence_json": {
        "eth_value_calls": 2,
        "examples": [
          {
            "opcode": "CALL",
            "pc": 1530,
            "returndata_checked": null,
            "target_expression_category": "computed",
            "value_expression_category": "computed"
          },
          {
            "opcode": "CALL",
            "pc": 2615,
            "returndata_checked": null,
            "target_expression_category": "computed",
            "value_expression_category": "computed"
          }
        ],
        "guards_detected": []
      },
      "normalized_json": {
        "sink": "CALL",
        "value": "nonzero"
      },
      "severity": "high",
      "title": "ETH value transfer possible",
      "validated": true,
      "validation_json": {
        "attempts": 1,
        "call_targets": [
          "0x0000000000000000000000000000000000000004",
          "0x0e5e2b9341341ade98f510ad9a744e01f3b29f03"
        ],
        "classification": "target_varies",
        "confirmed": true,
        "errors": 0,
        "matched_probe": null,
        "sink": "CALL",
        "status": "confirmed",
        "target_varies": true,
        "trace_id": "0x1d75af42b2cd4ccf6a86204d2258d3f365baa73f77ebcfc3a310aa3d9863e3d2",
        "trace_mode": "callTracer"
      }
    }
  ],
  "heuristics_summary": {
    "create2_count": 0,
    "delegatecall_count": 0,
    "flags": [],
    "selfdestruct_count": 0
  }
}
exec
/bin/bash -lc 'which evm && which cast && which python3 && which node' in /tmp/codex-i34svh9b
 exited 1 in 0ms:
exec
/bin/bash -lc 'which evm' in /tmp/codex-i34svh9b
 exited 1 in 0ms:
exec
/bin/bash -lc 'which cast' in /tmp/codex-i34svh9b
 succeeded in 0ms:
/home/noahkuhn/.foundry/bin/cast

exec
/bin/bash -lc 'which python3' in /tmp/codex-i34svh9b
 succeeded in 0ms:
/var/www/tripwire/.venv/bin/python3

exec
/bin/bash -lc 'which node' in /tmp/codex-i34svh9b
 succeeded in 0ms:
/home/noahkuhn/.nvm/versions/node/v23.3.0/bin/node

exec
/bin/bash -lc "cast --help | sed -n '1,200p'" in /tmp/codex-i34svh9b
 succeeded in 0ms:
A Swiss Army knife for interacting with Ethereum applications from the command line

Usage: cast [OPTIONS] <COMMAND>

Commands:
  4byte                  Get the function signatures for the given selector from
                         <https://openchain.xyz> [aliases: 4, 4b]
  4byte-calldata         Decode ABI-encoded calldata using <https://openchain.xyz> [aliases: 4c,
                         4bc]
  4byte-event            Get the event signature for a given topic 0 from <https://openchain.xyz>
                         [aliases: 4e, 4be, topic0-event, t0e]
  abi-encode             ABI encode the given function argument, excluding the selector [aliases:
                         ae]
  abi-encode-event       ABI encode an event and its arguments to generate topics and data [aliases:
                         aee]
  access-list            Create an access list for a transaction [aliases: ac, acl]
  address-zero           Prints the zero address [aliases: --address-zero, az]
  admin                  Fetch the EIP-1967 admin account [aliases: adm]
  age                    Get the timestamp of a block [aliases: a]
  artifact               Generate an artifact file, that can be used to deploy a contract locally
                         [aliases: ar]
  b2e-payload            Convert Beacon payload to execution payload [aliases: b2e]
  balance                Get the balance of an account in wei [aliases: b]
  base-fee               Get the basefee of a block [aliases: ba, fee, basefee]
  bind                   Generate a rust binding from a given ABI [aliases: bi]
  block                  Get information about a block [aliases: bl]
  block-number           Get the latest block number [aliases: bn]
  call                   Perform a call on an account without publishing a transaction [aliases: c]
  calldata               ABI-encode a function with arguments [aliases: cd]
  chain                  Get the symbolic name of the current chain
  chain-id               Get the Ethereum chain ID [aliases: ci, cid]
  client                 Get the current client version [aliases: cl]
  code                   Get the runtime bytecode of a contract [aliases: co]
  codehash               Get the codehash for an account
  codesize               Get the runtime bytecode size of a contract [aliases: cs]
  completions            Generate shell completions script [aliases: com]
  compute-address        Compute the contract address from a given nonce and deployer address
                         [aliases: ca]
  concat-hex             Concatenate hex strings [aliases: --concat-hex, ch]
  constructor-args       Display constructor arguments used for the contract initialization
                         [aliases: cra]
  create2                Generate a deterministic contract address using CREATE2 [aliases: c2]
  creation-code          Download a contract creation code from Etherscan and RPC [aliases: cc]
  da-estimate            Estimates the data availability size of a given opstack block
  decode-abi             Decode ABI-encoded input or output data [aliases: abi-decode, --abi-decode,
                         ad]
  decode-calldata        Decode ABI-encoded input data [aliases: calldata-decode, --calldata-decode,
                         cdd]
  decode-error           Decode custom error data [aliases: error-decode, --error-decode, erd]
  decode-event           Decode event data [aliases: event-decode, --event-decode, ed]
  decode-string          Decode ABI-encoded string [aliases: string-decode, --string-decode, sd]
  decode-transaction     Decodes a raw signed EIP 2718 typed transaction [aliases: dt, decode-tx]
  disassemble            Disassembles a hex-encoded bytecode into a human-readable representation
                         [aliases: da]
  erc20-token            ERC20 token operations [aliases: erc20]
  estimate               Estimate the gas cost of a transaction [aliases: e]
  find-block             Get the block number closest to the provided timestamp [aliases: f]
  format-bytes32-string  Formats a string into bytes32 encoding [aliases: --format-bytes32-string]
  format-units           Format a number from smallest unit to decimal with arbitrary decimals
                         [aliases: --format-units, fun]
  from-bin               Convert binary data into hex data [aliases: --from-bin, from-binx, fb]
  from-fixed-point       Convert a fixed point number into an integer [aliases: --from-fix, ff]
  from-rlp               Decodes RLP hex-encoded data [aliases: --from-rlp]
  from-utf8              Convert UTF8 text to hex [aliases: --from-ascii, --from-utf8, from-ascii,
                         fu, fa]
  from-wei               Convert wei into an ETH amount [aliases: --from-wei, fw]
  gas-price              Get the current gas price [aliases: g]
  hash-message           Hash a message according to EIP-191 [aliases: --hash-message, hm]
  hash-zero              Prints the zero hash [aliases: --hash-zero, hz]
  help                   Print this message or the help of the given subcommand(s)
  implementation         Fetch the EIP-1967 implementation for a contract Can read from the
                         implementation slot or the beacon slot [aliases: impl]
  index                  Compute the storage slot for an entry in a mapping [aliases: in]
  index-erc7201          Compute storage slots as specified by `ERC-7201: Namespaced Storage Layout`
                         [aliases: index7201, in7201]
  interface              Generate a Solidity interface from a given ABI [aliases: i]
  keccak                 Hash arbitrary data using Keccak-256 [aliases: k, keccak256]
  logs                   Get logs by signature or topic [aliases: l]
  lookup-address         Perform an ENS reverse lookup [aliases: la]
  max-int                Prints the maximum value of the given integer type [aliases: --max-int,
                         maxi]
  max-uint               Prints the maximum value of the given integer type [aliases: --max-uint,
                         maxu]
  min-int                Prints the minimum value of the given integer type [aliases: --min-int,
                         mini]
  mktx                   Build and sign a transaction [aliases: m]
  namehash               Calculate the ENS namehash of a name [aliases: na, nh]
  nonce                  Get the nonce for an account [aliases: n]
  pad                    Pads hex data to a specified length [aliases: pd]
  parse-bytes32-address  Parses a checksummed address from bytes32 encoding. [aliases:
                         --parse-bytes32-address]
  parse-bytes32-string   Parses a string from bytes32 encoding [aliases: --parse-bytes32-string]
  parse-units            Convert a number from decimal to smallest unit with arbitrary decimals
                         [aliases: --parse-units, pun]
  pretty-calldata        Pretty print calldata [aliases: pc]
  proof                  Generate a storage proof for a given storage slot [aliases: pr]
  publish                Publish a raw transaction to the network [aliases: p]
  receipt                Get the transaction receipt for a transaction [aliases: re]
  recover-authority      Recovery an EIP-7702 authority from a Authorization JSON string [aliases:
                         decode-auth]
  resolve-name           Perform an ENS lookup [aliases: rn]
  rpc                    Perform a raw JSON-RPC request [aliases: rp]
  run                    Runs a published transaction in a local environment and prints the trace
                         [aliases: r]
  selectors              Extracts function selectors and arguments from bytecode [aliases: sel]
  send                   Sign and publish a transaction [aliases: s]
  shl                    Perform a left shifting operation
  shr                    Perform a right shifting operation
  sig                    Get the selector for a function [aliases: si]
  sig-event              Generate event signatures from event string [aliases: se]
  source                 Get the source code of a contract from a block explorer [aliases: et, src]
  storage                Get the raw value of a contract's storage slot [aliases: st]
  storage-root           Get the storage root for an account [aliases: sr]
  to-ascii               Convert hex data to an ASCII string [aliases: --to-ascii, tas, 2as]
  to-base                Converts a number of one base to another [aliases: --to-base, --to-radix,
                         to-radix, tr, 2r]
  to-bytes32             Right-pads hex data to 32 bytes [aliases: --to-bytes32, tb, 2b]
  to-check-sum-address   Convert an address to a checksummed format (EIP-55) [aliases:
                         --to-checksum-address, --to-checksum, to-checksum, ta, 2a]
  to-dec                 Converts a number of one base to decimal [aliases: --to-dec, td, 2d]
  to-fixed-point         Convert an integer into a fixed point number [aliases: --to-fix, tf, 2f]
  to-hex                 Converts a number of one base to another [aliases: --to-hex, th, 2h]
  to-hexdata             Normalize the input to lowercase, 0x-prefixed hex [aliases: --to-hexdata,
                         thd, 2hd]
  to-int256              Convert a number to a hex-encoded int256 [aliases: --to-int256, ti, 2i]
  to-rlp                 RLP encodes hex data, or an array of hex data [aliases: --to-rlp]
  to-uint256             Convert a number to a hex-encoded uint256 [aliases: --to-uint256, tu, 2u]
  to-unit                Convert an ETH amount into another unit (ether, gwei or wei) [aliases:
                         --to-unit, tun, 2un]
  to-utf8                Convert hex data to a utf-8 string [aliases: --to-utf8, tu8, 2u8]
  to-wei                 Convert an ETH amount to wei [aliases: --to-wei, tw, 2w]
  trace                  CLI arguments for `cast trace`
  tx                     Get information about a transaction [aliases: t]
  tx-pool                Inspect the TxPool of a node [aliases: tp]
  upload-signature       Upload the given signatures to <https://openchain.xyz> [aliases: ups]
  wallet                 Wallet management utilities [aliases: w]

Options:
  -h, --help
          Print help (see a summary with '-h')

  -j, --threads <THREADS>
          Number of threads to use. Specifying 0 defaults to the number of logical cores
          
          [aliases: --jobs]

  -V, --version
          Print version

Display options:
      --color <COLOR>
          The color of the log messages

          Possible values:
          - auto:   Intelligently guess whether to use color output (default)
          - always: Force color output
          - never:  Force disable color output

      --json
          Format log messages as JSON

      --md
          Format log messages as Markdown

  -q, --quiet
          Do not print log messages

  -v, --verbosity...
          Verbosity level of the log messages.
          
          Pass multiple times to increase the verbosity (e.g. -v, -vv, -vvv).
          
          Depending on the context the verbosity levels have different meanings.
          
          For example, the verbosity levels of the EVM are:
          - 2 (-vv): Print logs for all tests.
          - 3 (-vvv): Print execution traces for failing tests.
          - 4 (-vvvv): Print execution traces for all tests, and setup traces for failing tests.
          - 5 (-vvvvv): Print execution and setup traces for all tests, including storage changes
          and
            backtraces with line numbers.

Find more information in the book: https://getfoundry.sh/cast/overview

exec
/bin/bash -lc "python3 - <<'PY'
import json
with open('BYTECODE_BUNDLE.json') as f:
    data=json.load(f)
print(data['artifact']['runtime_bytecode']['full'])
PY" in /tmp/codex-i34svh9b
 succeeded in 0ms:
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

exec
/bin/bash -lc "python3 - <<'PY' > /tmp/runtime.hex
import json
with open('BYTECODE_BUNDLE.json') as f:
    data=json.load(f)
print(data['artifact']['runtime_bytecode']['full'])
PY
cast disassemble "'$(cat /tmp/runtime.hex) | sed -n '"'1,280p'" in /tmp/codex-i34svh9b
 succeeded in 0ms:
/bin/bash: line 1: /tmp/runtime.hex: Read-only file system
cat: /tmp/runtime.hex: No such file or directory


exec
/bin/bash -lc 'cast disassemble "$(python3 - <<'"'PY'
import json
with open('BYTECODE_BUNDLE.json') as f:
    data=json.load(f)
print(data['artifact']['runtime_bytecode']['full'])
PY
)\" | sed -n '1,320p'" in /tmp/codex-i34svh9b
 succeeded in 0ms:
00000000: PUSH1 0x60
00000002: PUSH1 0x40
00000004: MSTORE
00000005: CALLDATASIZE
00000006: ISZERO
00000007: PUSH2 0x00a3
0000000a: JUMPI
0000000b: PUSH1 0xe0
0000000d: PUSH1 0x02
0000000f: EXP
00000010: PUSH1 0x00
00000012: CALLDATALOAD
00000013: DIV
00000014: PUSH4 0x01984892
00000019: DUP2
0000001a: EQ
0000001b: PUSH2 0x00a5
0000001e: JUMPI
0000001f: DUP1
00000020: PUSH4 0x092b25e9
00000025: EQ
00000026: PUSH2 0x012f
00000029: JUMPI
0000002a: DUP1
0000002b: PUSH4 0x213b9eb8
00000030: EQ
00000031: PUSH2 0x01e1
00000034: JUMPI
00000035: DUP1
00000036: PUSH4 0x511b1df9
0000003b: EQ
0000003c: PUSH2 0x0241
0000003f: JUMPI
00000040: DUP1
00000041: PUSH4 0x7f445c24
00000046: EQ
00000047: PUSH2 0x0296
0000004a: JUMPI
0000004b: DUP1
0000004c: PUSH4 0xae999ece
00000051: EQ
00000052: PUSH2 0x02eb
00000055: JUMPI
00000056: DUP1
00000057: PUSH4 0xb5754045
0000005c: EQ
0000005d: PUSH2 0x0340
00000060: JUMPI
00000061: DUP1
00000062: PUSH4 0xc47f0027
00000067: EQ
00000068: PUSH2 0x03a0
0000006b: JUMPI
0000006c: DUP1
0000006d: PUSH4 0xccf4f413
00000072: EQ
00000073: PUSH2 0x03fd
00000076: JUMPI
00000077: DUP1
00000078: PUSH4 0xdd54a62f
0000007d: EQ
0000007e: PUSH2 0x045d
00000081: JUMPI
00000082: DUP1
00000083: PUSH4 0xdf55b41a
00000088: EQ
00000089: PUSH2 0x04b2
0000008c: JUMPI
0000008d: DUP1
0000008e: PUSH4 0xe51ace16
00000093: EQ
00000094: PUSH2 0x0507
00000097: JUMPI
00000098: DUP1
00000099: PUSH4 0xfd6f5430
0000009e: EQ
0000009f: PUSH2 0x0564
000000a2: JUMPI
000000a3: JUMPDEST
000000a4: STOP
000000a5: JUMPDEST
000000a6: PUSH2 0x05c4
000000a9: PUSH1 0x04
000000ab: CALLDATALOAD
000000ac: PUSH1 0x40
000000ae: DUP1
000000af: MLOAD
000000b0: PUSH1 0x20
000000b2: DUP2
000000b3: ADD
000000b4: SWAP1
000000b5: SWAP2
000000b6: MSTORE
000000b7: PUSH1 0x00
000000b9: DUP2
000000ba: MSTORE
000000bb: PUSH1 0xff
000000bd: PUSH1 0x02
000000bf: EXP
000000c0: PUSH1 0x01
000000c2: PUSH1 0xa0
000000c4: PUSH1 0x02
000000c6: EXP
000000c7: SUB
000000c8: DUP4
000000c9: AND
000000ca: PUSH1 0xa0
000000cc: PUSH1 0x02
000000ce: EXP
000000cf: DUP2
000000d0: LT
000000d1: ISZERO
000000d2: PUSH2 0x0002
000000d5: JUMPI
000000d6: ADD
000000d7: DUP1
000000d8: SLOAD
000000d9: PUSH1 0x40
000000db: DUP1
000000dc: MLOAD
000000dd: PUSH1 0x20
000000df: PUSH1 0x02
000000e1: PUSH1 0x01
000000e3: DUP6
000000e4: AND
000000e5: ISZERO
000000e6: PUSH2 0x0100
000000e9: MUL
000000ea: PUSH1 0x00
000000ec: NOT
000000ed: ADD
000000ee: SWAP1
000000ef: SWAP5
000000f0: AND
000000f1: SWAP4
000000f2: SWAP1
000000f3: SWAP4
000000f4: DIV
000000f5: PUSH1 0x1f
000000f7: DUP2
000000f8: ADD
000000f9: DUP5
000000fa: SWAP1
000000fb: DIV
000000fc: DUP5
000000fd: MUL
000000fe: DUP3
000000ff: ADD
00000100: DUP5
00000101: ADD
00000102: SWAP1
00000103: SWAP3
00000104: MSTORE
00000105: DUP2
00000106: DUP2
00000107: MSTORE
00000108: SWAP3
00000109: SWAP2
0000010a: DUP4
0000010b: ADD
0000010c: DUP3
0000010d: DUP3
0000010e: DUP1
0000010f: ISZERO
00000110: PUSH2 0x0a92
00000113: JUMPI
00000114: DUP1
00000115: PUSH1 0x1f
00000117: LT
00000118: PUSH2 0x0a67
0000011b: JUMPI
0000011c: PUSH2 0x0100
0000011f: DUP1
00000120: DUP4
00000121: SLOAD
00000122: DIV
00000123: MUL
00000124: DUP4
00000125: MSTORE
00000126: SWAP2
00000127: PUSH1 0x20
00000129: ADD
0000012a: SWAP2
0000012b: PUSH2 0x0a92
0000012e: JUMP
0000012f: JUMPDEST
00000130: PUSH2 0x00a3
00000133: PUSH1 0x04
00000135: DUP1
00000136: DUP1
00000137: CALLDATALOAD
00000138: SWAP1
00000139: PUSH1 0x20
0000013b: ADD
0000013c: SWAP1
0000013d: DUP3
0000013e: ADD
0000013f: DUP1
00000140: CALLDATALOAD
00000141: SWAP1
00000142: PUSH1 0x20
00000144: ADD
00000145: SWAP2
00000146: SWAP2
00000147: SWAP1
00000148: DUP1
00000149: DUP1
0000014a: PUSH1 0x1f
0000014c: ADD
0000014d: PUSH1 0x20
0000014f: DUP1
00000150: SWAP2
00000151: DIV
00000152: MUL
00000153: PUSH1 0x20
00000155: ADD
00000156: PUSH1 0x40
00000158: MLOAD
00000159: SWAP1
0000015a: DUP2
0000015b: ADD
0000015c: PUSH1 0x40
0000015e: MSTORE
0000015f: DUP1
00000160: SWAP4
00000161: SWAP3
00000162: SWAP2
00000163: SWAP1
00000164: DUP2
00000165: DUP2
00000166: MSTORE
00000167: PUSH1 0x20
00000169: ADD
0000016a: DUP4
0000016b: DUP4
0000016c: DUP1
0000016d: DUP3
0000016e: DUP5
0000016f: CALLDATACOPY
00000170: POP
00000171: SWAP5
00000172: SWAP7
00000173: POP
00000174: POP
00000175: SWAP4
00000176: CALLDATALOAD
00000177: SWAP4
00000178: POP
00000179: POP
0000017a: POP
0000017b: POP
0000017c: DUP2
0000017d: CALLER
0000017e: PUSH1 0x01
00000180: PUSH1 0xa0
00000182: PUSH1 0x02
00000184: EXP
00000185: SUB
00000186: AND
00000187: PUSH2 0x06c9
0000018a: DUP3
0000018b: JUMPDEST
0000018c: PUSH1 0x00
0000018e: PUSH1 0x00
00000190: PUSH1 0x00
00000192: POP
00000193: PUSH1 0x08
00000195: DUP4
00000196: PUSH1 0x40
00000198: MLOAD
00000199: DUP1
0000019a: DUP3
0000019b: DUP1
0000019c: MLOAD
0000019d: SWAP1
0000019e: PUSH1 0x20
000001a0: ADD
000001a1: SWAP1
000001a2: DUP1
000001a3: DUP4
000001a4: DUP4
000001a5: DUP3
000001a6: SWAP1
000001a7: PUSH1 0x00
000001a9: PUSH1 0x04
000001ab: PUSH1 0x20
000001ad: DUP5
000001ae: PUSH1 0x1f
000001b0: ADD
000001b1: DIV
000001b2: PUSH1 0x03
000001b4: MUL
000001b5: PUSH1 0x0f
000001b7: ADD
000001b8: CALL
000001b9: POP
000001ba: SWAP1
000001bb: SWAP2
000001bc: ADD
000001bd: DUP3
000001be: SWAP1
000001bf: SUB
000001c0: SWAP1
000001c1: SWAP2
000001c2: KECCAK256
000001c3: SWAP3
000001c4: SWAP1
000001c5: SWAP3
000001c6: DIV
000001c7: SWAP2
000001c8: POP
000001c9: POP
000001ca: PUSH1 0xfd
000001cc: PUSH1 0x02
000001ce: EXP
000001cf: DUP2
000001d0: LT
000001d1: ISZERO
000001d2: PUSH2 0x0002
000001d5: JUMPI

