TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

019b3836-3530-7036-8735-c24a4b50043e

complete
Chain ID
1
Address
Block Number
Created
Fri, Dec 19, 2025 8:03 PM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
0
Validated
0
Source
Bytecode only
Review Backing
Not yet
Best current signal
ETH value transfer possible
crit 0 high 0 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
3383 artifact.fetch complete 1 / 3 3 months ago
3384 tool.cast_disasm complete 1 / 3 3 months ago
46628 analysis.bundle complete 1 / 3 2 weeks ago
46629 capability.graph complete 1 / 3 2 weeks ago
46630 detector.run complete 1 / 3 2 weeks ago
46631 validation.fork complete 1 / 3 2 weeks ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no
Implementation:
Verified Source: no

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate

No codex job recorded yet.

Opcode Heuristics

tool.cast_disasm
Delegatecall
0
Selfdestruct
0
CREATE2
0
CALL-family (heavy)
1
EXT*/BALANCE
0
Total opcodes
275
Flags
No heuristic flags raised.
View cast disassembly output
00000000: PUSH1 0x60
00000002: PUSH1 0x40
00000004: MSTORE
00000005: CALLDATASIZE
00000006: ISZERO
00000007: PUSH2 0x0035
0000000a: JUMPI
0000000b: PUSH1 0xe0
0000000d: PUSH1 0x02
0000000f: EXP
00000010: PUSH1 0x00
00000012: CALLDATALOAD
00000013: DIV
00000014: PUSH4 0x7a060d8e
00000019: DUP2
0000001a: EQ
0000001b: PUSH2 0x00ac
0000001e: JUMPI
0000001f: DUP1
00000020: PUSH4 0xc3883785
00000025: EQ
00000026: PUSH2 0x00cc
00000029: JUMPI
0000002a: DUP1
0000002b: PUSH4 0xdb5b3eea
00000030: EQ
00000031: PUSH2 0x0111
00000034: JUMPI
00000035: JUMPDEST
00000036: PUSH2 0x0176
00000039: PUSH1 0x00
0000003b: DUP1
0000003c: SLOAD
0000003d: CALLVALUE
0000003e: DIV
0000003f: JUMPDEST
00000040: PUSH1 0x00
00000042: SLOAD
00000043: PUSH1 0xff
00000045: DUP4
00000046: AND
00000047: LT
00000048: ISZERO
00000049: PUSH2 0x0178
0000004c: JUMPI
0000004d: PUSH1 0x00
0000004f: DUP1
00000050: SLOAD
00000051: DUP4
00000052: SWAP1
00000053: DUP2
00000054: LT
00000055: ISZERO
00000056: PUSH2 0x0002
00000059: JUMPI
0000005a: DUP2
0000005b: DUP1
0000005c: MSTORE
0000005d: PUSH32 0x290decd9548b62a8d60345a988386fc84ba6bc95484008f6362f93160ef3e563
0000007e: ADD
0000007f: SLOAD
00000080: PUSH1 0x40
00000082: MLOAD
00000083: PUSH1 0x01
00000085: PUSH1 0xa0
00000087: PUSH1 0x02
00000089: EXP
0000008a: SUB
0000008b: SWAP2
0000008c: SWAP1
0000008d: SWAP2
0000008e: AND
0000008f: SWAP2
00000090: SWAP1
00000091: DUP4
00000092: SWAP1
00000093: DUP3
00000094: DUP2
00000095: DUP2
00000096: DUP2
00000097: DUP6
00000098: DUP9
00000099: DUP4
0000009a: CALL
0000009b: POP
0000009c: POP
0000009d: POP
0000009e: PUSH1 0x01
000000a0: SWAP4
000000a1: SWAP1
000000a2: SWAP4
000000a3: ADD
000000a4: SWAP3
000000a5: POP
000000a6: PUSH2 0x003f
000000a9: SWAP1
000000aa: POP
000000ab: JUMP
000000ac: JUMPDEST
000000ad: PUSH2 0x0176
000000b0: PUSH2 0x0199
000000b3: PUSH20 0xd42b20bd0311608b66f8a6d15b2a95e6de27c5bf
000000c8: PUSH2 0x0118
000000cb: JUMP
000000cc: JUMPDEST
000000cd: PUSH2 0x017c
000000d0: PUSH1 0x04
000000d2: CALLDATALOAD
000000d3: PUSH1 0x00
000000d5: DUP1
000000d6: SLOAD
000000d7: DUP3
000000d8: SWAP1
000000d9: DUP2
000000da: LT
000000db: ISZERO
000000dc: PUSH2 0x0002
000000df: JUMPI
000000e0: POP
000000e1: DUP1
000000e2: MSTORE
000000e3: PUSH32 0x290decd9548b62a8d60345a988386fc84ba6bc95484008f6362f93160ef3e563
00000104: ADD
00000105: SLOAD
00000106: PUSH1 0x01
00000108: PUSH1 0xa0
0000010a: PUSH1 0x02
0000010c: EXP
0000010d: SUB
0000010e: AND
0000010f: DUP2
00000110: JUMP
00000111: JUMPDEST
00000112: PUSH2 0x0176
00000115: PUSH1 0x04
00000117: CALLDATALOAD
00000118: JUMPDEST
00000119: PUSH1 0x00
0000011b: DUP1
0000011c: SLOAD
0000011d: PUSH1 0x01
0000011f: DUP2
00000120: ADD
00000121: DUP1
00000122: DUP4
00000123: SSTORE
00000124: DUP4
00000125: SWAP3
00000126: SWAP2
00000127: SWAP1
00000128: DUP3
00000129: SWAP1
