019b3836-2ca8-725b-ba11-1aa47504cf17
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 1961 | artifact.fetch | complete | 1 / 3 | 4 months ago |
| 1962 | tool.cast_disasm | complete | 1 / 3 | 4 months ago |
| 96606 | analysis.bundle | complete | 1 / 3 | 2 weeks ago |
| 96607 | capability.graph | complete | 1 / 3 | 2 weeks ago |
| 96608 | detector.run | complete | 1 / 3 | 2 weeks ago |
| 96609 | validation.fork | complete | 1 / 3 | 2 weeks ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x60 00000002: PUSH1 0x40 00000004: MSTORE 00000005: CALLDATASIZE 00000006: ISZERO 00000007: PUSH2 0x0048 0000000a: JUMPI 0000000b: PUSH1 0x00 0000000d: CALLDATALOAD 0000000e: PUSH29 0x0100000000000000000000000000000000000000000000000000000000 0000002c: SWAP1 0000002d: DIV 0000002e: DUP1 0000002f: PUSH4 0xd59933d5 00000034: EQ 00000035: PUSH2 0x009f 00000038: JUMPI 00000039: DUP1 0000003a: PUSH4 0xfa89401a 0000003f: EQ 00000040: PUSH2 0x00ae 00000043: JUMPI 00000044: PUSH2 0x0048 00000047: JUMP 00000048: JUMPDEST 00000049: PUSH2 0x009d 0000004c: JUMPDEST 0000004d: CALLER 0000004e: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000063: AND 00000064: PUSH32 0xd2c4929d5fb69a8a34683ebdc33aa7071be090d9e8f09132e64ac3192bf8e44d 00000085: CALLVALUE 00000086: PUSH1 0x40 00000088: MLOAD 00000089: DUP1 0000008a: DUP3 0000008b: DUP2 0000008c: MSTORE 0000008d: PUSH1 0x20 0000008f: ADD 00000090: SWAP2 00000091: POP 00000092: POP 00000093: PUSH1 0x40 00000095: MLOAD 00000096: DUP1 00000097: SWAP2 00000098: SUB 00000099: SWAP1 0000009a: LOG2 0000009b: JUMPDEST 0000009c: JUMP 0000009d: JUMPDEST 0000009e: STOP 0000009f: JUMPDEST 000000a0: PUSH2 0x00ac 000000a3: PUSH1 0x04 000000a5: DUP1 000000a6: POP 000000a7: POP 000000a8: PUSH2 0x00c6 000000ab: JUMP 000000ac: JUMPDEST 000000ad: STOP 000000ae: JUMPDEST 000000af: PUSH2 0x00c4 000000b2: PUSH1 0x04 000000b4: DUP1 000000b5: DUP1 000000b6: CALLDATALOAD 000000b7: SWAP1 000000b8: PUSH1 0x20 000000ba: ADD 000000bb: SWAP1 000000bc: SWAP2 000000bd: SWAP1 000000be: POP 000000bf: POP 000000c0: PUSH2 0x0117 000000c3: JUMP 000000c4: JUMPDEST 000000c5: STOP 000000c6: JUMPDEST 000000c7: CALLER 000000c8: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 000000dd: AND 000000de: PUSH32 0xd2c4929d5fb69a8a34683ebdc33aa7071be090d9e8f09132e64ac3192bf8e44d 000000ff: CALLVALUE 00000100: PUSH1 0x40 00000102: MLOAD 00000103: DUP1 00000104: DUP3 00000105: DUP2 00000106: MSTORE 00000107: PUSH1 0x20 00000109: ADD 0000010a: SWAP2 0000010b: POP 0000010c: POP 0000010d: PUSH1 0x40 0000010f: MLOAD 00000110: DUP1 00000111: SWAP2 00000112: SUB 00000113: SWAP1 00000114: LOG2 00000115: JUMPDEST 00000116: JUMP 00000117: JUMPDEST 00000118: PUSH1 0x00 0000011a: PUSH1 0x00 0000011c: SWAP1 0000011d: SLOAD 0000011e: SWAP1 0000011f: PUSH2 0x0100 00000122: EXP 00000123: SWAP1 00000124: DIV 00000125: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 0000013a: AND 0000013b: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000150: AND 00000151: CALLER 00000152: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000167: AND 00000168: EQ 00000169: ISZERO 0000016a: PUSH2 0x0186 0000016d: JUMPI 0000016e: DUP1 0000016f: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000184: AND 00000185: SELFDESTRUCT 00000186: JUMPDEST 00000187: JUMPDEST 00000188: POP 00000189: JUMP
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| medium | other | detector | SELFDESTRUCT reachable | 45 | no | no |
viewtrace_id: 0x3f8061affecae9cbad6f244ac81a462b30c1b12f6cee5b85f5fdc69ceb7b8868
validation_json{
"sink": "SELFDESTRUCT",
"errors": 0,
"status": "unknown",
"attempts": 4,
"trace_id": "0x3f8061affecae9cbad6f244ac81a462b30c1b12f6cee5b85f5fdc69ceb7b8868",
"confirmed": false,
"trace_mode": "structLogs",
"call_targets": null,
"matched_probe": null,
"target_varies": null,
"classification": "no_sink"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0xd59933d5",
"selector": "0xd59933d5",
"calldata_variants": [
"0xd59933d5",
"0xd59933d50000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0xfa89401a",
"selector": "0xfa89401a",
"calldata_variants": [
"0xfa89401a",
"0xfa89401a0000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"guards_detected": [
{
"pc": 337,
"type": "msg_sender_eq_const",
"value": "0xffffffffffffffffffffffffffffffffffffffff"
}
],
"selfdestruct_count": 1
}
|