exec
/bin/bash -lc 'cast disassemble "$(python3 - <<'"'PY'
import json
with open('BYTECODE_BUNDLE.json') as f:
    data=json.load(f)
print(data['artifact']['runtime_bytecode']['full'])
PY
)\" | sed -n '321,640p'" in /tmp/codex-i34svh9b
 succeeded in 0ms:
000001d6: PUSH1 0x04
000001d8: MUL
000001d9: SWAP1
000001da: POP
000001db: SWAP1
000001dc: POP
000001dd: PUSH2 0x076e
000001e0: JUMP
000001e1: JUMPDEST
000001e2: PUSH2 0x00a3
000001e5: PUSH1 0x04
000001e7: DUP1
000001e8: DUP1
000001e9: CALLDATALOAD
000001ea: SWAP1
000001eb: PUSH1 0x20
000001ed: ADD
000001ee: SWAP1
000001ef: DUP3
000001f0: ADD
000001f1: DUP1
000001f2: CALLDATALOAD
000001f3: SWAP1
000001f4: PUSH1 0x20
000001f6: ADD
000001f7: SWAP2
000001f8: SWAP2
000001f9: SWAP1
000001fa: DUP1
000001fb: DUP1
000001fc: PUSH1 0x1f
000001fe: ADD
000001ff: PUSH1 0x20
00000201: DUP1
00000202: SWAP2
00000203: DIV
00000204: MUL
00000205: PUSH1 0x20
00000207: ADD
00000208: PUSH1 0x40
0000020a: MLOAD
0000020b: SWAP1
0000020c: DUP2
0000020d: ADD
0000020e: PUSH1 0x40
00000210: MSTORE
00000211: DUP1
00000212: SWAP4
00000213: SWAP3
00000214: SWAP2
00000215: SWAP1
00000216: DUP2
00000217: DUP2
00000218: MSTORE
00000219: PUSH1 0x20
0000021b: ADD
0000021c: DUP4
0000021d: DUP4
0000021e: DUP1
0000021f: DUP3
00000220: DUP5
00000221: CALLDATACOPY
00000222: POP
00000223: SWAP5
00000224: SWAP7
00000225: POP
00000226: POP
00000227: SWAP4
00000228: CALLDATALOAD
00000229: SWAP4
0000022a: POP
0000022b: POP
0000022c: POP
0000022d: POP
0000022e: DUP2
0000022f: CALLER
00000230: PUSH1 0x01
00000232: PUSH1 0xa0
00000234: PUSH1 0x02
00000236: EXP
00000237: SUB
00000238: AND
00000239: PUSH2 0x06e6
0000023c: DUP3
0000023d: PUSH2 0x018b
00000240: JUMP
00000241: JUMPDEST
00000242: PUSH2 0x0632
00000245: PUSH1 0x04
00000247: DUP1
00000248: DUP1
00000249: CALLDATALOAD
0000024a: SWAP1
0000024b: PUSH1 0x20
0000024d: ADD
0000024e: SWAP1
0000024f: DUP3
00000250: ADD
00000251: DUP1
00000252: CALLDATALOAD
00000253: SWAP1
00000254: PUSH1 0x20
00000256: ADD
00000257: SWAP2
00000258: SWAP2
00000259: SWAP1
0000025a: DUP1
0000025b: DUP1
0000025c: PUSH1 0x1f
0000025e: ADD
0000025f: PUSH1 0x20
00000261: DUP1
00000262: SWAP2
00000263: DIV
00000264: MUL
00000265: PUSH1 0x20
00000267: ADD
00000268: PUSH1 0x40
0000026a: MLOAD
0000026b: SWAP1
0000026c: DUP2
0000026d: ADD
0000026e: PUSH1 0x40
00000270: MSTORE
00000271: DUP1
00000272: SWAP4
00000273: SWAP3
00000274: SWAP2
00000275: SWAP1
00000276: DUP2
00000277: DUP2
00000278: MSTORE
00000279: PUSH1 0x20
0000027b: ADD
0000027c: DUP4
0000027d: DUP4
0000027e: DUP1
0000027f: DUP3
00000280: DUP5
00000281: CALLDATACOPY
00000282: POP
00000283: SWAP5
00000284: SWAP7
00000285: POP
00000286: POP
00000287: POP
00000288: POP
00000289: POP
0000028a: POP
0000028b: POP
0000028c: PUSH1 0x00
0000028e: PUSH2 0x0761
00000291: DUP3
00000292: PUSH2 0x018b
00000295: JUMP
00000296: JUMPDEST
00000297: PUSH2 0x0632
0000029a: PUSH1 0x04
0000029c: DUP1
0000029d: DUP1
0000029e: CALLDATALOAD
0000029f: SWAP1
000002a0: PUSH1 0x20
000002a2: ADD
000002a3: SWAP1
000002a4: DUP3
000002a5: ADD
000002a6: DUP1
000002a7: CALLDATALOAD
000002a8: SWAP1
000002a9: PUSH1 0x20
000002ab: ADD
000002ac: SWAP2
000002ad: SWAP2
000002ae: SWAP1
000002af: DUP1
000002b0: DUP1
000002b1: PUSH1 0x1f
000002b3: ADD
000002b4: PUSH1 0x20
000002b6: DUP1
000002b7: SWAP2
000002b8: DIV
000002b9: MUL
000002ba: PUSH1 0x20
000002bc: ADD
000002bd: PUSH1 0x40
000002bf: MLOAD
000002c0: SWAP1
000002c1: DUP2
000002c2: ADD
000002c3: PUSH1 0x40
000002c5: MSTORE
000002c6: DUP1
000002c7: SWAP4
000002c8: SWAP3
000002c9: SWAP2
000002ca: SWAP1
000002cb: DUP2
000002cc: DUP2
000002cd: MSTORE
000002ce: PUSH1 0x20
000002d0: ADD
000002d1: DUP4
000002d2: DUP4
000002d3: DUP1
000002d4: DUP3
000002d5: DUP5
000002d6: CALLDATACOPY
000002d7: POP
000002d8: SWAP5
000002d9: SWAP7
000002da: POP
000002db: POP
000002dc: POP
000002dd: POP
000002de: POP
000002df: POP
000002e0: POP
000002e1: PUSH1 0x00
000002e3: PUSH2 0x0773
000002e6: DUP3
000002e7: PUSH2 0x018b
000002ea: JUMP
000002eb: JUMPDEST
000002ec: PUSH2 0x00a3
000002ef: PUSH1 0x04
000002f1: DUP1
000002f2: DUP1
000002f3: CALLDATALOAD
000002f4: SWAP1
000002f5: PUSH1 0x20
000002f7: ADD
000002f8: SWAP1
000002f9: DUP3
000002fa: ADD
000002fb: DUP1
000002fc: CALLDATALOAD
000002fd: SWAP1
000002fe: PUSH1 0x20
00000300: ADD
00000301: SWAP2
00000302: SWAP2
00000303: SWAP1
00000304: DUP1
00000305: DUP1
00000306: PUSH1 0x1f
00000308: ADD
00000309: PUSH1 0x20
0000030b: DUP1
0000030c: SWAP2
0000030d: DIV
0000030e: MUL
0000030f: PUSH1 0x20
00000311: ADD
00000312: PUSH1 0x40
00000314: MLOAD
00000315: SWAP1
00000316: DUP2
00000317: ADD
00000318: PUSH1 0x40
0000031a: MSTORE
0000031b: DUP1
0000031c: SWAP4
0000031d: SWAP3
0000031e: SWAP2
0000031f: SWAP1
00000320: DUP2
00000321: DUP2
00000322: MSTORE
00000323: PUSH1 0x20
00000325: ADD
00000326: DUP4
00000327: DUP4
00000328: DUP1
00000329: DUP3
0000032a: DUP5
0000032b: CALLDATACOPY
0000032c: POP
0000032d: SWAP5
0000032e: SWAP7
0000032f: POP
00000330: POP
00000331: POP
00000332: POP
00000333: POP
00000334: POP
00000335: POP
00000336: PUSH1 0x00
00000338: PUSH2 0x091e
0000033b: DUP3
0000033c: PUSH2 0x018b
0000033f: JUMP
00000340: JUMPDEST
00000341: PUSH2 0x00a3
00000344: PUSH1 0x04
00000346: DUP1
00000347: DUP1
00000348: CALLDATALOAD
00000349: SWAP1
0000034a: PUSH1 0x20
0000034c: ADD
0000034d: SWAP1
0000034e: DUP3
0000034f: ADD
00000350: DUP1
00000351: CALLDATALOAD
00000352: SWAP1
00000353: PUSH1 0x20
00000355: ADD
00000356: SWAP2
00000357: SWAP2
00000358: SWAP1
00000359: DUP1
0000035a: DUP1
0000035b: PUSH1 0x1f
0000035d: ADD
0000035e: PUSH1 0x20
00000360: DUP1
00000361: SWAP2

