019b3836-2602-700a-a118-da6b170dc12c
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 859 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 860 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 96250 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 96251 | capability.graph | complete | 1 / 3 | 1 week ago |
| 96252 | detector.run | complete | 1 / 3 | 1 week ago |
| 96253 | validation.fork | complete | 1 / 3 | 1 week ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x60 00000002: PUSH1 0x40 00000004: MSTORE 00000005: PUSH1 0xe0 00000007: PUSH1 0x02 00000009: EXP 0000000a: PUSH1 0x00 0000000c: CALLDATALOAD 0000000d: DIV 0000000e: PUSH4 0x60fe47b1 00000013: DUP2 00000014: EQ 00000015: PUSH1 0x24 00000017: JUMPI 00000018: DUP1 00000019: PUSH4 0xc3da42b8 0000001e: EQ 0000001f: PUSH1 0x2e 00000021: JUMPI 00000022: JUMPDEST 00000023: STOP 00000024: JUMPDEST 00000025: PUSH1 0x04 00000027: CALLDATALOAD 00000028: PUSH1 0x00 0000002a: SSTORE 0000002b: PUSH1 0x22 0000002d: JUMP 0000002e: JUMPDEST 0000002f: PUSH1 0x22 00000031: PUSH1 0x01 00000033: DUP1 00000034: SLOAD 00000035: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 0000004a: NOT 0000004b: AND 0000004c: PUSH20 0x245133ea0fb1b77fab5886d7ffb8046dfeff3858 00000061: OR 00000062: SWAP1 00000063: SSTORE 00000064: PUSH1 0x00 00000066: SLOAD 00000067: PUSH1 0x64 00000069: EQ 0000006a: ISZERO 0000006b: PUSH1 0xc9 0000006d: JUMPI 0000006e: PUSH1 0x01 00000070: PUSH1 0x00 00000072: SWAP1 00000073: SLOAD 00000074: SWAP1 00000075: PUSH2 0x0100 00000078: EXP 00000079: SWAP1 0000007a: DIV 0000007b: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000090: AND 00000091: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 000000a6: AND 000000a7: PUSH1 0x00 000000a9: PUSH7 0x038d7ea4c68000 000000b1: PUSH1 0x40 000000b3: MLOAD 000000b4: DUP1 000000b5: SWAP1 000000b6: POP 000000b7: PUSH1 0x00 000000b9: PUSH1 0x40 000000bb: MLOAD 000000bc: DUP1 000000bd: DUP4 000000be: SUB 000000bf: DUP2 000000c0: DUP6 000000c1: DUP9 000000c2: DUP9 000000c3: CALL 000000c4: POP 000000c5: POP 000000c6: POP 000000c7: POP 000000c8: POP 000000c9: JUMPDEST 000000ca: JUMP
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| high | other | detector | Untrusted CALL target/value reachable | 60 | no | no |
viewtrace_id: 0x02d8a63e59b7fe311c106c50f334db259418c9c02aada86d57ebaf53b484f5ce
call_targets:
0xf1d66776cf780810946df5d64d5c575b8937969a
target_varies:
no
classification:
constant_target
validation_json{
"sink": "CALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x02d8a63e59b7fe311c106c50f334db259418c9c02aada86d57ebaf53b484f5ce",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0xf1d66776cf780810946df5d64d5c575b8937969a"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x60fe47b1",
"selector": "0x60fe47b1",
"calldata_variants": [
"0x60fe47b1",
"0x60fe47b10000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0xc3da42b8",
"selector": "0xc3da42b8",
"calldata_variants": [
"0xc3da42b8",
"0xc3da42b80000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 195,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"call_count": 1,
"guards_detected": [],
"untrusted_call_count": 1
}
|
| high | other | detector | ETH value transfer possible | 55 | no | no |
viewtrace_id: 0x02d8a63e59b7fe311c106c50f334db259418c9c02aada86d57ebaf53b484f5ce
call_targets:
0xf1d66776cf780810946df5d64d5c575b8937969a
target_varies:
no
classification:
constant_target
validation_json{
"sink": "CALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x02d8a63e59b7fe311c106c50f334db259418c9c02aada86d57ebaf53b484f5ce",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0xf1d66776cf780810946df5d64d5c575b8937969a"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x60fe47b1",
"selector": "0x60fe47b1",
"calldata_variants": [
"0x60fe47b1",
"0x60fe47b10000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0xc3da42b8",
"selector": "0xc3da42b8",
"calldata_variants": [
"0xc3da42b8",
"0xc3da42b80000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 195,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"eth_value_calls": 1,
"guards_detected": []
}
|