TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

019b3836-2ca8-725b-ba11-1aa47504cf17

complete
Chain ID
1
Address
Block Number
Created
Fri, Dec 19, 2025 8:03 PM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
0
Validated
0
Source
Bytecode only
Review Backing
Not yet
Best current signal
SELFDESTRUCT reachable
crit 0 high 0 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
1961 artifact.fetch complete 1 / 3 4 months ago
1962 tool.cast_disasm complete 1 / 3 4 months ago
96606 analysis.bundle complete 1 / 3 2 weeks ago
96607 capability.graph complete 1 / 3 2 weeks ago
96608 detector.run complete 1 / 3 2 weeks ago
96609 validation.fork complete 1 / 3 2 weeks ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no
Implementation:
Verified Source: no

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate

No codex job recorded yet.

Opcode Heuristics

tool.cast_disasm
Delegatecall
0
Selfdestruct
1
CREATE2
0
CALL-family (heavy)
0
EXT*/BALANCE
0
Total opcodes
137
Flags
selfdestruct_present
View cast disassembly output
00000000: PUSH1 0x60
00000002: PUSH1 0x40
00000004: MSTORE
00000005: CALLDATASIZE
00000006: ISZERO
00000007: PUSH2 0x0048
0000000a: JUMPI
0000000b: PUSH1 0x00
0000000d: CALLDATALOAD
0000000e: PUSH29 0x0100000000000000000000000000000000000000000000000000000000
0000002c: SWAP1
0000002d: DIV
0000002e: DUP1
0000002f: PUSH4 0xd59933d5
00000034: EQ
00000035: PUSH2 0x009f
00000038: JUMPI
00000039: DUP1
0000003a: PUSH4 0xfa89401a
0000003f: EQ
00000040: PUSH2 0x00ae
00000043: JUMPI
00000044: PUSH2 0x0048
00000047: JUMP
00000048: JUMPDEST
00000049: PUSH2 0x009d
0000004c: JUMPDEST
0000004d: CALLER
0000004e: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000063: AND
00000064: PUSH32 0xd2c4929d5fb69a8a34683ebdc33aa7071be090d9e8f09132e64ac3192bf8e44d
00000085: CALLVALUE
00000086: PUSH1 0x40
00000088: MLOAD
00000089: DUP1
0000008a: DUP3
0000008b: DUP2
0000008c: MSTORE
0000008d: PUSH1 0x20
0000008f: ADD
00000090: SWAP2
00000091: POP
00000092: POP
00000093: PUSH1 0x40
00000095: MLOAD
00000096: DUP1
00000097: SWAP2
00000098: SUB
00000099: SWAP1
0000009a: LOG2
0000009b: JUMPDEST
0000009c: JUMP
0000009d: JUMPDEST
0000009e: STOP
0000009f: JUMPDEST
000000a0: PUSH2 0x00ac
000000a3: PUSH1 0x04
000000a5: DUP1
000000a6: POP
000000a7: POP
000000a8: PUSH2 0x00c6
000000ab: JUMP
000000ac: JUMPDEST
000000ad: STOP
000000ae: JUMPDEST
000000af: PUSH2 0x00c4
000000b2: PUSH1 0x04
000000b4: DUP1
000000b5: DUP1
000000b6: CALLDATALOAD
000000b7: SWAP1
000000b8: PUSH1 0x20
000000ba: ADD
000000bb: SWAP1
000000bc: SWAP2
000000bd: SWAP1
000000be: POP
000000bf: POP
000000c0: PUSH2 0x0117
000000c3: JUMP
000000c4: JUMPDEST
000000c5: STOP
000000c6: JUMPDEST
000000c7: CALLER
000000c8: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000000dd: AND
000000de: PUSH32 0xd2c4929d5fb69a8a34683ebdc33aa7071be090d9e8f09132e64ac3192bf8e44d
000000ff: CALLVALUE
00000100: PUSH1 0x40
00000102: MLOAD
00000103: DUP1
00000104: DUP3
00000105: DUP2
00000106: MSTORE
00000107: PUSH1 0x20
00000109: ADD
0000010a: SWAP2
0000010b: POP
0000010c: POP
0000010d: PUSH1 0x40
0000010f: MLOAD
00000110: DUP1
00000111: SWAP2
00000112: SUB
00000113: SWAP1
00000114: LOG2
00000115: JUMPDEST
00000116: JUMP
00000117: JUMPDEST
00000118: PUSH1 0x00
0000011a: PUSH1 0x00
0000011c: SWAP1
0000011d: SLOAD
0000011e: SWAP1
0000011f: PUSH2 0x0100
00000122: EXP
00000123: SWAP1
00000124: DIV
00000125: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000013a: AND
0000013b: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000150: AND
00000151: CALLER
00000152: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000167: AND
00000168: EQ
00000169: ISZERO
0000016a: PUSH2 0x0186
0000016d: JUMPI
0000016e: DUP1
0000016f: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000184: AND
00000185: SELFDESTRUCT
00000186: JUMPDEST
00000187: JUMPDEST
00000188: POP
00000189: JUMP
View stderr
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
medium other detector SELFDESTRUCT reachable 45 no no
view
trace_id: 0x3f8061affecae9cbad6f244ac81a462b30c1b12f6cee5b85f5fdc69ceb7b8868
validation_json
{
    "sink": "SELFDESTRUCT",
    "errors": 0,
    "status": "unknown",
    "attempts": 4,
    "trace_id": "0x3f8061affecae9cbad6f244ac81a462b30c1b12f6cee5b85f5fdc69ceb7b8868",
    "confirmed": false,
    "trace_mode": "structLogs",
    "call_targets": null,
    "matched_probe": null,
    "target_varies": null,
    "classification": "no_sink"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0xd59933d5",
            "selector": "0xd59933d5",
            "calldata_variants": [
                "0xd59933d5",
                "0xd59933d50000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xfa89401a",
            "selector": "0xfa89401a",
            "calldata_variants": [
                "0xfa89401a",
                "0xfa89401a0000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "guards_detected": [
        {
            "pc": 337,
            "type": "msg_sender_eq_const",
            "value": "0xffffffffffffffffffffffffffffffffffffffff"
        }
    ],
    "selfdestruct_count": 1
}