exec
/bin/bash -lc 'cast disassemble "$(python3 - <<'"'PY'
import json
with open('BYTECODE_BUNDLE.json') as f:
    data=json.load(f)
print(data['artifact']['runtime_bytecode']['full'])
PY
)\" | sed -n '641,960p'" in /tmp/codex-i34svh9b
 succeeded in 0ms:
00000362: DIV
00000363: MUL
00000364: PUSH1 0x20
00000366: ADD
00000367: PUSH1 0x40
00000369: MLOAD
0000036a: SWAP1
0000036b: DUP2
0000036c: ADD
0000036d: PUSH1 0x40
0000036f: MSTORE
00000370: DUP1
00000371: SWAP4
00000372: SWAP3
00000373: SWAP2
00000374: SWAP1
00000375: DUP2
00000376: DUP2
00000377: MSTORE
00000378: PUSH1 0x20
0000037a: ADD
0000037b: DUP4
0000037c: DUP4
0000037d: DUP1
0000037e: DUP3
0000037f: DUP5
00000380: CALLDATACOPY
00000381: POP
00000382: SWAP5
00000383: SWAP7
00000384: POP
00000385: POP
00000386: SWAP4
00000387: CALLDATALOAD
00000388: SWAP4
00000389: POP
0000038a: POP
0000038b: POP
0000038c: POP
0000038d: DUP2
0000038e: CALLER
0000038f: PUSH1 0x01
00000391: PUSH1 0xa0
00000393: PUSH1 0x02
00000395: EXP
00000396: SUB
00000397: AND
00000398: PUSH2 0x098a
0000039b: DUP3
0000039c: PUSH2 0x018b
0000039f: JUMP
000003a0: JUMPDEST
000003a1: PUSH2 0x00a3
000003a4: PUSH1 0x04
000003a6: DUP1
000003a7: DUP1
000003a8: CALLDATALOAD
000003a9: SWAP1
000003aa: PUSH1 0x20
000003ac: ADD
000003ad: SWAP1
000003ae: DUP3
000003af: ADD
000003b0: DUP1
000003b1: CALLDATALOAD
000003b2: SWAP1
000003b3: PUSH1 0x20
000003b5: ADD
000003b6: SWAP2
000003b7: SWAP2
000003b8: SWAP1
000003b9: DUP1
000003ba: DUP1
000003bb: PUSH1 0x1f
000003bd: ADD
000003be: PUSH1 0x20
000003c0: DUP1
000003c1: SWAP2
000003c2: DIV
000003c3: MUL
000003c4: PUSH1 0x20
000003c6: ADD
000003c7: PUSH1 0x40
000003c9: MLOAD
000003ca: SWAP1
000003cb: DUP2
000003cc: ADD
000003cd: PUSH1 0x40
000003cf: MSTORE
000003d0: DUP1
000003d1: SWAP4
000003d2: SWAP3
000003d3: SWAP2
000003d4: SWAP1
000003d5: DUP2
000003d6: DUP2
000003d7: MSTORE
000003d8: PUSH1 0x20
000003da: ADD
000003db: DUP4
000003dc: DUP4
000003dd: DUP1
000003de: DUP3
000003df: DUP5
000003e0: CALLDATACOPY
000003e1: POP
000003e2: SWAP5
000003e3: SWAP7
000003e4: POP
000003e5: POP
000003e6: POP
000003e7: POP
000003e8: POP
000003e9: POP
000003ea: POP
000003eb: CALLER
000003ec: PUSH1 0x01
000003ee: PUSH1 0xa0
000003f0: PUSH1 0x02
000003f2: EXP
000003f3: SUB
000003f4: AND
000003f5: PUSH2 0x0820
000003f8: DUP3
000003f9: PUSH2 0x018b
000003fc: JUMP
000003fd: JUMPDEST
000003fe: PUSH2 0x00a3
00000401: PUSH1 0x04
00000403: DUP1
00000404: DUP1
00000405: CALLDATALOAD
00000406: SWAP1
00000407: PUSH1 0x20
00000409: ADD
0000040a: SWAP1
0000040b: DUP3
0000040c: ADD
0000040d: DUP1
0000040e: CALLDATALOAD
0000040f: SWAP1
00000410: PUSH1 0x20
00000412: ADD
00000413: SWAP2
00000414: SWAP2
00000415: SWAP1
00000416: DUP1
00000417: DUP1
00000418: PUSH1 0x1f
0000041a: ADD
0000041b: PUSH1 0x20
0000041d: DUP1
0000041e: SWAP2
0000041f: DIV
00000420: MUL
00000421: PUSH1 0x20
00000423: ADD
00000424: PUSH1 0x40
00000426: MLOAD
00000427: SWAP1
00000428: DUP2
00000429: ADD
0000042a: PUSH1 0x40
0000042c: MSTORE
0000042d: DUP1
0000042e: SWAP4
0000042f: SWAP3
00000430: SWAP2
00000431: SWAP1
00000432: DUP2
00000433: DUP2
00000434: MSTORE
00000435: PUSH1 0x20
00000437: ADD
00000438: DUP4
00000439: DUP4
0000043a: DUP1
0000043b: DUP3
0000043c: DUP5
0000043d: CALLDATACOPY
0000043e: POP
0000043f: SWAP5
00000440: SWAP7
00000441: POP
00000442: POP
00000443: SWAP4
00000444: CALLDATALOAD
00000445: SWAP4
00000446: POP
00000447: POP
00000448: POP
00000449: POP
0000044a: DUP2
0000044b: CALLER
0000044c: PUSH1 0x01
0000044e: PUSH1 0xa0
00000450: PUSH1 0x02
00000452: EXP
00000453: SUB
00000454: AND
00000455: PUSH2 0x0792
00000458: DUP3
00000459: PUSH2 0x018b
0000045c: JUMP
0000045d: JUMPDEST
0000045e: PUSH2 0x064f
00000461: PUSH1 0x04
00000463: DUP1
00000464: DUP1
00000465: CALLDATALOAD
00000466: SWAP1
00000467: PUSH1 0x20
00000469: ADD
0000046a: SWAP1
0000046b: DUP3
0000046c: ADD
0000046d: DUP1
0000046e: CALLDATALOAD
0000046f: SWAP1
00000470: PUSH1 0x20
00000472: ADD
00000473: SWAP2
00000474: SWAP2
00000475: SWAP1
00000476: DUP1
00000477: DUP1
00000478: PUSH1 0x1f
0000047a: ADD
0000047b: PUSH1 0x20
0000047d: DUP1
0000047e: SWAP2
0000047f: DIV
00000480: MUL
00000481: PUSH1 0x20
00000483: ADD
00000484: PUSH1 0x40
00000486: MLOAD
00000487: SWAP1
00000488: DUP2
00000489: ADD
0000048a: PUSH1 0x40
0000048c: MSTORE
0000048d: DUP1
0000048e: SWAP4
0000048f: SWAP3
00000490: SWAP2
00000491: SWAP1
00000492: DUP2
00000493: DUP2
00000494: MSTORE
00000495: PUSH1 0x20
00000497: ADD
00000498: DUP4
00000499: DUP4
0000049a: DUP1
0000049b: DUP3
0000049c: DUP5
0000049d: CALLDATACOPY
0000049e: POP
0000049f: SWAP5
000004a0: SWAP7
000004a1: POP
000004a2: POP
000004a3: POP
000004a4: POP
000004a5: POP
000004a6: POP
000004a7: POP
000004a8: PUSH1 0x00
000004aa: PUSH2 0x0787
000004ad: DUP3
000004ae: PUSH2 0x018b
000004b1: JUMP
000004b2: JUMPDEST
000004b3: PUSH2 0x0632
000004b6: PUSH1 0x04
000004b8: DUP1
000004b9: DUP1
000004ba: CALLDATALOAD
000004bb: SWAP1
000004bc: PUSH1 0x20
000004be: ADD
000004bf: SWAP1
000004c0: DUP3
000004c1: ADD
000004c2: DUP1
000004c3: CALLDATALOAD
000004c4: SWAP1
000004c5: PUSH1 0x20
000004c7: ADD
000004c8: SWAP2
000004c9: SWAP2
000004ca: SWAP1
000004cb: DUP1
000004cc: DUP1
000004cd: PUSH1 0x1f
000004cf: ADD
000004d0: PUSH1 0x20
000004d2: DUP1
000004d3: SWAP2
000004d4: DIV
000004d5: MUL
000004d6: PUSH1 0x20
000004d8: ADD
000004d9: PUSH1 0x40
000004db: MLOAD
000004dc: SWAP1
000004dd: DUP2
000004de: ADD
000004df: PUSH1 0x40
000004e1: MSTORE
000004e2: DUP1
000004e3: SWAP4
000004e4: SWAP3
000004e5: SWAP2
000004e6: SWAP1
000004e7: DUP2
000004e8: DUP2
000004e9: MSTORE
000004ea: PUSH1 0x20

exec
/bin/bash -lc 'cast disassemble "$(python3 - <<'"'PY'
import json
with open('BYTECODE_BUNDLE.json') as f:
    data=json.load(f)
print(data['artifact']['runtime_bytecode']['full'])
PY
)\" | sed -n '961,1280p'" in /tmp/codex-i34svh9b
 succeeded in 0ms:
000004ec: ADD
000004ed: DUP4
000004ee: DUP4
000004ef: DUP1
000004f0: DUP3
000004f1: DUP5
000004f2: CALLDATACOPY
000004f3: POP
000004f4: SWAP5
000004f5: SWAP7
000004f6: POP
000004f7: POP
000004f8: POP
000004f9: POP
000004fa: POP
000004fb: POP
000004fc: POP
000004fd: PUSH1 0x00
000004ff: PUSH2 0x0a53
00000502: DUP3
00000503: PUSH2 0x018b
00000506: JUMP
00000507: JUMPDEST
00000508: PUSH2 0x0661
0000050b: PUSH1 0x04
0000050d: DUP1
0000050e: DUP1
0000050f: CALLDATALOAD
00000510: SWAP1
00000511: PUSH1 0x20
00000513: ADD
00000514: SWAP1
00000515: DUP3
00000516: ADD
00000517: DUP1
00000518: CALLDATALOAD
00000519: SWAP1
0000051a: PUSH1 0x20
0000051c: ADD
0000051d: SWAP2
0000051e: SWAP2
0000051f: SWAP1
00000520: DUP1
00000521: DUP1
00000522: PUSH1 0x1f
00000524: ADD
00000525: PUSH1 0x20
00000527: DUP1
00000528: SWAP2
00000529: DIV
0000052a: MUL
0000052b: PUSH1 0x20
0000052d: ADD
0000052e: PUSH1 0x40
00000530: MLOAD
00000531: SWAP1
00000532: DUP2
00000533: ADD
00000534: PUSH1 0x40
00000536: MSTORE
00000537: DUP1
00000538: SWAP4
00000539: SWAP3
0000053a: SWAP2
0000053b: SWAP1
0000053c: DUP2
0000053d: DUP2
0000053e: MSTORE
0000053f: PUSH1 0x20
00000541: ADD
00000542: DUP4
00000543: DUP4
00000544: DUP1
00000545: DUP3
00000546: DUP5
00000547: CALLDATACOPY
00000548: POP
00000549: SWAP5
0000054a: SWAP7
0000054b: POP
0000054c: POP
0000054d: POP
0000054e: POP
0000054f: POP
00000550: POP
00000551: POP
00000552: PUSH1 0x00
00000554: PUSH1 0x00
00000556: PUSH1 0x00
00000558: PUSH1 0x00
0000055a: PUSH1 0x00
0000055c: PUSH2 0x0732
0000055f: DUP7
00000560: PUSH2 0x018b
00000563: JUMP
00000564: JUMPDEST
00000565: PUSH2 0x00a3
00000568: PUSH1 0x04
0000056a: DUP1
0000056b: DUP1
0000056c: CALLDATALOAD
0000056d: SWAP1
0000056e: PUSH1 0x20
00000570: ADD
00000571: SWAP1
00000572: DUP3
00000573: ADD
00000574: DUP1
00000575: CALLDATALOAD
00000576: SWAP1
00000577: PUSH1 0x20
00000579: ADD
0000057a: SWAP2
0000057b: SWAP2
0000057c: SWAP1
0000057d: DUP1
0000057e: DUP1
0000057f: PUSH1 0x1f
00000581: ADD
00000582: PUSH1 0x20
00000584: DUP1
00000585: SWAP2
00000586: DIV
00000587: MUL
00000588: PUSH1 0x20
0000058a: ADD
0000058b: PUSH1 0x40
0000058d: MLOAD
0000058e: SWAP1
0000058f: DUP2
00000590: ADD
00000591: PUSH1 0x40
00000593: MSTORE
00000594: DUP1
00000595: SWAP4
00000596: SWAP3
00000597: SWAP2
00000598: SWAP1
00000599: DUP2
0000059a: DUP2
0000059b: MSTORE
0000059c: PUSH1 0x20
0000059e: ADD
0000059f: DUP4
000005a0: DUP4
000005a1: DUP1
000005a2: DUP3
000005a3: DUP5
000005a4: CALLDATACOPY
000005a5: POP
000005a6: SWAP5
000005a7: SWAP7
000005a8: POP
000005a9: POP
000005aa: SWAP4
000005ab: CALLDATALOAD
000005ac: SWAP4
000005ad: POP
000005ae: POP
000005af: POP
000005b0: POP
000005b1: DUP2
000005b2: CALLER
000005b3: PUSH1 0x01
000005b5: PUSH1 0xa0
000005b7: PUSH1 0x02
000005b9: EXP
000005ba: SUB
000005bb: AND
000005bc: PUSH2 0x07e1
000005bf: DUP3
000005c0: PUSH2 0x018b
000005c3: JUMP
000005c4: JUMPDEST
000005c5: PUSH1 0x40
000005c7: MLOAD
000005c8: DUP1
000005c9: DUP1
000005ca: PUSH1 0x20
000005cc: ADD
000005cd: DUP3
000005ce: DUP2
000005cf: SUB
000005d0: DUP3
000005d1: MSTORE
000005d2: DUP4
000005d3: DUP2
000005d4: DUP2
000005d5: MLOAD
000005d6: DUP2
000005d7: MSTORE
000005d8: PUSH1 0x20
000005da: ADD
000005db: SWAP2
000005dc: POP
000005dd: DUP1
000005de: MLOAD
000005df: SWAP1
000005e0: PUSH1 0x20
000005e2: ADD
000005e3: SWAP1
000005e4: DUP1
000005e5: DUP4
000005e6: DUP4
000005e7: DUP3
000005e8: SWAP1
000005e9: PUSH1 0x00
000005eb: PUSH1 0x04
000005ed: PUSH1 0x20
000005ef: DUP5
000005f0: PUSH1 0x1f
000005f2: ADD
000005f3: DIV
000005f4: PUSH1 0x03
000005f6: MUL
000005f7: PUSH1 0x0f
000005f9: ADD
000005fa: CALL
000005fb: POP
000005fc: SWAP1
000005fd: POP
000005fe: SWAP1
000005ff: DUP2
00000600: ADD
00000601: SWAP1
00000602: PUSH1 0x1f
00000604: AND
00000605: DUP1
00000606: ISZERO
00000607: PUSH2 0x0624
0000060a: JUMPI
0000060b: DUP1
0000060c: DUP3
0000060d: SUB
0000060e: DUP1
0000060f: MLOAD
00000610: PUSH1 0x01
00000612: DUP4
00000613: PUSH1 0x20
00000615: SUB
00000616: PUSH2 0x0100
00000619: EXP
0000061a: SUB
0000061b: NOT
0000061c: AND
0000061d: DUP2
0000061e: MSTORE
0000061f: PUSH1 0x20
00000621: ADD
00000622: SWAP2
00000623: POP
00000624: JUMPDEST
00000625: POP
00000626: SWAP3
00000627: POP
00000628: POP
00000629: POP
0000062a: PUSH1 0x40
0000062c: MLOAD
0000062d: DUP1
0000062e: SWAP2
0000062f: SUB
00000630: SWAP1
00000631: RETURN
00000632: JUMPDEST
00000633: PUSH1 0x40
00000635: DUP1
00000636: MLOAD
00000637: PUSH1 0x01
00000639: PUSH1 0xa0
0000063b: PUSH1 0x02
0000063d: EXP
0000063e: SUB
0000063f: SWAP3
00000640: SWAP1
00000641: SWAP3
00000642: AND
00000643: DUP3
00000644: MSTORE
00000645: MLOAD
00000646: SWAP1
00000647: DUP2
00000648: SWAP1
00000649: SUB
0000064a: PUSH1 0x20
0000064c: ADD
0000064d: SWAP1
0000064e: RETURN
0000064f: JUMPDEST
00000650: PUSH1 0x40
00000652: DUP1
00000653: MLOAD
00000654: SWAP2
00000655: DUP3
00000656: MSTORE
00000657: MLOAD
00000658: SWAP1
00000659: DUP2
0000065a: SWAP1
0000065b: SUB
0000065c: PUSH1 0x20
0000065e: ADD
0000065f: SWAP1
00000660: RETURN
00000661: JUMPDEST
00000662: PUSH1 0x40
00000664: DUP1
00000665: MLOAD
00000666: PUSH1 0x01
00000668: PUSH1 0xa0
0000066a: PUSH1 0x02
0000066c: EXP
0000066d: SUB
0000066e: SWAP6
0000066f: DUP7
00000670: AND
00000671: DUP2
00000672: MSTORE
00000673: SWAP4
00000674: DUP6

