TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

019b3836-286e-7252-b417-1ad650dfac72

complete
Chain ID
1
Address
Block Number
Created
Fri, Dec 19, 2025 8:03 PM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
0
Validated
0
Source
Bytecode only
Review Backing
Not yet
Best current signal
Untrusted CALL target/value reachable
crit 0 high 0 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
1255 artifact.fetch complete 1 / 3 4 months ago
1256 tool.cast_disasm complete 1 / 3 4 months ago
78931 analysis.bundle complete 1 / 3 2 weeks ago
78932 capability.graph complete 1 / 3 2 weeks ago
78933 detector.run complete 1 / 3 2 weeks ago
78934 validation.fork complete 1 / 3 2 weeks ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no
Implementation:
Verified Source: no

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate

No codex job recorded yet.

Opcode Heuristics

tool.cast_disasm
Delegatecall
0
Selfdestruct
0
CREATE2
0
CALL-family (heavy)
2
EXT*/BALANCE
0
Total opcodes
429
Flags
No heuristic flags raised.
View cast disassembly output
00000000: PUSH1 0x60
00000002: PUSH1 0x40
00000004: MSTORE
00000005: PUSH1 0x00
00000007: CALLDATALOAD
00000008: PUSH29 0x0100000000000000000000000000000000000000000000000000000000
00000026: SWAP1
00000027: DIV
00000028: DUP1
00000029: PUSH4 0x4777a690
0000002e: EQ
0000002f: PUSH2 0x0044
00000032: JUMPI
00000033: DUP1
00000034: PUSH4 0xb4b03291
00000039: EQ
0000003a: PUSH2 0x005c
0000003d: JUMPI
0000003e: PUSH2 0x0042
00000041: JUMP
00000042: JUMPDEST
00000043: STOP
00000044: JUMPDEST
00000045: PUSH2 0x005a
00000048: PUSH1 0x04
0000004a: DUP1
0000004b: DUP1
0000004c: CALLDATALOAD
0000004d: SWAP1
0000004e: PUSH1 0x20
00000050: ADD
00000051: SWAP1
00000052: SWAP2
00000053: SWAP1
00000054: POP
00000055: POP
00000056: PUSH2 0x006b
00000059: JUMP
0000005a: JUMPDEST
0000005b: STOP
0000005c: JUMPDEST
0000005d: PUSH2 0x0069
00000060: PUSH1 0x04
00000062: DUP1
00000063: POP
00000064: POP
00000065: PUSH2 0x01fc
00000068: JUMP
00000069: JUMPDEST
0000006a: STOP
0000006b: JUMPDEST
0000006c: DUP1
0000006d: PUSH1 0x14
0000006f: PUSH1 0x00
00000071: POP
00000072: PUSH1 0x00
00000074: ADD
00000075: PUSH1 0x00
00000077: POP
00000078: DUP2
00000079: SWAP1
0000007a: SSTORE
0000007b: POP
0000007c: CALLER
0000007d: PUSH1 0x14
0000007f: PUSH1 0x00
00000081: POP
00000082: PUSH1 0x01
00000084: ADD
00000085: PUSH1 0x00
00000087: PUSH2 0x0100
0000008a: EXP
0000008b: DUP2
0000008c: SLOAD
0000008d: DUP2
0000008e: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000000a3: MUL
000000a4: NOT
000000a5: AND
000000a6: SWAP1
000000a7: DUP4
000000a8: MUL
000000a9: OR
000000aa: SWAP1
000000ab: SSTORE
000000ac: POP
000000ad: TIMESTAMP
000000ae: PUSH1 0x07
000000b0: PUSH1 0x00
000000b2: POP
000000b3: PUSH1 0x07
000000b5: ADD
000000b6: PUSH1 0x00
000000b8: POP
000000b9: DUP2
000000ba: SWAP1
000000bb: SSTORE
000000bc: POP
000000bd: PUSH1 0x01
000000bf: PUSH1 0x07
000000c1: PUSH1 0x00
000000c3: POP
000000c4: PUSH1 0x0c
000000c6: ADD
000000c7: PUSH1 0x00
000000c9: PUSH2 0x0100
000000cc: EXP
000000cd: DUP2
000000ce: SLOAD
000000cf: DUP2
000000d0: PUSH1 0xff
000000d2: MUL
000000d3: NOT
000000d4: AND
000000d5: SWAP1
000000d6: DUP4
000000d7: MUL
000000d8: OR
000000d9: SWAP1
000000da: SSTORE
000000db: POP
000000dc: PUSH32 0x480a49e25d25add91b670f5620e2882f03d8d9ecc18e0d20deba7baa5a15dc83
000000fd: PUSH1 0x00
000000ff: PUSH1 0x00
00000101: POP
00000102: PUSH1 0x06
00000104: ADD
00000105: PUSH1 0x00
00000107: SWAP1
00000108: SLOAD
00000109: SWAP1
0000010a: PUSH2 0x0100
0000010d: EXP
0000010e: SWAP1
0000010f: DIV
00000110: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000125: AND
00000126: PUSH1 0x14
00000128: PUSH1 0x00
0000012a: POP
0000012b: PUSH1 0x01
0000012d: ADD
