TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

019b3836-2d5a-725c-bd58-ea65be1a3f6a

complete
Chain ID
1
Address
Block Number
Created
Fri, Dec 19, 2025 8:03 PM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
0
Validated
0
Source
Bytecode only
Review Backing
Not yet
Best current signal
SELFDESTRUCT reachable
crit 0 high 0 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
2083 artifact.fetch complete 1 / 3 3 months ago
2084 tool.cast_disasm complete 1 / 3 3 months ago
45316 analysis.bundle complete 1 / 3 2 weeks ago
45317 capability.graph complete 1 / 3 2 weeks ago
45318 detector.run complete 1 / 3 2 weeks ago
45319 validation.fork complete 1 / 3 2 weeks ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no
Implementation:
Verified Source: no

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate

No codex job recorded yet.

Opcode Heuristics

tool.cast_disasm
Delegatecall
0
Selfdestruct
1
CREATE2
0
CALL-family (heavy)
0
EXT*/BALANCE
0
Total opcodes
165
Flags
selfdestruct_present
View cast disassembly output
00000000: PUSH1 0x60
00000002: PUSH1 0x40
00000004: MSTORE
00000005: CALLDATASIZE
00000006: ISZERO
00000007: PUSH2 0x0048
0000000a: JUMPI
0000000b: PUSH1 0x00
0000000d: CALLDATALOAD
0000000e: PUSH29 0x0100000000000000000000000000000000000000000000000000000000
0000002c: SWAP1
0000002d: DIV
0000002e: DUP1
0000002f: PUSH4 0xd59933d5
00000034: EQ
00000035: PUSH2 0x00af
00000038: JUMPI
00000039: DUP1
0000003a: PUSH4 0xfa89401a
0000003f: EQ
00000040: PUSH2 0x00be
00000043: JUMPI
00000044: PUSH2 0x0048
00000047: JUMP
00000048: JUMPDEST
00000049: PUSH2 0x00ad
0000004c: JUMPDEST
0000004d: NUMBER
0000004e: PUSH32 0x5d6ac9b7defd8fbb29ef2ab0f08c3744192b3777466dd98d1fd7daed5064b6db
0000006f: CALLER
00000070: CALLVALUE
00000071: TIMESTAMP
00000072: PUSH1 0x40
00000074: MLOAD
00000075: DUP1
00000076: DUP5
00000077: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000008c: AND
0000008d: DUP2
0000008e: MSTORE
0000008f: PUSH1 0x20
00000091: ADD
00000092: DUP4
00000093: DUP2
00000094: MSTORE
00000095: PUSH1 0x20
00000097: ADD
00000098: DUP3
00000099: DUP2
0000009a: MSTORE
0000009b: PUSH1 0x20
0000009d: ADD
0000009e: SWAP4
0000009f: POP
000000a0: POP
000000a1: POP
000000a2: POP
000000a3: PUSH1 0x40
000000a5: MLOAD
000000a6: DUP1
000000a7: SWAP2
000000a8: SUB
000000a9: SWAP1
000000aa: LOG2
000000ab: JUMPDEST
000000ac: JUMP
000000ad: JUMPDEST
000000ae: STOP
000000af: JUMPDEST
000000b0: PUSH2 0x00bc
000000b3: PUSH1 0x04
000000b5: DUP1
000000b6: POP
000000b7: POP
000000b8: PUSH2 0x00d6
000000bb: JUMP
000000bc: JUMPDEST
000000bd: STOP
000000be: JUMPDEST
000000bf: PUSH2 0x00d4
000000c2: PUSH1 0x04
000000c4: DUP1
000000c5: DUP1
000000c6: CALLDATALOAD
000000c7: SWAP1
000000c8: PUSH1 0x20
000000ca: ADD
000000cb: SWAP1
000000cc: SWAP2
000000cd: SWAP1
000000ce: POP
000000cf: POP
000000d0: PUSH2 0x0137
000000d3: JUMP
000000d4: JUMPDEST
000000d5: STOP
000000d6: JUMPDEST
000000d7: NUMBER
000000d8: PUSH32 0x5d6ac9b7defd8fbb29ef2ab0f08c3744192b3777466dd98d1fd7daed5064b6db
000000f9: CALLER
000000fa: CALLVALUE
000000fb: TIMESTAMP
000000fc: PUSH1 0x40
000000fe: MLOAD
000000ff: DUP1
00000100: DUP5
00000101: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000116: AND
00000117: DUP2
00000118: MSTORE
00000119: PUSH1 0x20
0000011b: ADD
0000011c: DUP4
0000011d: DUP2
0000011e: MSTORE
0000011f: PUSH1 0x20
00000121: ADD
00000122: DUP3
00000123: DUP2
00000124: MSTORE
00000125: PUSH1 0x20
00000127: ADD
00000128: SWAP4
00000129: POP
0000012a: POP
0000012b: POP
0000012c: POP
0000012d: PUSH1 0x40
0000012f: MLOAD
00000130: DUP1
00000131: SWAP2
00000132: SUB
00000133: SWAP1
00000134: LOG2
00000135: JUMPDEST
00000136: JUMP
00000137: JUMPDEST
00000138: PUSH1 0x00
0000013a: PUSH1 0x00
0000013c: SWAP1
0000013d: SLOAD
0000013e: SWAP1
0000013f: PUSH2 0x0100
00000142: EXP
00000143: SWAP1
00000144: DIV
00000145: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000015a: AND
0000015b: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000170: AND
00000171: CALLER
00000172: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000187: AND
00000188: EQ
00000189: ISZERO
0000018a: PUSH2 0x01a6
0000018d: JUMPI
0000018e: DUP1
0000018f: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000001a4: AND
000001a5: SELFDESTRUCT
000001a6: JUMPDEST
000001a7: JUMPDEST
000001a8: POP
000001a9: JUMP
View stderr
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
medium other detector SELFDESTRUCT reachable 45 no no
view
trace_id: 0xd03b1b907176f703f4cc59539f6e940baba8645713a3f7c6f5a1c8b7c5b4421f
validation_json
{
    "sink": "SELFDESTRUCT",
    "errors": 0,
    "status": "unknown",
    "attempts": 4,
    "trace_id": "0xd03b1b907176f703f4cc59539f6e940baba8645713a3f7c6f5a1c8b7c5b4421f",
    "confirmed": false,
    "trace_mode": "structLogs",
    "call_targets": null,
    "matched_probe": null,
    "target_varies": null,
    "classification": "no_sink"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0xd59933d5",
            "selector": "0xd59933d5",
            "calldata_variants": [
                "0xd59933d5",
                "0xd59933d50000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xfa89401a",
            "selector": "0xfa89401a",
            "calldata_variants": [
                "0xfa89401a",
                "0xfa89401a0000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "guards_detected": [
        {
            "pc": 369,
            "type": "msg_sender_eq_const",
            "value": "0xffffffffffffffffffffffffffffffffffffffff"
        }
    ],
    "selfdestruct_count": 1
}