exec
/bin/bash -lc 'cast disassemble "$(python3 - <<'"'PY'
import json
with open('BYTECODE_BUNDLE.json') as f:
    data=json.load(f)
print(data['artifact']['runtime_bytecode']['full'])
PY
)\" | sed -n '1281,1600p'" in /tmp/codex-i34svh9b
 succeeded in 0ms:
00000675: AND
00000676: PUSH1 0x20
00000678: DUP6
00000679: ADD
0000067a: MSTORE
0000067b: DUP4
0000067c: DUP2
0000067d: ADD
0000067e: SWAP3
0000067f: SWAP1
00000680: SWAP3
00000681: MSTORE
00000682: SWAP1
00000683: SWAP3
00000684: AND
00000685: PUSH1 0x60
00000687: DUP3
00000688: ADD
00000689: MSTORE
0000068a: SWAP1
0000068b: MLOAD
0000068c: SWAP1
0000068d: DUP2
0000068e: SWAP1
0000068f: SUB
00000690: PUSH1 0x80
00000692: ADD
00000693: SWAP1
00000694: RETURN
00000695: JUMPDEST
00000696: PUSH1 0x03
00000698: ADD
00000699: DUP1
0000069a: SLOAD
0000069b: PUSH1 0x01
0000069d: PUSH1 0xa0
0000069f: PUSH1 0x02
000006a1: EXP
000006a2: SUB
000006a3: NOT
000006a4: AND
000006a5: SWAP1
000006a6: SWAP2
000006a7: OR
000006a8: SWAP1
000006a9: SSTORE
000006aa: PUSH1 0x40
000006ac: MLOAD
000006ad: DUP4
000006ae: SWAP1
000006af: PUSH1 0x00
000006b1: DUP1
000006b2: MLOAD
000006b3: PUSH1 0x20
000006b5: PUSH2 0x0a9e
000006b8: DUP4
000006b9: CODECOPY
000006ba: DUP2
000006bb: MLOAD
000006bc: SWAP2
000006bd: MSTORE
000006be: SWAP1
000006bf: PUSH1 0x00
000006c1: SWAP1
000006c2: LOG2
000006c3: JUMPDEST
000006c4: POP
000006c5: JUMPDEST
000006c6: POP
000006c7: POP
000006c8: JUMP
000006c9: JUMPDEST
000006ca: PUSH1 0x03
000006cc: ADD
000006cd: SLOAD
000006ce: PUSH1 0x01
000006d0: PUSH1 0xa0
000006d2: PUSH1 0x02
000006d4: EXP
000006d5: SUB
000006d6: AND
000006d7: EQ
000006d8: ISZERO
000006d9: PUSH2 0x06c3
000006dc: JUMPI
000006dd: DUP2
000006de: PUSH2 0x0695
000006e1: DUP5
000006e2: PUSH2 0x018b
000006e5: JUMP
000006e6: JUMPDEST
000006e7: PUSH1 0x03
000006e9: ADD
000006ea: SLOAD
000006eb: PUSH1 0x01
000006ed: PUSH1 0xa0
000006ef: PUSH1 0x02
000006f1: EXP
000006f2: SUB
000006f3: AND
000006f4: EQ
000006f5: ISZERO
000006f6: PUSH2 0x06c3
000006f9: JUMPI
000006fa: DUP2
000006fb: PUSH2 0x0703
000006fe: DUP5
000006ff: PUSH2 0x018b
00000702: JUMP
00000703: JUMPDEST
00000704: DUP1
00000705: SLOAD
00000706: PUSH1 0x01
00000708: PUSH1 0xa0
0000070a: PUSH1 0x02
0000070c: EXP
0000070d: SUB
0000070e: NOT
0000070f: AND
00000710: SWAP1
00000711: SWAP2
00000712: OR
00000713: SWAP1
00000714: SSTORE
00000715: PUSH1 0x40
00000717: MLOAD
00000718: DUP4
00000719: SWAP1
0000071a: PUSH1 0x00
0000071c: DUP1
0000071d: MLOAD
0000071e: PUSH1 0x20
00000720: PUSH2 0x0a9e
00000723: DUP4
00000724: CODECOPY
00000725: DUP2
00000726: MLOAD
00000727: SWAP2
00000728: MSTORE
00000729: SWAP1
0000072a: PUSH1 0x00
0000072c: SWAP1
0000072d: LOG2
0000072e: POP
0000072f: POP
00000730: POP
00000731: JUMP
00000732: JUMPDEST
00000733: PUSH1 0x03
00000735: DUP2
00000736: ADD
00000737: SLOAD
00000738: DUP2
00000739: SLOAD
0000073a: PUSH1 0x01
0000073c: DUP4
0000073d: ADD
0000073e: SLOAD
0000073f: PUSH1 0x02
00000741: SWAP4
00000742: SWAP1
00000743: SWAP4
00000744: ADD
00000745: SLOAD
00000746: PUSH1 0x01
00000748: PUSH1 0xa0
0000074a: PUSH1 0x02
0000074c: EXP
0000074d: SUB
0000074e: SWAP2
0000074f: DUP3
00000750: AND
00000751: SWAP11
00000752: SWAP4
00000753: DUP3
00000754: AND
00000755: SWAP10
00000756: POP
00000757: SWAP8
00000758: POP
00000759: AND
0000075a: SWAP5
0000075b: POP
0000075c: SWAP3
0000075d: POP
0000075e: POP
0000075f: POP
00000760: JUMP
00000761: JUMPDEST
00000762: SLOAD
00000763: PUSH1 0x01
00000765: PUSH1 0xa0
00000767: PUSH1 0x02
00000769: EXP
0000076a: SUB
0000076b: AND
0000076c: SWAP1
0000076d: POP
0000076e: JUMPDEST
0000076f: SWAP2
00000770: SWAP1
00000771: POP
00000772: JUMP
00000773: JUMPDEST
00000774: PUSH1 0x01
00000776: ADD
00000777: SLOAD
00000778: PUSH1 0x01
0000077a: PUSH1 0xa0
0000077c: PUSH1 0x02
0000077e: EXP
0000077f: SUB
00000780: AND
00000781: SWAP1
00000782: POP
00000783: PUSH2 0x076e
00000786: JUMP
00000787: JUMPDEST
00000788: PUSH1 0x02
0000078a: ADD
0000078b: SLOAD
0000078c: SWAP1
0000078d: POP
0000078e: PUSH2 0x076e
00000791: JUMP
00000792: JUMPDEST
00000793: PUSH1 0x03
00000795: ADD
00000796: SLOAD
00000797: PUSH1 0x01
00000799: PUSH1 0xa0
0000079b: PUSH1 0x02
0000079d: EXP
0000079e: SUB
0000079f: AND
000007a0: EQ
000007a1: ISZERO
000007a2: PUSH2 0x06c3
000007a5: JUMPI
000007a6: DUP2
000007a7: PUSH2 0x07af
000007aa: DUP5
000007ab: PUSH2 0x018b
000007ae: JUMP
000007af: JUMPDEST
000007b0: PUSH1 0x01
000007b2: ADD
000007b3: DUP1
000007b4: SLOAD
000007b5: PUSH1 0x01
000007b7: PUSH1 0xa0
000007b9: PUSH1 0x02
000007bb: EXP
000007bc: SUB
000007bd: NOT
000007be: AND
000007bf: SWAP1
000007c0: SWAP2
000007c1: OR
000007c2: SWAP1
000007c3: SSTORE
000007c4: PUSH1 0x40
000007c6: MLOAD
000007c7: DUP4
000007c8: SWAP1
000007c9: PUSH1 0x00
000007cb: DUP1
000007cc: MLOAD
000007cd: PUSH1 0x20
000007cf: PUSH2 0x0a9e
000007d2: DUP4
000007d3: CODECOPY
000007d4: DUP2
000007d5: MLOAD
000007d6: SWAP2
000007d7: MSTORE
000007d8: SWAP1
000007d9: PUSH1 0x00
000007db: SWAP1
000007dc: LOG2
000007dd: POP
000007de: POP
000007df: POP
000007e0: JUMP
000007e1: JUMPDEST
000007e2: PUSH1 0x03
000007e4: ADD
000007e5: SLOAD
000007e6: PUSH1 0x01
000007e8: PUSH1 0xa0
000007ea: PUSH1 0x02
000007ec: EXP
000007ed: SUB
000007ee: AND
000007ef: EQ
000007f0: ISZERO
000007f1: PUSH2 0x06c3
000007f4: JUMPI
000007f5: DUP2
000007f6: PUSH2 0x07fe
000007f9: DUP5
000007fa: PUSH2 0x018b
000007fd: JUMP
000007fe: JUMPDEST
000007ff: PUSH1 0x02
00000801: ADD
00000802: SSTORE
00000803: PUSH1 0x40
00000805: MLOAD
00000806: DUP4
00000807: SWAP1
00000808: PUSH1 0x00
0000080a: DUP1
0000080b: MLOAD
0000080c: PUSH1 0x20
0000080e: PUSH2 0x0a9e
00000811: DUP4
00000812: CODECOPY
00000813: DUP2
00000814: MLOAD

exec
/bin/bash -lc 'cast disassemble "$(python3 - <<'"'PY'
import json
with open('BYTECODE_BUNDLE.json') as f:
    data=json.load(f)
print(data['artifact']['runtime_bytecode']['full'])
PY
)\" | sed -n '1601,1920p'" in /tmp/codex-i34svh9b
 succeeded in 0ms:
00000815: SWAP2
00000816: MSTORE
00000817: SWAP1
00000818: PUSH1 0x00
0000081a: SWAP1
0000081b: LOG2
0000081c: POP
0000081d: POP
0000081e: POP
0000081f: JUMP
00000820: JUMPDEST
00000821: SLOAD
00000822: PUSH1 0x01
00000824: PUSH1 0xa0
00000826: PUSH1 0x02
00000828: EXP
00000829: SUB
0000082a: AND
0000082b: EQ
0000082c: ISZERO
0000082d: PUSH2 0x08e7
00000830: JUMPI
00000831: PUSH1 0x40
00000833: MLOAD
00000834: DUP2
00000835: SWAP1
00000836: PUSH1 0x01
00000838: PUSH1 0xa0
0000083a: PUSH1 0x02
0000083c: EXP
0000083d: SUB
0000083e: CALLER
0000083f: AND
00000840: SWAP1
00000841: PUSH32 0xd31658ff34e42040e5b3559456497d23086d2b4c8ceb1d63798f3dbd3a8e0579
00000862: SWAP1
00000863: PUSH1 0x00
00000865: SWAP1
00000866: LOG3
00000867: DUP1
00000868: PUSH1 0xff
0000086a: PUSH1 0x02
0000086c: EXP
0000086d: PUSH1 0x01
0000086f: PUSH1 0xa0
00000871: PUSH1 0x02
00000873: EXP
00000874: SUB
00000875: CALLER
00000876: AND
00000877: PUSH1 0xa0
00000879: PUSH1 0x02
0000087b: EXP
0000087c: DUP2
0000087d: LT
0000087e: ISZERO
0000087f: PUSH2 0x0002
00000882: JUMPI
00000883: ADD
00000884: PUSH1 0x00
00000886: POP
00000887: SWAP1
00000888: DUP1
00000889: MLOAD
0000088a: SWAP1
0000088b: PUSH1 0x20
0000088d: ADD
0000088e: SWAP1
0000088f: DUP3
00000890: DUP1
00000891: SLOAD
00000892: PUSH1 0x01
00000894: DUP2
00000895: PUSH1 0x01
00000897: AND
00000898: ISZERO
00000899: PUSH2 0x0100
0000089c: MUL
0000089d: SUB
0000089e: AND
0000089f: PUSH1 0x02
000008a1: SWAP1
000008a2: DIV
000008a3: SWAP1
000008a4: PUSH1 0x00
000008a6: MSTORE
000008a7: PUSH1 0x20
000008a9: PUSH1 0x00
000008ab: KECCAK256
000008ac: SWAP1
000008ad: PUSH1 0x1f
000008af: ADD
000008b0: PUSH1 0x20
000008b2: SWAP1
000008b3: DIV
000008b4: DUP2
000008b5: ADD
000008b6: SWAP3
000008b7: DUP3
000008b8: PUSH1 0x1f
000008ba: LT
000008bb: PUSH2 0x08ea
000008be: JUMPI
000008bf: DUP1
000008c0: MLOAD
000008c1: PUSH1 0xff
000008c3: NOT
000008c4: AND
000008c5: DUP4
000008c6: DUP1
000008c7: ADD
000008c8: OR
000008c9: DUP6
000008ca: SSTORE
000008cb: JUMPDEST
000008cc: POP
000008cd: PUSH2 0x06c3
000008d0: SWAP3
000008d1: SWAP2
000008d2: POP
000008d3: JUMPDEST
000008d4: DUP1
000008d5: DUP3
000008d6: GT
000008d7: ISZERO
000008d8: PUSH2 0x091a
000008db: JUMPI
000008dc: PUSH1 0x00
000008de: DUP2
000008df: SSTORE
000008e0: PUSH1 0x01
000008e2: ADD
000008e3: PUSH2 0x08d3
000008e6: JUMP
000008e7: JUMPDEST
000008e8: POP
000008e9: JUMP
000008ea: JUMPDEST
000008eb: DUP3
000008ec: DUP1
000008ed: ADD
000008ee: PUSH1 0x01
000008f0: ADD
000008f1: DUP6
000008f2: SSTORE
000008f3: DUP3
000008f4: ISZERO
000008f5: PUSH2 0x08cb
000008f8: JUMPI
000008f9: SWAP2
000008fa: DUP3
000008fb: ADD
000008fc: JUMPDEST
000008fd: DUP3
000008fe: DUP2
000008ff: GT
00000900: ISZERO
00000901: PUSH2 0x08cb
00000904: JUMPI
00000905: DUP3
00000906: MLOAD
00000907: DUP3
00000908: PUSH1 0x00
0000090a: POP
0000090b: SSTORE
0000090c: SWAP2
0000090d: PUSH1 0x20
0000090f: ADD
00000910: SWAP2
00000911: SWAP1
00000912: PUSH1 0x01
00000914: ADD
00000915: SWAP1
00000916: PUSH2 0x08fc
00000919: JUMP
0000091a: JUMPDEST
0000091b: POP
0000091c: SWAP1
0000091d: JUMP
0000091e: JUMPDEST
0000091f: PUSH1 0x03
00000921: DUP2
00000922: ADD
00000923: SLOAD
00000924: SWAP1
00000925: SWAP2
00000926: POP
00000927: PUSH1 0x01
00000929: PUSH1 0xa0
0000092b: PUSH1 0x02
0000092d: EXP
0000092e: SUB
0000092f: AND
00000930: PUSH1 0x00
00000932: EQ
00000933: DUP1
00000934: ISZERO
00000935: PUSH2 0x0946
00000938: JUMPI
00000939: POP
0000093a: PUSH8 0x4563918244f40000
00000943: CALLVALUE
00000944: LT
00000945: ISZERO
00000946: JUMPDEST
00000947: DUP1
00000948: ISZERO
00000949: PUSH2 0x0954
0000094c: JUMPI
0000094d: POP
0000094e: PUSH1 0x09
00000950: DUP3
00000951: MLOAD
00000952: LT
00000953: ISZERO
00000954: JUMPDEST
00000955: ISZERO
00000956: PUSH2 0x06c5
00000959: JUMPI
0000095a: PUSH1 0x03
0000095c: DUP2
0000095d: ADD
0000095e: DUP1
0000095f: SLOAD
00000960: PUSH1 0x01
00000962: PUSH1 0xa0
00000964: PUSH1 0x02
00000966: EXP
00000967: SUB
00000968: NOT
00000969: AND
0000096a: CALLER
0000096b: OR
0000096c: SWAP1
0000096d: SSTORE
0000096e: PUSH1 0x40
00000970: MLOAD
00000971: DUP3
00000972: SWAP1
00000973: PUSH1 0x00
00000975: DUP1
00000976: MLOAD
00000977: PUSH1 0x20
00000979: PUSH2 0x0a9e
0000097c: DUP4
0000097d: CODECOPY
0000097e: DUP2
0000097f: MLOAD
00000980: SWAP2
00000981: MSTORE
00000982: SWAP1
00000983: PUSH1 0x00
00000985: SWAP1
00000986: LOG2
00000987: POP
00000988: POP
00000989: JUMP
0000098a: JUMPDEST
0000098b: PUSH1 0x03
0000098d: ADD
0000098e: SLOAD
0000098f: PUSH1 0x01
00000991: PUSH1 0xa0
00000993: PUSH1 0x02
00000995: EXP
00000996: SUB
00000997: AND
00000998: EQ
00000999: ISZERO
0000099a: PUSH2 0x06c3
0000099d: JUMPI
0000099e: PUSH1 0x00
000009a0: PUSH1 0x00
000009a2: POP
000009a3: PUSH1 0x08
000009a5: DUP5
000009a6: PUSH1 0x40
000009a8: MLOAD
000009a9: DUP1
000009aa: DUP3
000009ab: DUP1
000009ac: MLOAD
000009ad: SWAP1
000009ae: PUSH1 0x20
000009b0: ADD
000009b1: SWAP1
000009b2: DUP1
000009b3: DUP4
000009b4: DUP4
000009b5: DUP3
000009b6: SWAP1
000009b7: PUSH1 0x00
000009b9: PUSH1 0x04
000009bb: PUSH1 0x20
000009bd: DUP5
000009be: PUSH1 0x1f
000009c0: ADD
000009c1: DIV
000009c2: PUSH1 0x03
000009c4: MUL
000009c5: PUSH1 0x0f
000009c7: ADD
000009c8: CALL
000009c9: POP
000009ca: SWAP1
000009cb: SWAP2
000009cc: ADD
000009cd: DUP3
000009ce: SWAP1
000009cf: SUB
000009d0: SWAP1
000009d1: SWAP2
000009d2: KECCAK256
000009d3: SWAP3
000009d4: SWAP1
000009d5: SWAP3
000009d6: DIV
000009d7: SWAP2
000009d8: POP
000009d9: POP

exec
/bin/bash -lc 'cast disassemble "$(python3 - <<'"'PY'
import json
with open('BYTECODE_BUNDLE.json') as f:
    data=json.load(f)
print(data['artifact']['runtime_bytecode']['full'])
PY
)\" | sed -n '1921,2240p'" in /tmp/codex-i34svh9b
 succeeded in 0ms:
000009da: PUSH1 0xfd
000009dc: PUSH1 0x02
000009de: EXP
000009df: DUP2
000009e0: LT
000009e1: ISZERO
000009e2: PUSH2 0x0002
000009e5: JUMPI
000009e6: PUSH1 0x04
000009e8: MUL
000009e9: DUP1
000009ea: SLOAD
000009eb: PUSH1 0x01
000009ed: PUSH1 0xa0
000009ef: PUSH1 0x02
000009f1: EXP
000009f2: SUB
000009f3: NOT
000009f4: SWAP1
000009f5: DUP2
000009f6: AND
000009f7: DUP3
000009f8: SSTORE
000009f9: PUSH1 0x01
000009fb: DUP3
000009fc: ADD
000009fd: DUP1
000009fe: SLOAD
000009ff: DUP3
00000a00: AND
00000a01: SWAP1
00000a02: SSTORE
00000a03: PUSH1 0x02
00000a05: DUP3
00000a06: ADD
00000a07: DUP4
00000a08: SWAP1
00000a09: SSTORE
00000a0a: PUSH1 0x03
00000a0c: SWAP2
00000a0d: SWAP1
00000a0e: SWAP2
00000a0f: ADD
00000a10: DUP1
00000a11: SLOAD
00000a12: SWAP1
00000a13: SWAP2
00000a14: AND
00000a15: SWAP1
00000a16: SSTORE
00000a17: PUSH1 0x40
00000a19: MLOAD
00000a1a: PUSH1 0x01
00000a1c: PUSH1 0xa0
00000a1e: PUSH1 0x02
00000a20: EXP
00000a21: SUB
00000a22: DUP5
00000a23: AND
00000a24: SWAP2
00000a25: SWAP1
00000a26: PUSH8 0x4563918244f40000
00000a2f: SWAP1
00000a30: DUP3
00000a31: DUP2
00000a32: DUP2
00000a33: DUP2
00000a34: DUP6
00000a35: DUP9
00000a36: DUP4
00000a37: CALL
00000a38: POP
00000a39: DUP7
00000a3a: SWAP4
00000a3b: POP
00000a3c: PUSH1 0x00
00000a3e: DUP1
00000a3f: MLOAD
00000a40: PUSH1 0x20
00000a42: PUSH2 0x0a9e
00000a45: DUP4
00000a46: CODECOPY
00000a47: DUP2
00000a48: MLOAD
00000a49: SWAP2
00000a4a: MSTORE
00000a4b: SWAP3
00000a4c: SWAP2
00000a4d: POP
00000a4e: LOG2
00000a4f: POP
00000a50: POP
00000a51: POP
00000a52: JUMP
00000a53: JUMPDEST
00000a54: PUSH1 0x03
00000a56: ADD
00000a57: SLOAD
00000a58: PUSH1 0x01
00000a5a: PUSH1 0xa0
00000a5c: PUSH1 0x02
00000a5e: EXP
00000a5f: SUB
00000a60: AND
00000a61: SWAP1
00000a62: POP
00000a63: PUSH2 0x076e
00000a66: JUMP
00000a67: JUMPDEST
00000a68: DUP3
00000a69: ADD
00000a6a: SWAP2
00000a6b: SWAP1
00000a6c: PUSH1 0x00
00000a6e: MSTORE
00000a6f: PUSH1 0x20
00000a71: PUSH1 0x00
00000a73: KECCAK256
00000a74: SWAP1
00000a75: JUMPDEST
00000a76: DUP2
00000a77: SLOAD
00000a78: DUP2
00000a79: MSTORE
00000a7a: SWAP1
00000a7b: PUSH1 0x01
00000a7d: ADD
00000a7e: SWAP1
00000a7f: PUSH1 0x20
00000a81: ADD
00000a82: DUP1
00000a83: DUP4
00000a84: GT
00000a85: PUSH2 0x0a75
00000a88: JUMPI
00000a89: DUP3
00000a8a: SWAP1
00000a8b: SUB
00000a8c: PUSH1 0x1f
00000a8e: AND
00000a8f: DUP3
00000a90: ADD
00000a91: SWAP2
00000a92: JUMPDEST
00000a93: POP
00000a94: POP
00000a95: POP
00000a96: POP
00000a97: POP
00000a98: SWAP1
00000a99: POP
00000a9a: PUSH2 0x076e
00000a9d: JUMP
00000a9e: SHR
00000a9f: UNKNOWN(0xF7)
00000aa0: PUSH6 0x2f1f9289dc41
00000aa7: PUSH23