0000012e: PUSH1 0x00
00000130: SWAP1
00000131: SLOAD
00000132: SWAP1
00000133: PUSH2 0x0100
00000136: EXP
00000137: SWAP1
00000138: DIV
00000139: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000014e: AND
0000014f: PUSH1 0x40
00000151: MLOAD
00000152: DUP1
00000153: DUP1
00000154: PUSH1 0x20
00000156: ADD
00000157: DUP5
00000158: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000016d: AND
0000016e: DUP2
0000016f: MSTORE
00000170: PUSH1 0x20
00000172: ADD
00000173: DUP4
00000174: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000189: AND
0000018a: DUP2
0000018b: MSTORE
0000018c: PUSH1 0x20
0000018e: ADD
0000018f: DUP3
00000190: DUP2
00000191: SUB
00000192: DUP3
00000193: MSTORE
00000194: PUSH1 0x22
00000196: DUP2
00000197: MSTORE
00000198: PUSH1 0x20
0000019a: ADD
0000019b: DUP1
0000019c: PUSH32 0x4e65772041677265656d656e74206265747765656e2074776f20506172746965
000001bd: DUP2
000001be: MSTORE
000001bf: PUSH1 0x20
000001c1: ADD
000001c2: PUSH32 0x7321000000000000000000000000000000000000000000000000000000000000
000001e3: DUP2
000001e4: MSTORE
000001e5: PUSH1 0x20
000001e7: ADD
000001e8: POP
000001e9: PUSH1 0x40
000001eb: ADD
000001ec: SWAP4
000001ed: POP
000001ee: POP
000001ef: POP
000001f0: POP
000001f1: PUSH1 0x40
000001f3: MLOAD
000001f4: DUP1
000001f5: SWAP2
000001f6: SUB
000001f7: SWAP1
000001f8: LOG1
000001f9: JUMPDEST
000001fa: POP
000001fb: JUMP
000001fc: JUMPDEST
000001fd: PUSH1 0x00
000001ff: PUSH1 0x00
00000201: PUSH1 0x00
00000203: PUSH1 0x07
00000205: PUSH1 0x00
00000207: POP
00000208: PUSH1 0x08
0000020a: ADD
0000020b: PUSH1 0x00
0000020d: POP
0000020e: SLOAD
0000020f: TIMESTAMP
00000210: SUB
00000211: SWAP3
00000212: POP
00000213: PUSH3 0x015180
00000217: SWAP2
00000218: POP
00000219: PUSH1 0x00
0000021b: SWAP1
0000021c: POP
0000021d: DUP2
0000021e: DUP4
0000021f: LT
00000220: ISZERO
00000221: ISZERO
00000222: PUSH2 0x022d
00000225: JUMPI
00000226: DUP2
00000227: DUP4
00000228: DIV
00000229: SWAP1
0000022a: POP
0000022b: DUP1
0000022c: POP
0000022d: JUMPDEST
0000022e: PUSH2 0x0236
00000231: DUP2
00000232: PUSH2 0x023c
00000235: JUMP
00000236: JUMPDEST
00000237: JUMPDEST
00000238: POP
00000239: POP
0000023a: POP
0000023b: JUMP
0000023c: JUMPDEST
0000023d: PUSH1 0x00
0000023f: PUSH1 0x00
00000241: PUSH1 0x07
00000243: PUSH1 0x00
00000245: POP
00000246: PUSH1 0x0a
00000248: ADD
00000249: PUSH1 0x00
0000024b: POP
0000024c: SLOAD
0000024d: DUP4
0000024e: MUL
0000024f: SWAP2
00000250: POP
00000251: DUP2
00000252: PUSH1 0x07
00000254: PUSH1 0x00
00000256: POP
00000257: PUSH1 0x09
00000259: ADD
0000025a: PUSH1 0x00
0000025c: POP
0000025d: SLOAD
0000025e: SUB
0000025f: SWAP1
00000260: POP
00000261: PUSH1 0x14
00000263: PUSH1 0x00
00000265: POP
00000266: PUSH1 0x01
00000268: ADD
00000269: PUSH1 0x00
0000026b: SWAP1
0000026c: SLOAD
0000026d: SWAP1
0000026e: PUSH2 0x0100
00000271: EXP
00000272: SWAP1
00000273: DIV
00000274: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000289: AND
0000028a: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000029f: AND
000002a0: PUSH1 0x00
000002a2: DUP3
000002a3: PUSH1 0x40
000002a5: MLOAD
000002a6: DUP1
000002a7: SWAP1
000002a8: POP
000002a9: PUSH1 0x00
000002ab: PUSH1 0x40
000002ad: MLOAD
000002ae: DUP1
000002af: DUP4
000002b0: SUB
000002b1: DUP2
000002b2: DUP6
000002b3: DUP9
000002b4: DUP9
000002b5: CALL
000002b6: SWAP4
000002b7: POP
000002b8: POP
000002b9: POP
000002ba: POP
000002bb: POP
000002bc: PUSH1 0x00
000002be: PUSH1 0x00
000002c0: POP
000002c1: PUSH1 0x06
000002c3: ADD
000002c4: PUSH1 0x00
000002c6: SWAP1
000002c7: SLOAD
000002c8: SWAP1
000002c9: PUSH2 0x0100
000002cc: EXP
000002cd: SWAP1
000002ce: DIV
000002cf: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000002e4: AND
