019b3836-2ea0-723f-ab6d-947fbdda05be
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 2305 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 2306 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 45496 | analysis.bundle | complete | 1 / 3 | 2 weeks ago |
| 45497 | capability.graph | complete | 1 / 3 | 2 weeks ago |
| 45498 | detector.run | complete | 1 / 3 | 2 weeks ago |
| 45499 | validation.fork | complete | 1 / 3 | 2 weeks ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x60 00000002: PUSH1 0x40 00000004: MSTORE 00000005: CALLDATASIZE 00000006: ISZERO 00000007: PUSH2 0x0048 0000000a: JUMPI 0000000b: PUSH1 0x00 0000000d: CALLDATALOAD 0000000e: PUSH29 0x0100000000000000000000000000000000000000000000000000000000 0000002c: SWAP1 0000002d: DIV 0000002e: DUP1 0000002f: PUSH4 0x232a3060 00000034: EQ 00000035: PUSH2 0x0059 00000038: JUMPI 00000039: DUP1 0000003a: PUSH4 0x3ca7255b 0000003f: EQ 00000040: PUSH2 0x0071 00000043: JUMPI 00000044: PUSH2 0x0048 00000047: JUMP 00000048: JUMPDEST 00000049: PUSH2 0x0057 0000004c: JUMPDEST 0000004d: PUSH2 0x0054 00000050: PUSH2 0x00af 00000053: JUMP 00000054: JUMPDEST 00000055: JUMPDEST 00000056: JUMP 00000057: JUMPDEST 00000058: STOP 00000059: JUMPDEST 0000005a: PUSH2 0x006f 0000005d: PUSH1 0x04 0000005f: DUP1 00000060: DUP1 00000061: CALLDATALOAD 00000062: SWAP1 00000063: PUSH1 0x20 00000065: ADD 00000066: SWAP1 00000067: SWAP2 00000068: SWAP1 00000069: POP 0000006a: POP 0000006b: PUSH2 0x0080 0000006e: JUMP 0000006f: JUMPDEST 00000070: STOP 00000071: JUMPDEST 00000072: PUSH2 0x007e 00000075: PUSH1 0x04 00000077: DUP1 00000078: POP 00000079: POP 0000007a: PUSH2 0x00af 0000007d: JUMP 0000007e: JUMPDEST 0000007f: STOP 00000080: JUMPDEST 00000081: DUP1 00000082: PUSH1 0x00 00000084: PUSH1 0x00 00000086: PUSH2 0x0100 00000089: EXP 0000008a: DUP2 0000008b: SLOAD 0000008c: DUP2 0000008d: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 000000a2: MUL 000000a3: NOT 000000a4: AND 000000a5: SWAP1 000000a6: DUP4 000000a7: MUL 000000a8: OR 000000a9: SWAP1 000000aa: SSTORE 000000ab: POP 000000ac: JUMPDEST 000000ad: POP 000000ae: JUMP 000000af: JUMPDEST 000000b0: PUSH1 0x00 000000b2: PUSH1 0x00 000000b4: SWAP1 000000b5: SLOAD 000000b6: SWAP1 000000b7: PUSH2 0x0100 000000ba: EXP 000000bb: SWAP1 000000bc: DIV 000000bd: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 000000d2: AND 000000d3: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 000000e8: AND 000000e9: PUSH1 0x00 000000eb: ADDRESS 000000ec: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000101: AND 00000102: BALANCE 00000103: PUSH1 0x40 00000105: MLOAD 00000106: DUP1 00000107: SWAP1 00000108: POP 00000109: PUSH1 0x00 0000010b: PUSH1 0x40 0000010d: MLOAD 0000010e: DUP1 0000010f: DUP4 00000110: SUB 00000111: DUP2 00000112: DUP6 00000113: DUP9 00000114: DUP9 00000115: CALL 00000116: SWAP4 00000117: POP 00000118: POP 00000119: POP 0000011a: POP 0000011b: POP 0000011c: JUMPDEST 0000011d: JUMP
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| high | other | detector | Untrusted CALL target/value reachable | 60 | no | no |
viewtrace_id: 0x9c74c71050d79fa1b78dcdb02747046a7a58c17244b7c07be9d1ef76886dcfa5
call_targets:
0xab5d3342331bcfd42af08ada299e3ddacf91d966
target_varies:
no
classification:
constant_target
validation_json{
"sink": "CALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x9c74c71050d79fa1b78dcdb02747046a7a58c17244b7c07be9d1ef76886dcfa5",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0xab5d3342331bcfd42af08ada299e3ddacf91d966"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x232a3060",
"selector": "0x232a3060",
"calldata_variants": [
"0x232a3060",
"0x232a30600000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x3ca7255b",
"selector": "0x3ca7255b",
"calldata_variants": [
"0x3ca7255b",
"0x3ca7255b0000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 277,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"call_count": 1,
"guards_detected": [],
"untrusted_call_count": 1
}
|
| high | other | detector | ETH value transfer possible | 55 | no | no |
viewtrace_id: 0x9c74c71050d79fa1b78dcdb02747046a7a58c17244b7c07be9d1ef76886dcfa5
call_targets:
0xab5d3342331bcfd42af08ada299e3ddacf91d966
target_varies:
no
classification:
constant_target
validation_json{
"sink": "CALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x9c74c71050d79fa1b78dcdb02747046a7a58c17244b7c07be9d1ef76886dcfa5",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0xab5d3342331bcfd42af08ada299e3ddacf91d966"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x232a3060",
"selector": "0x232a3060",
"calldata_variants": [
"0x232a3060",
"0x232a30600000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x3ca7255b",
"selector": "0x3ca7255b",
"calldata_variants": [
"0x3ca7255b",
"0x3ca7255b0000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 277,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"eth_value_calls": 1,
"guards_detected": []
}
|