Finished reading the bytecode bundle and traced the meaningful state-changing paths. The remaining work is to serialize the audit conclusions into the required JSON schema.
  ✓ Inspect BYTECODE_BUNDLE.json and supporting artifacts to understand the contract architecture and evidence
  ✓ Evaluate potential security issues from bytecode-level evidence, focusing on requested categories
  → Produce JSON report matching the required schema
codex
{"no_findings":false,"summary":"The bytecode appears to implement a keyed registry with per-record owner checks, a 5 ETH payment threshold, reverse-name style storage, and one value-bearing external call. Two issues are meaningful from bytecode alone: the payable acquisition path fails open and can trap ETH on invalid attempts, and the 5 ETH payout path mutates storage before an unchecked external CALL, which can strand refunds if the recipient call fails. Selector/function names are inferred only from bytecode structure, so exact business semantics remain uncertain.","findings":[{"severity":"high","category":"other","title":"Payable acquisition path returns success on failed preconditions, trapping ETH","exploit_scenario":"The routine behind selector 0xae999ece appears to be a payable registration/acquisition path. It checks an owner-like slot at key+3, compares CALLVALUE against the embedded constant 0x4563918244f40000 (5 ether), and also checks a length-like value. If any check fails, execution jumps to the shared POP/JUMP return path instead of reverting. An attacker or malicious frontend can deliberately submit already-owned, oversized, or underfunded registrations; the transaction still succeeds and any ETH sent remains in the contract.","recommendation":"Make failed acquisition attempts revert. If the intended behavior is conditional acceptance, explicitly refund msg.value on rejection instead of returning success.","evidence":"At pc 0x091e-0x0956 the contract loads key+3, checks for zero, compares CALLVALUE to 0x4563918244f40000, and evaluates a length-like bound. Failure jumps to pc 0x06c5/0x06c3, which only unwinds the stack and returns to the dispatcher STOP path; there is no REVERT and no compensating transfer.","locations":["selector:0xae999ece","pc:0x091e","pc:0x0943","pc:0x0956","pc:0x06c5"]},{"severity":"medium","category":"other","title":"Unchecked 5 ETH external CALL after state mutation can strand refunds","exploit_scenario":"The owner-gated routine behind selector 0xb5754045 appears to clear or rewrite several storage fields for a record and then perform a 5 ETH CALL to a computed recipient. Because the CALL result is discarded, a reverting or non-payable recipient can make the transfer fail while the prior state changes remain committed. If this path is meant to release a deposit or settle a record, the caller can lose the right to retry the refund and the ether stays trapped in the contract.","recommendation":"Use a checked CALL and revert on failure, or switch to a pull-payment model where the recipient withdraws separately. If the state must change first, persist a claimable balance instead of assuming the transfer succeeded.","evidence":"In the 0x098a routine reached from selector 0xb5754045, storage is written at pc 0x09f8, 0x0a02, 0x0a09, and 0x0a16 before a value-bearing CALL at pc 0x0a37. The call embeds the same 5 ether constant 0x4563918244f40000, uses a computed target, and the return value is immediately POP'd rather than checked.","locations":["selector:0xb5754045","pc:0x09f8","pc:0x0a02","pc:0x0a09","pc:0x0a16","pc:0x0a37"]}]}
tokens used
74,488
Metadata
{
    "codex": {
        "ran_at": "2026-04-04T21:46:59.997853+00:00",
        "returncode": 0
    },
    "project": {
        "mode": "bytecode",
        "bytecode_length": 5502,
        "bytecode_truncated": false,
        "capability_graph_present": true,
        "analysis_artifact_present": true
    },
    "summary": "The bytecode appears to implement a keyed registry with per-record owner checks, a 5 ETH payment threshold, reverse-name style storage, and one value-bearing external call. Two issues are meaningful from bytecode alone: the payable acquisition path fails open and can trap ETH on invalid attempts, and the 5 ETH payout path mutates storage before an unchecked external CALL, which can strand refunds if the recipient call fails. Selector/function names are inferred only from bytecode structure, so exact business semantics remain uncertain.",
    "raw_final": {
        "summary": "The bytecode appears to implement a keyed registry with per-record owner checks, a 5 ETH payment threshold, reverse-name style storage, and one value-bearing external call. Two issues are meaningful from bytecode alone: the payable acquisition path fails open and can trap ETH on invalid attempts, and the 5 ETH payout path mutates storage before an unchecked external CALL, which can strand refunds if the recipient call fails. Selector/function names are inferred only from bytecode structure, so exact business semantics remain uncertain.",
        "findings": [
            {
                "title": "Payable acquisition path returns success on failed preconditions, trapping ETH",
                "category": "other",
                "evidence": "At pc 0x091e-0x0956 the contract loads key+3, checks for zero, compares CALLVALUE to 0x4563918244f40000, and evaluates a length-like bound. Failure jumps to pc 0x06c5/0x06c3, which only unwinds the stack and returns to the dispatcher STOP path; there is no REVERT and no compensating transfer.",
                "severity": "high",
                "locations": [
                    "selector:0xae999ece",
                    "pc:0x091e",
                    "pc:0x0943",
                    "pc:0x0956",
                    "pc:0x06c5"
                ],
                "recommendation": "Make failed acquisition attempts revert. If the intended behavior is conditional acceptance, explicitly refund msg.value on rejection instead of returning success.",
                "exploit_scenario": "The routine behind selector 0xae999ece appears to be a payable registration/acquisition path. It checks an owner-like slot at key+3, compares CALLVALUE against the embedded constant 0x4563918244f40000 (5 ether), and also checks a length-like value. If any check fails, execution jumps to the shared POP/JUMP return path instead of reverting. An attacker or malicious frontend can deliberately submit already-owned, oversized, or underfunded registrations; the transaction still succeeds and any ETH sent remains in the contract."
            },
            {
                "title": "Unchecked 5 ETH external CALL after state mutation can strand refunds",
                "category": "other",
                "evidence": "In the 0x098a routine reached from selector 0xb5754045, storage is written at pc 0x09f8, 0x0a02, 0x0a09, and 0x0a16 before a value-bearing CALL at pc 0x0a37. The call embeds the same 5 ether constant 0x4563918244f40000, uses a computed target, and the return value is immediately POP'd rather than checked.",
                "severity": "medium",
                "locations": [
                    "selector:0xb5754045",
                    "pc:0x09f8",
                    "pc:0x0a02",
                    "pc:0x0a09",
                    "pc:0x0a16",
                    "pc:0x0a37"
                ],
                "recommendation": "Use a checked CALL and revert on failure, or switch to a pull-payment model where the recipient withdraws separately. If the state must change first, persist a claimable balance instead of assuming the transfer succeeded.",
                "exploit_scenario": "The owner-gated routine behind selector 0xb5754045 appears to clear or rewrite several storage fields for a record and then perform a 5 ETH CALL to a computed recipient. Because the CALL result is discarded, a reverting or non-payable recipient can make the transfer fail while the prior state changes remain committed. If this path is meant to release a deposit or settle a record, the caller can lose the right to retry the refund and the ether stays trapped in the contract."
            }
        ],
        "no_findings": false
    },
    "no_findings": false,
    "schema_version": 1
}