000002e5: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000002fa: AND
000002fb: PUSH1 0x00
000002fd: PUSH1 0x07
000002ff: PUSH1 0x00
00000301: POP
00000302: PUSH1 0x09
00000304: ADD
00000305: PUSH1 0x00
00000307: POP
00000308: SLOAD
00000309: PUSH1 0x40
0000030b: MLOAD
0000030c: DUP1
0000030d: SWAP1
0000030e: POP
0000030f: PUSH1 0x00
00000311: PUSH1 0x40
00000313: MLOAD
00000314: DUP1
00000315: DUP4
00000316: SUB
00000317: DUP2
00000318: DUP6
00000319: DUP9
0000031a: DUP9
0000031b: CALL
0000031c: SWAP4
0000031d: POP
0000031e: POP
0000031f: POP
00000320: POP
00000321: POP
00000322: PUSH32 0x449613e8af41dc5f5546b1c7b862563f0d300711e776eb318d16fdc9db19d8fc
00000343: DUP2
00000344: DUP4
00000345: PUSH1 0x40
00000347: MLOAD
00000348: DUP1
00000349: DUP1
0000034a: PUSH1 0x20
0000034c: ADD
0000034d: DUP5
0000034e: DUP2
0000034f: MSTORE
00000350: PUSH1 0x20
00000352: ADD
00000353: DUP4
00000354: DUP2
00000355: MSTORE
00000356: PUSH1 0x20
00000358: ADD
00000359: DUP3
0000035a: DUP2
0000035b: SUB
0000035c: DUP3
0000035d: MSTORE
0000035e: PUSH1 0x11
00000360: DUP2
00000361: MSTORE
00000362: PUSH1 0x20
00000364: ADD
00000365: DUP1
00000366: PUSH32 0x5061796d656e742072656c656173656421000000000000000000000000000000
00000387: DUP2
00000388: MSTORE
00000389: PUSH1 0x20
0000038b: ADD
0000038c: POP
0000038d: PUSH1 0x20
0000038f: ADD
00000390: SWAP4
00000391: POP
00000392: POP
00000393: POP
00000394: POP
00000395: PUSH1 0x40
00000397: MLOAD
00000398: DUP1
00000399: SWAP2
0000039a: SUB
0000039b: SWAP1
0000039c: LOG1
0000039d: JUMPDEST
0000039e: POP
0000039f: POP
000003a0: POP
000003a1: JUMP
View stderr
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
high other detector Untrusted CALL target/value reachable 60 no no
view
trace_id: 0x11d899ea552d9b3ed5dbc71e79195caf1380997ec4c63ca051cb4a4f15c1b568
call_targets: 0x51c51eb9aa66579a5b8ca4abf8321b5bd63cdfbd
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0x11d899ea552d9b3ed5dbc71e79195caf1380997ec4c63ca051cb4a4f15c1b568",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x51c51eb9aa66579a5b8ca4abf8321b5bd63cdfbd"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x4777a690",
            "selector": "0x4777a690",
            "calldata_variants": [
                "0x4777a690",
                "0x4777a6900000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xb4b03291",
            "selector": "0xb4b03291",
            "calldata_variants": [
                "0xb4b03291",
                "0xb4b032910000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 693,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 795,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "call_count": 2,
    "guards_detected": [],
    "untrusted_call_count": 2
}
high other detector ETH value transfer possible 55 no no
view
trace_id: 0x11d899ea552d9b3ed5dbc71e79195caf1380997ec4c63ca051cb4a4f15c1b568
call_targets: 0x51c51eb9aa66579a5b8ca4abf8321b5bd63cdfbd
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0x11d899ea552d9b3ed5dbc71e79195caf1380997ec4c63ca051cb4a4f15c1b568",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x51c51eb9aa66579a5b8ca4abf8321b5bd63cdfbd"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x4777a690",
            "selector": "0x4777a690",
            "calldata_variants": [
                "0x4777a690",
                "0x4777a6900000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xb4b03291",
            "selector": "0xb4b03291",
            "calldata_variants": [
                "0xb4b03291",
                "0xb4b032910000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 693,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 795,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "eth_value_calls": 2,
    "guards_detected": []
}