Opcode Heuristics

tool.cast_disasm
Delegatecall
0
Selfdestruct
0
CREATE2
0
CALL-family (heavy)
4
EXT*/BALANCE
0
Total opcodes
2077
Flags
No heuristic flags raised.
View cast disassembly output
00000000: PUSH1 0x60
00000002: PUSH1 0x40
00000004: MSTORE
00000005: CALLDATASIZE
00000006: ISZERO
00000007: PUSH2 0x00a3
0000000a: JUMPI
0000000b: PUSH1 0xe0
0000000d: PUSH1 0x02
0000000f: EXP
00000010: PUSH1 0x00
00000012: CALLDATALOAD
00000013: DIV
00000014: PUSH4 0x01984892
00000019: DUP2
0000001a: EQ
0000001b: PUSH2 0x00a5
0000001e: JUMPI
0000001f: DUP1
00000020: PUSH4 0x092b25e9
00000025: EQ
00000026: PUSH2 0x012f
00000029: JUMPI
0000002a: DUP1
0000002b: PUSH4 0x213b9eb8
00000030: EQ
00000031: PUSH2 0x01e1
00000034: JUMPI
00000035: DUP1
00000036: PUSH4 0x511b1df9
0000003b: EQ
0000003c: PUSH2 0x0241
0000003f: JUMPI
00000040: DUP1
00000041: PUSH4 0x7f445c24
00000046: EQ
00000047: PUSH2 0x0296
0000004a: JUMPI
0000004b: DUP1
0000004c: PUSH4 0xae999ece
00000051: EQ
00000052: PUSH2 0x02eb
00000055: JUMPI
00000056: DUP1
00000057: PUSH4 0xb5754045
0000005c: EQ
0000005d: PUSH2 0x0340
00000060: JUMPI
00000061: DUP1
00000062: PUSH4 0xc47f0027
00000067: EQ
00000068: PUSH2 0x03a0
0000006b: JUMPI
0000006c: DUP1
0000006d: PUSH4 0xccf4f413
00000072: EQ
00000073: PUSH2 0x03fd
00000076: JUMPI
00000077: DUP1
00000078: PUSH4 0xdd54a62f
0000007d: EQ
0000007e: PUSH2 0x045d
00000081: JUMPI
00000082: DUP1
00000083: PUSH4 0xdf55b41a
00000088: EQ
00000089: PUSH2 0x04b2
0000008c: JUMPI
0000008d: DUP1
0000008e: PUSH4 0xe51ace16
00000093: EQ
00000094: PUSH2 0x0507
00000097: JUMPI
00000098: DUP1
00000099: PUSH4 0xfd6f5430
0000009e: EQ
0000009f: PUSH2 0x0564
000000a2: JUMPI
000000a3: JUMPDEST
000000a4: STOP
000000a5: JUMPDEST
000000a6: PUSH2 0x05c4
000000a9: PUSH1 0x04
000000ab: CALLDATALOAD
000000ac: PUSH1 0x40
000000ae: DUP1
000000af: MLOAD
000000b0: PUSH1 0x20
000000b2: DUP2
000000b3: ADD
000000b4: SWAP1
000000b5: SWAP2
000000b6: MSTORE
000000b7: PUSH1 0x00
000000b9: DUP2
000000ba: MSTORE
000000bb: PUSH1 0xff
000000bd: PUSH1 0x02
000000bf: EXP
000000c0: PUSH1 0x01
000000c2: PUSH1 0xa0
000000c4: PUSH1 0x02
000000c6: EXP
000000c7: SUB
000000c8: DUP4
000000c9: AND
000000ca: PUSH1 0xa0
000000cc: PUSH1 0x02
000000ce: EXP
000000cf: DUP2
000000d0: LT
000000d1: ISZERO
000000d2: PUSH2 0x0002
000000d5: JUMPI
000000d6: ADD
000000d7: DUP1
000000d8: SLOAD
000000d9: PUSH1 0x40
000000db: DUP1
000000dc: MLOAD
000000dd: PUSH1 0x20
000000df: PUSH1 0x02
000000e1: PUSH1 0x01
000000e3: DUP6
000000e4: AND
000000e5: ISZERO
000000e6: PUSH2 0x0100
000000e9: MUL
000000ea: PUSH1 0x00
000000ec: NOT
000000ed: ADD
000000ee: SWAP1
000000ef: SWAP5
000000f0: AND
000000f1: SWAP4
000000f2: SWAP1
000000f3: SWAP4
000000f4: DIV
000000f5: PUSH1 0x1f
000000f7: DUP2
000000f8: ADD
000000f9: DUP5
000000fa: SWAP1
000000fb: DIV
000000fc: DUP5
000000fd: MUL
000000fe: DUP3
000000ff: ADD
00000100: DUP5
00000101: ADD
00000102: SWAP1
00000103: SWAP3
00000104: MSTORE
00000105: DUP2
00000106: DUP2
00000107: MSTORE
00000108: SWAP3
00000109: SWAP2
0000010a: DUP4
0000010b: ADD
0000010c: DUP3
0000010d: DUP3
0000010e: DUP1
0000010f: ISZERO
00000110: PUSH2 0x0a92
00000113: JUMPI
00000114: DUP1
00000115: PUSH1 0x1f
00000117: LT
00000118: PUSH2 0x0a67
0000011b: JUMPI
0000011c: PUSH2 0x0100
0000011f: DUP1
00000120: DUP4
00000121: SLOAD
00000122: DIV
00000123: MUL
00000124: DUP4
00000125: MSTORE
00000126: SWAP2
00000127: PUSH1 0x20
00000129: ADD
0000012a: SWAP2
0000012b: PUSH2 0x0a92
0000012e: JUMP
0000012f: JUMPDEST
00000130: PUSH2 0x00a3
00000133: PUSH1 0x04
00000135: DUP1
00000136: DUP1
00000137: CALLDATALOAD
00000138: SWAP1
00000139: PUSH1 0x20
0000013b: ADD
0000013c: SWAP1
0000013d: DUP3
0000013e: ADD
0000013f: DUP1
00000140: CALLDATALOAD
00000141: SWAP1
00000142: PUSH1 0x20
00000144: ADD
00000145: SWAP2
00000146: SWAP2
00000147: SWAP1
00000148: DUP1
00000149: DUP1
0000014a: PUSH1 0x1f
0000014c: ADD
0000014d: PUSH1 0x20
0000014f: DUP1
00000150: SWAP2
00000151: DIV
00000152: MUL
00000153: PUSH1 0x20
00000155: ADD
00000156: PUSH1 0x40
00000158: MLOAD
00000159: SWAP1
0000015a: DUP2
0000015b: ADD
0000015c: PUSH1 0x40
0000015e: MSTORE
0000015f: DUP1
00000160: SWAP4
00000161: SWAP3
00000162: SWAP2
00000163: SWAP1
00000164: DUP2
00000165: DUP2
00000166: MSTORE
00000167: PUSH1 0x20
00000169: ADD
0000016a: DUP4
0000016b: DUP4
0000016c: DUP1
0000016d: DUP3
0000016e: DUP5
0000016f: CALLDATACOPY
00000170: POP
00000171: SWAP5
00000172: SWAP7
00000173: POP
00000174: POP
00000175: SWAP4
00000176: CALLDATALOAD
00000177: SWAP4
00000178: POP
00000179: POP
0000017a: POP
0000017b: POP
0000017c: DUP2
0000017d: CALLER
0000017e: PUSH1 0x01
00000180: PUSH1 0xa0
00000182: PUSH1 0x02
00000184: EXP
00000185: SUB
00000186: AND
00000187: PUSH2 0x06c9
0000018a: DUP3
0000018b: JUMPDEST
0000018c: PUSH1 0x00
0000018e: PUSH1 0x00
00000190: PUSH1 0x00
00000192: POP
00000193: PUSH1 0x08
00000195: DUP4
00000196: PUSH1 0x40
00000198: MLOAD
00000199: DUP1
0000019a: DUP3
0000019b: DUP1
0000019c: MLOAD
0000019d: SWAP1
0000019e: PUSH1 0x20
000001a0: ADD
000001a1: SWAP1
000001a2: DUP1
000001a3: DUP4
000001a4: DUP4
000001a5: DUP3
000001a6: SWAP1
000001a7: PUSH1 0x00
000001a9: PUSH1 0x04
000001ab: PUSH1 0x20
000001ad: DUP5
000001ae: PUSH1 0x1f
000001b0: ADD
000001b1: DIV
000001b2: PUSH1 0x03
000001b4: MUL
000001b5: PUSH1 0x0f
000001b7: ADD
000001b8: CALL
000001b9: POP
000001ba: SWAP1
000001bb: SWAP2
000001bc: ADD
000001bd: DUP3
000001be: SWAP1
000001bf: SUB
000001c0: SWAP1
000001c1: SWAP2
000001c2: KECCAK256
000001c3: SWAP3
000001c4: SWAP1
000001c5: SWAP3
000001c6: DIV
000001c7: SWAP2
000001c8: POP
000001c9: POP
000001ca: PUSH1 0xfd
000001cc: PUSH1 0x02
000001ce: EXP
000001cf: DUP2
000001d0: LT
000001d1: ISZERO
000001d2: PUSH2 0x0002
000001d5: JUMPI
000001d6: PUSH1 0x04
000001d8: MUL
000001d9: SWAP1
000001da: POP
000001db: SWAP1
000001dc: POP
000001dd: PUSH2 0x076e
000001e0: JUMP
000001e1: JUMPDEST
000001e2: PUSH2 0x00a3
000001e5: PUSH1 0x04
000001e7: DUP1
000001e8: DUP1
000001e9: CALLDATALOAD
000001ea: SWAP1
000001eb: PUSH1 0x20
000001ed: ADD
000001ee: SWAP1
000001ef: DUP3
000001f0: ADD
000001f1: DUP1
000001f2: CALLDATALOAD
000001f3: SWAP1
000001f4: PUSH1 0x20
000001f6: ADD
000001f7: SWAP2
000001f8: SWAP2
000001f9: SWAP1
000001fa: DUP1
000001fb: DUP1
000001fc: PUSH1 0x1f
000001fe: ADD
000001ff: PUSH1 0x20
00000201: DUP1
00000202: SWAP2
00000203: DIV
00000204: MUL
00000205: PUSH1 0x20
00000207: ADD
00000208: PUSH1 0x40
0000020a: MLOAD
0000020b: SWAP1
0000020c: DUP2
0000020d: ADD
0000020e: PUSH1 0x40
00000210: MSTORE
00000211: DUP1
00000212: SWAP4
00000213: SWAP3
00000214: SWAP2
00000215: SWAP1
00000216: DUP2
00000217: DUP2
00000218: MSTORE
00000219: PUSH1 0x20
0000021b: ADD
0000021c: DUP4
0000021d: DUP4
0000021e: DUP1
0000021f: DUP3
00000220: DUP5
00000221: CALLDATACOPY
00000222: POP
00000223: SWAP5
00000224: SWAP7
00000225: POP
00000226: POP
00000227: SWAP4
00000228: CALLDATALOAD
00000229: SWAP4
0000022a: POP
0000022b: POP
0000022c: POP
0000022d: POP
0000022e: DUP2
0000022f: CALLER
00000230: PUSH1 0x01
00000232: PUSH1 0xa0
00000234: PUSH1 0x02
00000236: EXP
00000237: SUB
00000238: AND
00000239: PUSH2 0x06e6
0000023c: DUP3
0000023d: PUSH2 0x018b
00000240: JUMP
00000241: JUMPDEST
00000242: PUSH2 0x0632
00000245: PUSH1 0x04
00000247: DUP1
00000248: DUP1
00000249: CALLDATALOAD
0000024a: SWAP1
0000024b: PUSH1 0x20
0000024d: ADD
0000024e: SWAP1
0000024f: DUP3
00000250: ADD
00000251: DUP1
00000252: CALLDATALOAD
00000253: SWAP1
00000254: PUSH1 0x20
00000256: ADD
00000257: SWAP2
00000258: SWAP2
00000259: SWAP1
0000025a: DUP1
0000025b: DUP1
0000025c: PUSH1 0x1f
0000025e: ADD
0000025f: PUSH1 0x20
00000261: DUP1
00000262: SWAP2
00000263: DIV
00000264: MUL
00000265: PUSH1 0x20
00000267: ADD
00000268: PUSH1 0x40
0000026a: MLOAD
0000026b: SWAP1
0000026c: DUP2
0000026d: ADD
0000026e: PUSH1 0x40
00000270: MSTORE
00000271: DUP1
00000272: SWAP4
00000273: SWAP3
00000274: SWAP2
00000275: SWAP1
00000276: DUP2
00000277: DUP2
00000278: MSTORE
00000279: PUSH1 0x20
0000027b: ADD
0000027c: DUP4
0000027d: DUP4
0000027e: DUP1
0000027f: DUP3
00000280: DUP5
00000281: CALLDATACOPY
00000282: POP
00000283: SWAP5
00000284: SWAP7
00000285: POP
00000286: POP
00000287: POP
00000288: POP
00000289: POP
0000028a: POP
0000028b: POP
0000028c: PUSH1 0x00
0000028e: PUSH2 0x0761
00000291: DUP3
00000292: PUSH2 0x018b
00000295: JUMP
00000296: JUMPDEST
00000297: PUSH2 0x0632
0000029a: PUSH1 0x04
0000029c: DUP1
0000029d: DUP1
0000029e: CALLDATALOAD
0000029f: SWAP1
000002a0: PUSH1 0x20
000002a2: ADD
000002a3: SWAP1
000002a4: DUP3
000002a5: ADD
000002a6: DUP1
000002a7: CALLDATALOAD
000002a8: SWAP1
000002a9: PUSH1 0x20
000002ab: ADD
000002ac: SWAP2
000002ad: SWAP2
000002ae: SWAP1
000002af: DUP1
000002b0: DUP1
000002b1: PUSH1 0x1f
000002b3: ADD
000002b4: PUSH1 0x20
000002b6: DUP1
000002b7: SWAP2
000002b8: DIV
000002b9: MUL
000002ba: PUSH1 0x20
000002bc: ADD
000002bd: PUSH1 0x40
000002bf: MLOAD
000002c0: SWAP1
000002c1: DUP2
000002c2: ADD
000002c3: PUSH1 0x40
000002c5: MSTORE
000002c6: DUP1
000002c7: SWAP4
000002c8: SWAP3
000002c9: SWAP2
000002ca: SWAP1
000002cb: DUP2
000002cc: DUP2
000002cd: MSTORE
000002ce: PUSH1 0x20
000002d0: ADD
000002d1: DUP4
000002d2: DUP4
000002d3: DUP1
000002d4: DUP3
000002d5: DUP5
000002d6: CALLDATACOPY
000002d7: POP
000002d8: SWAP5
000002d9: SWAP7
000002da: POP
000002db: POP
000002dc: POP
000002dd: POP
000002de: POP
000002df: POP
000002e0: POP
000002e1: PUSH1 0x00
000002e3: PUSH2 0x0773
000002e6: DUP3
000002e7: PUSH2 0x018b
000002ea: JUMP
000002eb: JUMPDEST
000002ec: PUSH2 0x00a3
000002ef: PUSH1 0x04
000002f1: DUP1
000002f2: DUP1
000002f3: CALLDATALOAD
000002f4: SWAP1
000002f5: PUSH1 0x20
000002f7: ADD
000002f8: SWAP1
000002f9: DUP3
000002fa: ADD
000002fb: DUP1
000002fc: CALLDATALOAD
000002fd: SWAP1
000002fe: PUSH1 0x20
00000300: ADD
00000301: SWAP2
00000302: SWAP2
00000303: SWAP1
00000304: DUP1
00000305: DUP1
00000306: PUSH1 0x1f
00000308: ADD
00000309: PUSH1 0x20
0000030b: DUP1
0000030c: SWAP2
0000030d: DIV
0000030e: MUL
0000030f: PUSH1 0x20
00000311: ADD
00000312: PUSH1 0x40
00000314: MLOAD
00000315: SWAP1
00000316: DUP2
00000317: ADD
00000318: PUSH1 0x40
0000031a: MSTORE
0000031b: DUP1
0000031c: SWAP4
0000031d: SWAP3
0000031e: SWAP2
0000031f: SWAP1
00000320: DUP2
00000321: DUP2
00000322: MSTORE
00000323: PUSH1 0x20
00000325: ADD
00000326: DUP4
00000327: DUP4
00000328: DUP1
00000329: DUP3
0000032a: DUP5
0000032b: CALLDATACOPY
0000032c: POP
0000032d: SWAP5
0000032e: SWAP7
0000032f: POP
00000330: POP
00000331: POP
00000332: POP
00000333: POP
00000334: POP
00000335: POP
00000336: PUSH1 0x00
00000338: PUSH2 0x091e
0000033b: DUP3
0000033c: PUSH2 0x018b
0000033f: JUMP
00000340: JUMPDEST
00000341: PUSH2 0x00a3
00000344: PUSH1 0x04
00000346: DUP1
00000347: DUP1
00000348: CALLDATALOAD
00000349: SWAP1
0000034a: PUSH1 0x20
0000034c: ADD
0000034d: SWAP1
0000034e: DUP3
0000034f: ADD
00000350: DUP1
00000351: CALLDATALOAD
00000352: SWAP1
00000353: PUSH1 0x20
00000355: ADD
00000356: SWAP2
00000357: SWAP2
00000358: SWAP1
00000359: DUP1
0000035a: DUP1
0000035b: PUSH1 0x1f
0000035d: ADD
0000035e: PUSH1 0x20
00000360: DUP1
00000361: SWAP2
00000362: DIV
00000363: MUL
00000364: PUSH1 0x20
00000366: ADD
00000367: PUSH1 0x40
00000369: MLOAD
0000036a: SWAP1
0000036b: DUP2
0000036c: ADD
0000036d: PUSH1 0x40
0000036f: MSTORE
00000370: DUP1
00000371: SWAP4
00000372: SWAP3
00000373: SWAP2
00000374: SWAP1
00000375: DUP2
00000376: DUP2
00000377: MSTORE
00000378: PUSH1 0x20
0000037a: ADD
0000037b: DUP4
0000037c: DUP4
0000037d: DUP1
0000037e: DUP3
0000037f: DUP5
00000380: CALLDATACOPY
00000381: POP
00000382: SWAP5
00000383: SWAP7
00000384: POP
00000385: POP
00000386: SWAP4
00000387: CALLDATALOAD
00000388: SWAP4
00000389: POP
0000038a: POP
0000038b: POP
0000038c: POP
0000038d: DUP2
0000038e: CALLER
0000038f: PUSH1 0x01
00000391: PUSH1 0xa0
00000393: PUSH1 0x02
00000395: EXP
00000396: SUB
00000397: AND
00000398: PUSH2 0x098a
0000039b: DUP3
0000039c: PUSH2 0x018b
0000039f: JUMP
000003a0: JUMPDEST
000003a1: PUSH2 0x00a3
000003a4: PUSH1 0x04
000003a6: DUP1
000003a7: DUP1
000003a8: CALLDATALOAD
000003a9: SWAP1
000003aa: PUSH1 0x20
000003ac: ADD
000003ad: SWAP1
000003ae: DUP3
000003af: ADD
000003b0: DUP1
000003b1: CALLDATALOAD
000003b2: SWAP1
000003b3: PUSH1 0x20
000003b5: ADD
000003b6: SWAP2
000003b7: SWAP2
000003b8: SWAP1
000003b9: DUP1
000003ba: DUP1
000003bb: PUSH1 0x1f
000003bd: ADD
000003be: PUSH1 0x20
000003c0: DUP1
000003c1: SWAP2
000003c2: DIV
000003c3: MUL
000003c4: PUSH1 0x20
000003c6: ADD
000003c7: PUSH1 0x40
000003c9: MLOAD
000003ca: SWAP1
000003cb: DUP2
000003cc: ADD
000003cd: PUSH1 0x40
000003cf: MSTORE
000003d0: DUP1
000003d1: SWAP4
000003d2: SWAP3
000003d3: SWAP2
000003d4: SWAP1
000003d5: DUP2
000003d6: DUP2
000003d7: MSTORE
000003d8: PUSH1 0x20
000003da: ADD
000003db: DUP4
000003dc: DUP4
000003dd: DUP1
000003de: DUP3
000003df: DUP5
000003e0: CALLDATACOPY
000003e1: POP
000003e2: SWAP5
000003e3: SWAP7
000003e4: POP
000003e5: POP
000003e6: POP
000003e7: POP
000003e8: POP
000003e9: POP
000003ea: POP
000003eb: CALLER
000003ec: PUSH1 0x01
000003ee: PUSH1 0xa0
000003f0: PUSH1 0x02
000003f2: EXP
000003f3: SUB
000003f4: AND
000003f5: PUSH2 0x0820
000003f8: DUP3
000003f9: PUSH2 0x018b
000003fc: JUMP
000003fd: JUMPDEST
000003fe: PUSH2 0x00a3
00000401: PUSH1 0x04
00000403: DUP1
00000404: DUP1
00000405: CALLDATALOAD
00000406: SWAP1
00000407: PUSH1 0x20
00000409: ADD
0000040a: SWAP1
0000040b: DUP3
0000040c: ADD
0000040d: DUP1
0000040e: CALLDATALOAD
0000040f: SWAP1
00000410: PUSH1 0x20
00000412: ADD
00000413: SWAP2
00000414: SWAP2
00000415: SWAP1
00000416: DUP1
00000417: DUP1
00000418: PUSH1 0x1f
0000041a: ADD
0000041b: PUSH1 0x20
0000041d: DUP1
0000041e: SWAP2
0000041f: DIV
00000420: MUL
00000421: PUSH1 0x20
00000423: ADD
00000424: PUSH1 0x40
00000426: MLOAD
00000427: SWAP1
00000428: DUP2
00000429: ADD
0000042a: PUSH1 0x40
0000042c: MSTORE
0000042d: DUP1
0000042e: SWAP4
0000042f: SWAP3
00000430: SWAP2
00000431: SWAP1
00000432: DUP2
00000433: DUP2
00000434: MSTORE
00000435: PUSH1 0x20
00000437: ADD
00000438: DUP4
00000439: DUP4
0000043a: DUP1
0000043b: DUP3
0000043c: DUP5
0000043d: CALLDATACOPY
0000043e: POP
0000043f: SWAP5
00000440: SWAP7
00000441: POP
00000442: POP
00000443: SWAP4
00000444: CALLDATALOAD
00000445: SWAP4
00000446: POP
00000447: POP
00000448: POP
00000449: POP
0000044a: DUP2
0000044b: CALLER
0000044c: PUSH1 0x01
0000044e: PUSH1 0xa0
00000450: PUSH1 0x02
00000452: EXP
00000453: SUB
00000454: AND
00000455: PUSH2 0x0792
00000458: DUP3
00000459: PUSH2 0x018b
0000045c: JUMP
0000045d: JUMPDEST
0000045e: PUSH2 0x064f
00000461: PUSH1 0x04
00000463: DUP1
00000464: DUP1
00000465: CALLDATALOAD
00000466: SWAP1
00000467: PUSH1 0x20
00000469: ADD
0000046a: SWAP1
0000046b: DUP3
0000046c: ADD
0000046d: DUP1
0000046e: CALLDATALOAD
0000046f: SWAP1
00000470: PUSH1 0x20
00000472: ADD
00000473: SWAP2
00000474: SWAP2
00000475: SWAP1
00000476: DUP1
00000477: DUP1
00000478: PUSH1 0x1f
0000047a: ADD
0000047b: PUSH1 0x20
0000047d: DUP1
0000047e: SWAP2
0000047f: DIV
00000480: MUL
00000481: PUSH1 0x20
00000483: ADD
00000484: PUSH1 0x40
00000486: MLOAD
00000487: SWAP1
00000488: DUP2
00000489: ADD
0000048a: PUSH1 0x40
0000048c: MSTORE
0000048d: DUP1
0000048e: SWAP4
0000048f: SWAP3
00000490: SWAP2
00000491: SWAP1
00000492: DUP2
00000493: DUP2
00000494: MSTORE
00000495: PUSH1 0x20
00000497: ADD
00000498: DUP4
00000499: DUP4
0000049a: DUP1
0000049b: DUP3
0000049c: DUP5
0000049d: CALLDATACOPY
0000049e: POP
0000049f: SWAP5
000004a0: SWAP7
000004a1: POP
000004a2: POP
000004a3: POP
000004a4: POP
000004a5: POP
000004a6: POP
000004a7: POP
000004a8: PUSH1 0x00
000004aa: PUSH2 0x0787
000004ad: DUP3
000004ae: PUSH2 0x018b
000004b1: JUMP
000004b2: JUMPDEST
000004b3: PUSH2 0x0632
000004b6: PUSH1 0x04
000004b8: DUP1
000004b9: DUP1
000004ba: CALLDATALOAD
000004bb: SWAP1
000004bc: PUSH1 0x20
000004be: ADD
000004bf: SWAP1
000004c0: DUP3
000004c1: ADD
000004c2: DUP1
000004c3: CALLDATALOAD
000004c4: SWAP1
000004c5: PUSH1 0x20
000004c7: ADD
000004c8: SWAP2
000004c9: SWAP2
000004ca: SWAP1
000004cb: DUP1
000004cc: DUP1
000004cd: PUSH1 0x1f
000004cf: ADD
000004d0: PUSH1 0x20
000004d2: DUP1
000004d3: SWAP2
000004d4: DIV
000004d5: MUL
000004d6: PUSH1 0x20
000004d8: ADD
000004d9: PUSH1 0x40
000004db: MLOAD
000004dc: SWAP1
000004dd: DUP2
000004de: ADD
000004df: PUSH1 0x40
000004e1: MSTORE
000004e2: DUP1
000004e3: SWAP4
000004e4: SWAP3
000004e5: SWAP2
000004e6: SWAP1
000004e7: DUP2
000004e8: DUP2
000004e9: MSTORE
000004ea: PUSH1 0x20
000004ec: ADD
000004ed: DUP4
000004ee: DUP4
000004ef: DUP1
000004f0: DUP3
000004f1: DUP5
000004f2: CALLDATACOPY
000004f3: POP
000004f4: SWAP5
000004f5: SWAP7
000004f6: POP
000004f7: POP
000004f8: POP
000004f9: POP
000004fa: POP
000004fb: POP
000004fc: POP
000004fd: PUSH1 0x00
000004ff: PUSH2 0x0a53
00000502: DUP3
00000503: PUSH2 0x018b
00000506: JUMP
00000507: JUMPDEST
00000508: PUSH2 0x0661
0000050b: PUSH1 0x04
0000050d: DUP1
0000050e: DUP1
0000050f: CALLDATALOAD
00000510: SWAP1
00000511: PUSH1 0x20
00000513: ADD
00000514: SWAP1
00000515: DUP3
00000516: ADD
00000517: DUP1
00000518: CALLDATALOAD
00000519: SWAP1
0000051a: PUSH1 0x20
0000051c: ADD
0000051d: SWAP2
0000051e: SWAP2
0000051f: SWAP1
00000520: DUP1
00000521: DUP1
00000522: PUSH1 0x1f
00000524: ADD
00000525: PUSH1 0x20
00000527: DUP1
00000528: SWAP2
00000529: DIV
0000052a: MUL
0000052b: PUSH1 0x20
0000052d: ADD
0000052e: PUSH1 0x40
00000530: MLOAD
00000531: SWAP1
00000532: DUP2
00000533: ADD
00000534: PUSH1 0x40
00000536: MSTORE
00000537: DUP1
00000538: SWAP4
00000539: SWAP3
0000053a: SWAP2
0000053b: SWAP1
0000053c: DUP2
0000053d: DUP2
0000053e: MSTORE
0000053f: PUSH1 0x20
00000541: ADD
00000542: DUP4
00000543: DUP4
00000544: DUP1
00000545: DUP3
00000546: DUP5
00000547: CALLDATACOPY
00000548: POP
00000549: SWAP5
0000054a: SWAP7
0000054b: POP
0000054c: POP
0000054d: POP
0000054e: POP
0000054f: POP
00000550: POP
00000551: POP
00000552: PUSH1 0x00
00000554: PUSH1 0x00
00000556: PUSH1 0x00
00000558: PUSH1 0x00
0000055a: PUSH1 0x00
0000055c: PUSH2 0x0732
0000055f: DUP7
00000560: PUSH2 0x018b
00000563: JUMP
00000564: JUMPDEST
00000565: PUSH2 0x00a3
00000568: PUSH1 0x04
0000056a: DUP1
0000056b: DUP1
0000056c: CALLDATALOAD
0000056d: SWAP1
0000056e: PUSH1 0x20
00000570: ADD
00000571: SWAP1
00000572: DUP3
00000573: ADD
00000574: DUP1
00000575: CALLDATALOAD
00000576: SWAP1
00000577: PUSH1 0x20
00000579: ADD
0000057a: SWAP2
0000057b: SWAP2
0000057c: SWAP1
0000057d: DUP1
0000057e: DUP1
0000057f: PUSH1 0x1f
00000581: ADD
00000582: PUSH1 0x20
00000584: DUP1
00000585: SWAP2
00000586: DIV
00000587: MUL
00000588: PUSH1 0x20
0000058a: ADD
0000058b: PUSH1 0x40
0000058d: MLOAD
0000058e: SWAP1
0000058f: DUP2
00000590: ADD
00000591: PUSH1 0x40
00000593: MSTORE
00000594: DUP1
00000595: SWAP4
00000596: SWAP3
00000597: SWAP2
00000598: SWAP1
00000599: DUP2
0000059a: DUP2
0000059b: MSTORE
0000059c: PUSH1 0x20
0000059e: ADD
0000059f: DUP4
000005a0: DUP4
000005a1: DUP1
000005a2: DUP3
000005a3: DUP5
000005a4: CALLDATACOPY
000005a5: POP
000005a6: SWAP5
000005a7: SWAP7
000005a8: POP
000005a9: POP
000005aa: SWAP4
000005ab: CALLDATALOAD
000005ac: SWAP4
000005ad: POP
000005ae: POP
000005af: POP
000005b0: POP
000005b1: DUP2
000005b2: CALLER
000005b3: PUSH1 0x01
000005b5: PUSH1 0xa0
000005b7: PUSH1 0x02
000005b9: EXP
000005ba: SUB
000005bb: AND
000005bc: PUSH2 0x07e1
000005bf: DUP3
000005c0: PUSH2 0x018b
000005c3: JUMP
000005c4: JUMPDEST
000005c5: PUSH1 0x40
000005c7: MLOAD
000005c8: DUP1
000005c9: DUP1
000005ca: PUSH1 0x20
000005cc: ADD
000005cd: DUP3
000005ce: DUP2
000005cf: SUB
000005d0: DUP3
000005d1: MSTORE
000005d2: DUP4
000005d3: DUP2
000005d4: DUP2
000005d5: MLOAD
000005d6: DUP2
000005d7: MSTORE
000005d8: PUSH1 0x20
000005da: ADD
000005db: SWAP2
000005dc: POP
000005dd: DUP1
000005de: MLOAD
000005df: SWAP1
000005e0: PUSH1 0x20
000005e2: ADD
000005e3: SWAP1
000005e4: DUP1
000005e5: DUP4
000005e6: DUP4
000005e7: DUP3
000005e8: SWAP1
000005e9: PUSH1 0x00
000005eb: PUSH1 0x04
000005ed: PUSH1 0x20
000005ef: DUP5
000005f0: PUSH1 0x1f
000005f2: ADD
000005f3: DIV
000005f4: PUSH1 0x03
000005f6: MUL
000005f7: PUSH1 0x0f
000005f9: ADD
000005fa: CALL
000005fb: POP
000005fc: SWAP1
000005fd: POP
000005fe: SWAP1
000005ff: DUP2
00000600: ADD
00000601: SWAP1
00000602: PUSH1 0x1f
00000604: AND
00000605: DUP1
00000606: ISZERO
00000607: PUSH2 0x0624
0000060a: JUMPI
0000060b: DUP1
0000060c: DUP3
0000060d: SUB
0000060e: DUP1
0000060f: MLOAD
00000610: PUSH1 0x01
00000612: DUP4
00000613: PUSH1 0x20
00000615: SUB
00000616: PUSH2 0x0100
00000619: EXP
0000061a: SUB
0000061b: NOT
0000061c: AND
0000061d: DUP2
0000061e: MSTORE
0000061f: PUSH1 0x20
00000621: ADD
00000622: SWAP2
00000623: POP
00000624: JUMPDEST
00000625: POP
00000626: SWAP3
00000627: POP
00000628: POP
00000629: POP
0000062a: PUSH1 0x40
0000062c: MLOAD
0000062d: DUP1
0000062e: SWAP2
0000062f: SUB
00000630: SWAP1
00000631: RETURN
00000632: JUMPDEST
00000633: PUSH1 0x40
00000635: DUP1
00000636: MLOAD
00000637: PUSH1 0x01
00000639: PUSH1 0xa0
0000063b: PUSH1 0x02
0000063d: EXP
0000063e: SUB
0000063f: SWAP3
00000640: SWAP1
00000641: SWAP3
00000642: AND
00000643: DUP3
00000644: MSTORE
00000645: MLOAD
00000646: SWAP1
00000647: DUP2
00000648: SWAP1
00000649: SUB
0000064a: PUSH1 0x20
0000064c: ADD
0000064d: SWAP1
0000064e: RETURN
0000064f: JUMPDEST
00000650: PUSH1 0x40
00000652: DUP1
00000653: MLOAD
00000654: SWAP2
00000655: DUP3
00000656: MSTORE
00000657: MLOAD
00000658: SWAP1
00000659: DUP2
0000065a: SWAP1
0000065b: SUB
0000065c: PUSH1 0x20
0000065e: ADD
0000065f: SWAP1
00000660: RETURN
00000661: JUMPDEST
00000662: PUSH1 0x40
00000664: DUP1
00000665: MLOAD
00000666: PUSH1 0x01
00000668: PUSH1 0xa0
0000066a: PUSH1 0x02
0000066c: EXP
0000066d: SUB
0000066e: SWAP6
0000066f: DUP7
00000670: AND
00000671: DUP2
00000672: MSTORE
00000673: SWAP4
00000674: DUP6
00000675: AND
00000676: PUSH1 0x20
00000678: DUP6
00000679: ADD
0000067a: MSTORE
0000067b: DUP4
0000067c: DUP2
0000067d: ADD
0000067e: SWAP3
0000067f: SWAP1
00000680: SWAP3
00000681: MSTORE
00000682: SWAP1
00000683: SWAP3
00000684: AND
00000685: PUSH1 0x60
00000687: DUP3
00000688: ADD
00000689: MSTORE
0000068a: SWAP1
0000068b: MLOAD
0000068c: SWAP1
0000068d: DUP2
0000068e: SWAP1
0000068f: SUB
00000690: PUSH1 0x80
00000692: ADD
00000693: SWAP1
00000694: RETURN
00000695: JUMPDEST
00000696: PUSH1 0x03
00000698: ADD
00000699: DUP1
0000069a: SLOAD
0000069b: PUSH1 0x01
0000069d: PUSH1 0xa0
0000069f: PUSH1 0x02
000006a1: EXP
000006a2: SUB
000006a3: NOT
000006a4: AND
000006a5: SWAP1
000006a6: SWAP2
000006a7: OR
000006a8: SWAP1
000006a9: SSTORE
000006aa: PUSH1 0x40
000006ac: MLOAD
000006ad: DUP4
000006ae: SWAP1
000006af: PUSH1 0x00
000006b1: DUP1
000006b2: MLOAD
000006b3: PUSH1 0x20
000006b5: PUSH2 0x0a9e
000006b8: DUP4
000006b9: CODECOPY
000006ba: DUP2
000006bb: MLOAD
000006bc: SWAP2
000006bd: MSTORE
000006be: SWAP1
000006bf: PUSH1 0x00
000006c1: SWAP1
000006c2: LOG2
000006c3: JUMPDEST
000006c4: POP
000006c5: JUMPDEST
000006c6: POP
000006c7: POP
000006c8: JUMP
000006c9: JUMPDEST
000006ca: PUSH1 0x03
000006cc: ADD
000006cd: SLOAD
000006ce: PUSH1 0x01
000006d0: PUSH1 0xa0
000006d2: PUSH1 0x02
000006d4: EXP
000006d5: SUB
000006d6: AND
000006d7: EQ
000006d8: ISZERO
000006d9: PUSH2 0x06c3
000006dc: JUMPI
000006dd: DUP2
000006de: PUSH2 0x0695
000006e1: DUP5
000006e2: PUSH2 0x018b
000006e5: JUMP
000006e6: JUMPDEST
000006e7: PUSH1 0x03
000006e9: ADD
000006ea: SLOAD
000006eb: PUSH1 0x01
000006ed: PUSH1 0xa0
000006ef: PUSH1 0x02
000006f1: EXP
000006f2: SUB
000006f3: AND
000006f4: EQ
000006f5: ISZERO
000006f6: PUSH2 0x06c3
000006f9: JUMPI
000006fa: DUP2
000006fb: PUSH2 0x0703
000006fe: DUP5
000006ff: PUSH2 0x018b
00000702: JUMP
00000703: JUMPDEST
00000704: DUP1
00000705: SLOAD
00000706: PUSH1 0x01
00000708: PUSH1 0xa0
0000070a: PUSH1 0x02
0000070c: EXP
0000070d: SUB
0000070e: NOT
0000070f: AND
00000710: SWAP1
00000711: SWAP2
00000712: OR
00000713: SWAP1
00000714: SSTORE
00000715: PUSH1 0x40
00000717: MLOAD
00000718: DUP4
00000719: SWAP1
0000071a: PUSH1 0x00
0000071c: DUP1
0000071d: MLOAD
0000071e: PUSH1 0x20
00000720: PUSH2 0x0a9e
00000723: DUP4
00000724: CODECOPY
00000725: DUP2
00000726: MLOAD
00000727: SWAP2
00000728: MSTORE
00000729: SWAP1
0000072a: PUSH1 0x00
0000072c: SWAP1
0000072d: LOG2
0000072e: POP
0000072f: POP
00000730: POP
00000731: JUMP
00000732: JUMPDEST
00000733: PUSH1 0x03
00000735: DUP2
00000736: ADD
00000737: SLOAD
00000738: DUP2
00000739: SLOAD
0000073a: PUSH1 0x01
0000073c: DUP4
0000073d: ADD
0000073e: SLOAD
0000073f: PUSH1 0x02
00000741: SWAP4
00000742: SWAP1
00000743: SWAP4
00000744: ADD
00000745: SLOAD
00000746: PUSH1 0x01
00000748: PUSH1 0xa0
0000074a: PUSH1 0x02
0000074c: EXP
0000074d: SUB
0000074e: SWAP2
0000074f: DUP3
00000750: AND
00000751: SWAP11
00000752: SWAP4
00000753: DUP3
00000754: AND
00000755: SWAP10
00000756: POP
00000757: SWAP8
00000758: POP
00000759: AND
0000075a: SWAP5
0000075b: POP
0000075c: SWAP3
0000075d: POP
0000075e: POP
0000075f: POP
00000760: JUMP
00000761: JUMPDEST
00000762: SLOAD
00000763: PUSH1 0x01
00000765: PUSH1 0xa0
00000767: PUSH1 0x02
00000769: EXP
0000076a: SUB
0000076b: AND
0000076c: SWAP1
0000076d: POP
0000076e: JUMPDEST
0000076f: SWAP2
00000770: SWAP1
00000771: POP
00000772: JUMP
00000773: JUMPDEST
00000774: PUSH1 0x01
00000776: ADD
00000777: SLOAD
00000778: PUSH1 0x01
0000077a: PUSH1 0xa0
0000077c: PUSH1 0x02
0000077e: EXP
0000077f: SUB
00000780: AND
00000781: SWAP1
00000782: POP
00000783: PUSH2 0x076e
00000786: JUMP
00000787: JUMPDEST
00000788: PUSH1 0x02
0000078a: ADD
0000078b: SLOAD
0000078c: SWAP1
0000078d: POP
0000078e: PUSH2 0x076e
00000791: JUMP
00000792: JUMPDEST
00000793: PUSH1 0x03
00000795: ADD
00000796: SLOAD
00000797: PUSH1 0x01
00000799: PUSH1 0xa0
0000079b: PUSH1 0x02
0000079d: EXP
0000079e: SUB
0000079f: AND
000007a0: EQ
000007a1: ISZERO
000007a2: PUSH2 0x06c3
000007a5: JUMPI
000007a6: DUP2
000007a7: PUSH2 0x07af
000007aa: DUP5
000007ab: PUSH2 0x018b
000007ae: JUMP
000007af: JUMPDEST
000007b0: PUSH1 0x01
000007b2: ADD
000007b3: DUP1
000007b4: SLOAD
000007b5: PUSH1 0x01
000007b7: PUSH1 0xa0
000007b9: PUSH1 0x02
000007bb: EXP
000007bc: SUB
000007bd: NOT
000007be: AND
000007bf: SWAP1
000007c0: SWAP2
000007c1: OR
000007c2: SWAP1
000007c3: SSTORE
000007c4: PUSH1 0x40
000007c6: MLOAD
000007c7: DUP4
000007c8: SWAP1
000007c9: PUSH1 0x00
000007cb: DUP1
000007cc: MLOAD
000007cd: PUSH1 0x20
000007cf: PUSH2 0x0a9e
000007d2: DUP4
000007d3: CODECOPY
000007d4: DUP2
000007d5: MLOAD
000007d6: SWAP2
000007d7: MSTORE
000007d8: SWAP1
000007d9: PUSH1 0x00
000007db: SWAP1
000007dc: LOG2
000007dd: POP
000007de: POP
000007df: POP
000007e0: JUMP
000007e1: JUMPDEST
000007e2: PUSH1 0x03
000007e4: ADD
000007e5: SLOAD
000007e6: PUSH1 0x01
000007e8: PUSH1 0xa0
000007ea: PUSH1 0x02
000007ec: EXP
000007ed: SUB
000007ee: AND
000007ef: EQ
000007f0: ISZERO
000007f1: PUSH2 0x06c3
000007f4: JUMPI
000007f5: DUP2
000007f6: PUSH2 0x07fe
000007f9: DUP5
000007fa: PUSH2 0x018b
000007fd: JUMP
000007fe: JUMPDEST
000007ff: PUSH1 0x02
00000801: ADD
00000802: SSTORE
00000803: PUSH1 0x40
00000805: MLOAD
00000806: DUP4
00000807: SWAP1
00000808: PUSH1 0x00
0000080a: DUP1
0000080b: MLOAD
0000080c: PUSH1 0x20
0000080e: PUSH2 0x0a9e
00000811: DUP4
00000812: CODECOPY
00000813: DUP2
00000814: MLOAD
00000815: SWAP2
00000816: MSTORE
00000817: SWAP1
00000818: PUSH1 0x00
0000081a: SWAP1
0000081b: LOG2
0000081c: POP
0000081d: POP
0000081e: POP
0000081f: JUMP
00000820: JUMPDEST
00000821: SLOAD
00000822: PUSH1 0x01
00000824: PUSH1 0xa0
00000826: PUSH1 0x02
00000828: EXP
00000829: SUB
0000082a: AND
0000082b: EQ
0000082c: ISZERO
0000082d: PUSH2 0x08e7
00000830: JUMPI
00000831: PUSH1 0x40
00000833: MLOAD
00000834: DUP2
00000835: SWAP1
00000836: PUSH1 0x01
00000838: PUSH1 0xa0
0000083a: PUSH1 0x02
0000083c: EXP
0000083d: SUB
0000083e: CALLER
0000083f: AND
00000840: SWAP1
00000841: PUSH32 0xd31658ff34e42040e5b3559456497d23086d2b4c8ceb1d63798f3dbd3a8e0579
00000862: SWAP1
00000863: PUSH1 0x00
00000865: SWAP1
00000866: LOG3
00000867: DUP1
00000868: PUSH1 0xff
0000086a: PUSH1 0x02
0000086c: EXP
0000086d: PUSH1 0x01
0000086f: PUSH1 0xa0
00000871: PUSH1 0x02
00000873: EXP
00000874: SUB
00000875: CALLER
00000876: AND
00000877: PUSH1 0xa0
00000879: PUSH1 0x02
0000087b: EXP
0000087c: DUP2
0000087d: LT
0000087e: ISZERO
0000087f: PUSH2 0x0002
00000882: JUMPI
00000883: ADD
00000884: PUSH1 0x00
00000886: POP
00000887: SWAP1
00000888: DUP1
00000889: MLOAD
0000088a: SWAP1
0000088b: PUSH1 0x20
0000088d: ADD
0000088e: SWAP1
0000088f: DUP3
00000890: DUP1
00000891: SLOAD
00000892: PUSH1 0x01
00000894: DUP2
00000895: PUSH1 0x01
00000897: AND
00000898: ISZERO
00000899: PUSH2 0x0100
0000089c: MUL
0000089d: SUB
0000089e: AND
0000089f: PUSH1 0x02
000008a1: SWAP1
000008a2: DIV
000008a3: SWAP1
000008a4: PUSH1 0x00
000008a6: MSTORE
000008a7: PUSH1 0x20
000008a9: PUSH1 0x00
000008ab: KECCAK256
000008ac: SWAP1
000008ad: PUSH1 0x1f
000008af: ADD
000008b0: PUSH1 0x20
000008b2: SWAP1
000008b3: DIV
000008b4: DUP2
000008b5: ADD
000008b6: SWAP3
000008b7: DUP3
000008b8: PUSH1 0x1f
000008ba: LT
000008bb: PUSH2 0x08ea
000008be: JUMPI
000008bf: DUP1
000008c0: MLOAD
000008c1: PUSH1 0xff
000008c3: NOT
000008c4: AND
000008c5: DUP4
000008c6: DUP1
000008c7: ADD
000008c8: OR
000008c9: DUP6
000008ca: SSTORE
000008cb: JUMPDEST
000008cc: POP
000008cd: PUSH2 0x06c3
000008d0: SWAP3
000008d1: SWAP2
000008d2: POP
000008d3: JUMPDEST
000008d4: DUP1
000008d5: DUP3
000008d6: GT
000008d7: ISZERO
000008d8: PUSH2 0x091a
000008db: JUMPI
000008dc: PUSH1 0x00
000008de: DUP2
000008df: SSTORE
000008e0: PUSH1 0x01
000008e2: ADD
000008e3: PUSH2 0x08d3
000008e6: JUMP
000008e7: JUMPDEST
000008e8: POP
000008e9: JUMP
000008ea: JUMPDEST
000008eb: DUP3
000008ec: DUP1
000008ed: ADD
000008ee: PUSH1 0x01
000008f0: ADD
000008f1: DUP6
000008f2: SSTORE
000008f3: DUP3
000008f4: ISZERO
000008f5: PUSH2 0x08cb
000008f8: JUMPI
000008f9: SWAP2
000008fa: DUP3
000008fb: ADD
000008fc: JUMPDEST
000008fd: DUP3
000008fe: DUP2
000008ff: GT
00000900: ISZERO
00000901: PUSH2 0x08cb
00000904: JUMPI
00000905: DUP3
00000906: MLOAD
00000907: DUP3
00000908: PUSH1 0x00
0000090a: POP
0000090b: SSTORE
0000090c: SWAP2
0000090d: PUSH1 0x20
0000090f: ADD
00000910: SWAP2
00000911: SWAP1
00000912: PUSH1 0x01
00000914: ADD
00000915: SWAP1
00000916: PUSH2 0x08fc
00000919: JUMP
0000091a: JUMPDEST
0000091b: POP
0000091c: SWAP1
0000091d: JUMP
0000091e: JUMPDEST
0000091f: PUSH1 0x03
00000921: DUP2
00000922: ADD
00000923: SLOAD
00000924: SWAP1
00000925: SWAP2
00000926: POP
00000927: PUSH1 0x01
00000929: PUSH1 0xa0
0000092b: PUSH1 0x02
0000092d: EXP
0000092e: SUB
0000092f: AND
00000930: PUSH1 0x00
00000932: EQ
00000933: DUP1
00000934: ISZERO
00000935: PUSH2 0x0946
00000938: JUMPI
00000939: POP
0000093a: PUSH8 0x4563918244f40000
00000943: CALLVALUE
00000944: LT
00000945: ISZERO
00000946: JUMPDEST
00000947: DUP1
00000948: ISZERO
00000949: PUSH2 0x0954
0000094c: JUMPI
0000094d: POP
0000094e: PUSH1 0x09
00000950: DUP3
00000951: MLOAD
00000952: LT
00000953: ISZERO
00000954: JUMPDEST
00000955: ISZERO
00000956: PUSH2 0x06c5
00000959: JUMPI
0000095a: PUSH1 0x03
0000095c: DUP2
0000095d: ADD
0000095e: DUP1
0000095f: SLOAD
00000960: PUSH1 0x01
00000962: PUSH1 0xa0
00000964: PUSH1 0x02
00000966: EXP
00000967: SUB
00000968: NOT
00000969: AND
0000096a: CALLER
0000096b: OR
0000096c: SWAP1
0000096d: SSTORE
0000096e: PUSH1 0x40
00000970: MLOAD
00000971: DUP3
00000972: SWAP1
00000973: PUSH1 0x00
00000975: DUP1
00000976: MLOAD
00000977: PUSH1 0x20
00000979: PUSH2 0x0a9e
0000097c: DUP4
0000097d: CODECOPY
0000097e: DUP2
0000097f: MLOAD
00000980: SWAP2
00000981: MSTORE
00000982: SWAP1
00000983: PUSH1 0x00
00000985: SWAP1
00000986: LOG2
00000987: POP
00000988: POP
00000989: JUMP
0000098a: JUMPDEST
0000098b: PUSH1 0x03
0000098d: ADD
0000098e: SLOAD
0000098f: PUSH1 0x01
00000991: PUSH1 0xa0
00000993: PUSH1 0x02
00000995: EXP
00000996: SUB
00000997: AND
00000998: EQ
00000999: ISZERO
0000099a: PUSH2 0x06c3
0000099d: JUMPI
0000099e: PUSH1 0x00
000009a0: PUSH1 0x00
000009a2: POP
000009a3: PUSH1 0x08
000009a5: DUP5
000009a6: PUSH1 0x40
000009a8: MLOAD
000009a9: DUP1
000009aa: DUP3
000009ab: DUP1
000009ac: MLOAD
000009ad: SWAP1
000009ae: PUSH1 0x20
000009b0: ADD
000009b1: SWAP1
000009b2: DUP1
000009b3: DUP4
000009b4: DUP4
000009b5: DUP3
000009b6: SWAP1
000009b7: PUSH1 0x00
000009b9: PUSH1 0x04
000009bb: PUSH1 0x20
000009bd: DUP5
000009be: PUSH1 0x1f
000009c0: ADD
000009c1: DIV
000009c2: PUSH1 0x03
000009c4: MUL
000009c5: PUSH1 0x0f
000009c7: ADD
000009c8: CALL
000009c9: POP
000009ca: SWAP1
000009cb: SWAP2
000009cc: ADD
000009cd: DUP3
000009ce: SWAP1
000009cf: SUB
000009d0: SWAP1
000009d1: SWAP2
000009d2: KECCAK256
000009d3: SWAP3
000009d4: SWAP1
000009d5: SWAP3
000009d6: DIV
000009d7: SWAP2
000009d8: POP
000009d9: POP
000009da: PUSH1 0xfd
000009dc: PUSH1 0x02
000009de: EXP
000009df: DUP2
000009e0: LT
000009e1: ISZERO
000009e2: PUSH2 0x0002
000009e5: JUMPI
000009e6: PUSH1 0x04
000009e8: MUL
000009e9: DUP1
000009ea: SLOAD
000009eb: PUSH1 0x01
000009ed: PUSH1 0xa0
000009ef: PUSH1 0x02
000009f1: EXP
000009f2: SUB
000009f3: NOT
000009f4: SWAP1
000009f5: DUP2
000009f6: AND
000009f7: DUP3
000009f8: SSTORE
000009f9: PUSH1 0x01
000009fb: DUP3
000009fc: ADD
000009fd: DUP1
000009fe: SLOAD
000009ff: DUP3
00000a00: AND
00000a01: SWAP1
00000a02: SSTORE
00000a03: PUSH1 0x02
00000a05: DUP3
00000a06: ADD
00000a07: DUP4
00000a08: SWAP1
00000a09: SSTORE
00000a0a: PUSH1 0x03
00000a0c: SWAP2
00000a0d: SWAP1
00000a0e: SWAP2
00000a0f: ADD
00000a10: DUP1
00000a11: SLOAD
00000a12: SWAP1
00000a13: SWAP2
00000a14: AND
00000a15: SWAP1
00000a16: SSTORE
00000a17: PUSH1 0x40
00000a19: MLOAD
00000a1a: PUSH1 0x01
00000a1c: PUSH1 0xa0
00000a1e: PUSH1 0x02
00000a20: EXP
00000a21: SUB
00000a22: DUP5
00000a23: AND
00000a24: SWAP2
00000a25: SWAP1
00000a26: PUSH8 0x4563918244f40000
00000a2f: SWAP1
00000a30: DUP3
00000a31: DUP2
00000a32: DUP2
00000a33: DUP2
00000a34: DUP6
00000a35: DUP9
00000a36: DUP4
00000a37: CALL
00000a38: POP
00000a39: DUP7
00000a3a: SWAP4
00000a3b: POP
00000a3c: PUSH1 0x00
00000a3e: DUP1
00000a3f: MLOAD
00000a40: PUSH1 0x20
00000a42: PUSH2 0x0a9e
00000a45: DUP4
00000a46: CODECOPY
00000a47: DUP2
00000a48: MLOAD
00000a49: SWAP2
00000a4a: MSTORE
00000a4b: SWAP3
00000a4c: SWAP2
00000a4d: POP
00000a4e: LOG2
00000a4f: POP
00000a50: POP
00000a51: POP
00000a52: JUMP
00000a53: JUMPDEST
00000a54: PUSH1 0x03
00000a56: ADD
00000a57: SLOAD
00000a58: PUSH1 0x01
00000a5a: PUSH1 0xa0
00000a5c: PUSH1 0x02
00000a5e: EXP
00000a5f: SUB
00000a60: AND
00000a61: SWAP1
00000a62: POP
00000a63: PUSH2 0x076e
00000a66: JUMP
00000a67: JUMPDEST
00000a68: DUP3
00000a69: ADD
00000a6a: SWAP2
00000a6b: SWAP1
00000a6c: PUSH1 0x00
00000a6e: MSTORE
00000a6f: PUSH1 0x20
00000a71: PUSH1 0x00
00000a73: KECCAK256
00000a74: SWAP1
00000a75: JUMPDEST
00000a76: DUP2
00000a77: SLOAD
00000a78: DUP2
00000a79: MSTORE
00000a7a: SWAP1
00000a7b: PUSH1 0x01
00000a7d: ADD
00000a7e: SWAP1
00000a7f: PUSH1 0x20
00000a81: ADD
00000a82: DUP1
00000a83: DUP4
00000a84: GT
00000a85: PUSH2 0x0a75
00000a88: JUMPI
00000a89: DUP3
00000a8a: SWAP1
00000a8b: SUB
00000a8c: PUSH1 0x1f
00000a8e: AND
00000a8f: DUP3
00000a90: ADD
00000a91: SWAP2
00000a92: JUMPDEST
00000a93: POP
00000a94: POP
00000a95: POP
00000a96: POP
00000a97: POP
00000a98: SWAP1
00000a99: POP
00000a9a: PUSH2 0x076e
00000a9d: JUMP
00000a9e: SHR
00000a9f: UNKNOWN(0xF7)
00000aa0: PUSH6 0x2f1f9289dc41
00000aa7: PUSH23
View stderr
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
high other detector Untrusted CALL target/value reachable 60 yes yes
view
trace_id: 0x1d75af42b2cd4ccf6a86204d2258d3f365baa73f77ebcfc3a310aa3d9863e3d2
call_targets: 0x0000000000000000000000000000000000000004, 0x0e5e2b9341341ade98f510ad9a744e01f3b29f03
target_varies: yes
classification: target_varies
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "confirmed",
    "attempts": 1,
    "trace_id": "0x1d75af42b2cd4ccf6a86204d2258d3f365baa73f77ebcfc3a310aa3d9863e3d2",
    "confirmed": true,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x0000000000000000000000000000000000000004",
        "0x0e5e2b9341341ade98f510ad9a744e01f3b29f03"
    ],
    "matched_probe": null,
    "target_varies": true,
    "classification": "target_varies"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x01984892",
            "selector": "0x01984892",
            "calldata_variants": [
                "0x01984892",
                "0x019848920000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x092b25e9",
            "selector": "0x092b25e9",
            "calldata_variants": [
                "0x092b25e9",
                "0x092b25e90000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x213b9eb8",
            "selector": "0x213b9eb8",
            "calldata_variants": [
                "0x213b9eb8",
                "0x213b9eb80000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x511b1df9",
            "selector": "0x511b1df9",
            "calldata_variants": [
                "0x511b1df9",
                "0x511b1df90000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x7f445c24",
            "selector": "0x7f445c24",
            "calldata_variants": [
                "0x7f445c24",
                "0x7f445c240000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xae999ece",
            "selector": "0xae999ece",
            "calldata_variants": [
                "0xae999ece",
                "0xae999ece0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xb5754045",
            "selector": "0xb5754045",
            "calldata_variants": [
                "0xb5754045",
                "0xb57540450000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xc47f0027",
            "selector": "0xc47f0027",
            "calldata_variants": [
                "0xc47f0027",
                "0xc47f00270000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 1530,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 2504,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "constant_zero",
            "target_expression_category": "computed"
        },
        {
            "pc": 2615,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "call_count": 4,
    "guards_detected": [],
    "untrusted_call_count": 3
}
high other detector ETH value transfer possible 55 yes yes
view
trace_id: 0x1d75af42b2cd4ccf6a86204d2258d3f365baa73f77ebcfc3a310aa3d9863e3d2
call_targets: 0x0000000000000000000000000000000000000004, 0x0e5e2b9341341ade98f510ad9a744e01f3b29f03
target_varies: yes
classification: target_varies
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "confirmed",
    "attempts": 1,
    "trace_id": "0x1d75af42b2cd4ccf6a86204d2258d3f365baa73f77ebcfc3a310aa3d9863e3d2",
    "confirmed": true,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x0000000000000000000000000000000000000004",
        "0x0e5e2b9341341ade98f510ad9a744e01f3b29f03"
    ],
    "matched_probe": null,
    "target_varies": true,
    "classification": "target_varies"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x01984892",
            "selector": "0x01984892",
            "calldata_variants": [
                "0x01984892",
                "0x019848920000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x092b25e9",
            "selector": "0x092b25e9",
            "calldata_variants": [
                "0x092b25e9",
                "0x092b25e90000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x213b9eb8",
            "selector": "0x213b9eb8",
            "calldata_variants": [
                "0x213b9eb8",
                "0x213b9eb80000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x511b1df9",
            "selector": "0x511b1df9",
            "calldata_variants": [
                "0x511b1df9",
                "0x511b1df90000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x7f445c24",
            "selector": "0x7f445c24",
            "calldata_variants": [
                "0x7f445c24",
                "0x7f445c240000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xae999ece",
            "selector": "0xae999ece",
            "calldata_variants": [
                "0xae999ece",
                "0xae999ece0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xb5754045",
            "selector": "0xb5754045",
            "calldata_variants": [
                "0xb5754045",
                "0xb57540450000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xc47f0027",
            "selector": "0xc47f0027",
            "calldata_variants": [
                "0xc47f0027",
                "0xc47f00270000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 1530,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 2615,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "eth_value_calls": 2,
    "guards_detected": []
}
high other codex Payable acquisition path returns success on failed preconditions, trapping ETH 85 no
view
evidence_json
{
    "evidence": "At pc 0x091e-0x0956 the contract loads key+3, checks for zero, compares CALLVALUE to 0x4563918244f40000, and evaluates a length-like bound. Failure jumps to pc 0x06c5/0x06c3, which only unwinds the stack and returns to the dispatcher STOP path; there is no REVERT and no compensating transfer.",
    "locations": [
        "selector:0xae999ece",
        "pc:0x091e",
        "pc:0x0943",
        "pc:0x0956",
        "pc:0x06c5"
    ],
    "recommendation": "Make failed acquisition attempts revert. If the intended behavior is conditional acceptance, explicitly refund msg.value on rejection instead of returning success.",
    "exploit_scenario": "The routine behind selector 0xae999ece appears to be a payable registration/acquisition path. It checks an owner-like slot at key+3, compares CALLVALUE against the embedded constant 0x4563918244f40000 (5 ether), and also checks a length-like value. If any check fails, execution jumps to the shared POP/JUMP return path instead of reverting. An attacker or malicious frontend can deliberately submit already-owned, oversized, or underfunded registrations; the transaction still succeeds and any ETH sent remains in the contract."
}
medium other codex Unchecked 5 ETH external CALL after state mutation can strand refunds 75 no
view
evidence_json
{
    "evidence": "In the 0x098a routine reached from selector 0xb5754045, storage is written at pc 0x09f8, 0x0a02, 0x0a09, and 0x0a16 before a value-bearing CALL at pc 0x0a37. The call embeds the same 5 ether constant 0x4563918244f40000, uses a computed target, and the return value is immediately POP'd rather than checked.",
    "locations": [
        "selector:0xb5754045",
        "pc:0x09f8",
        "pc:0x0a02",
        "pc:0x0a09",
        "pc:0x0a16",
        "pc:0x0a37"
    ],
    "recommendation": "Use a checked CALL and revert on failure, or switch to a pull-payment model where the recipient withdraws separately. If the state must change first, persist a claimable balance instead of assuming the transfer succeeded.",
    "exploit_scenario": "The owner-gated routine behind selector 0xb5754045 appears to clear or rewrite several storage fields for a record and then perform a 5 ETH CALL to a computed recipient. Because the CALL result is discarded, a reverting or non-payable recipient can make the transfer fail while the prior state changes remain committed. If this path is meant to release a deposit or settle a record, the caller can lose the right to retry the refund and the ether stays trapped in the contract."
}