0000012a: DUP3
0000012b: DUP1
0000012c: ISZERO
0000012d: DUP3
0000012e: SWAP1
0000012f: GT
00000130: PUSH2 0x020f
00000133: JUMPI
00000134: DUP3
00000135: DUP1
00000136: MSTORE
00000137: PUSH2 0x020f
0000013a: SWAP1
0000013b: PUSH32 0x290decd9548b62a8d60345a988386fc84ba6bc95484008f6362f93160ef3e563
0000015c: SWAP1
0000015d: DUP2
0000015e: ADD
0000015f: SWAP1
00000160: DUP4
00000161: ADD
00000162: JUMPDEST
00000163: DUP1
00000164: DUP3
00000165: GT
00000166: ISZERO
00000167: PUSH2 0x0248
0000016a: JUMPI
0000016b: PUSH1 0x00
0000016d: DUP2
0000016e: SSTORE
0000016f: PUSH1 0x01
00000171: ADD
00000172: PUSH2 0x0162
00000175: JUMP
00000176: JUMPDEST
00000177: STOP
00000178: JUMPDEST
00000179: POP
0000017a: POP
0000017b: JUMP
0000017c: JUMPDEST
0000017d: PUSH1 0x40
0000017f: DUP1
00000180: MLOAD
00000181: PUSH1 0x01
00000183: PUSH1 0xa0
00000185: PUSH1 0x02
00000187: EXP
00000188: SUB
00000189: SWAP3
0000018a: SWAP1
0000018b: SWAP3
0000018c: AND
0000018d: DUP3
0000018e: MSTORE
0000018f: MLOAD
00000190: SWAP1
00000191: DUP2
00000192: SWAP1
00000193: SUB
00000194: PUSH1 0x20
00000196: ADD
00000197: SWAP1
00000198: RETURN
00000199: JUMPDEST
0000019a: PUSH2 0x01b6
0000019d: PUSH20 0x9dd46b1c6d3f05e29e9c6f037eed9a595af4a9aa
000001b2: PUSH2 0x0118
000001b5: JUMP
000001b6: JUMPDEST
000001b7: PUSH2 0x01d3
000001ba: PUSH20 0xd42b20bd0311608b66f8a6d15b2a95e6de27c5bf
000001cf: PUSH2 0x0118
000001d2: JUMP
000001d3: JUMPDEST
000001d4: PUSH2 0x01f0
000001d7: PUSH20 0xc7e56a369f1e778501fd748df1ca2f3f86965abb
000001ec: PUSH2 0x0118
000001ef: JUMP
000001f0: JUMPDEST
000001f1: PUSH2 0x020d
000001f4: PUSH20 0xca9dc3f33d0e1c3975300d1dcdf114b9e9c305e8
00000209: PUSH2 0x0118
0000020c: JUMP
0000020d: JUMPDEST
0000020e: JUMP
0000020f: JUMPDEST
00000210: POP
00000211: POP
00000212: POP
00000213: DUP2
00000214: SLOAD
00000215: DUP2
00000216: LT
00000217: ISZERO
00000218: PUSH2 0x0002
0000021b: JUMPI
0000021c: PUSH1 0x00
0000021e: SWAP2
0000021f: DUP3
00000220: MSTORE
00000221: PUSH1 0x20
00000223: SWAP1
00000224: SWAP2
00000225: KECCAK256
00000226: ADD
00000227: DUP1
00000228: SLOAD
00000229: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000023e: NOT
0000023f: AND
00000240: SWAP2
00000241: SWAP1
00000242: SWAP2
00000243: OR
00000244: SWAP1
00000245: SSTORE
00000246: POP
00000247: JUMP
00000248: JUMPDEST
00000249: POP
0000024a: SWAP1
0000024b: JUMP
View stderr
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
high other detector ETH value transfer possible 55 no no
view
trace_id: 0x0fee54ec59f0102f908272a057581abb3279848028475636e426e46ed2a4dc27
call_targets: 0xe2bf4a8076aa218de75c6d3191c0eb3cacd6a0f5
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0x0fee54ec59f0102f908272a057581abb3279848028475636e426e46ed2a4dc27",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0xe2bf4a8076aa218de75c6d3191c0eb3cacd6a0f5"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x7a060d8e",
            "selector": "0x7a060d8e",
            "calldata_variants": [
                "0x7a060d8e",
                "0x7a060d8e0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xc3883785",
            "selector": "0xc3883785",
            "calldata_variants": [
                "0xc3883785",
                "0xc38837850000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xdb5b3eea",
            "selector": "0xdb5b3eea",
            "calldata_variants": [
                "0xdb5b3eea",
                "0xdb5b3eea0000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 154,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "eth_value_calls": 1,
    "guards_detected": []
}
high other detector Untrusted CALL target/value reachable 60 no no
view
trace_id: 0x0fee54ec59f0102f908272a057581abb3279848028475636e426e46ed2a4dc27
call_targets: 0xe2bf4a8076aa218de75c6d3191c0eb3cacd6a0f5
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0x0fee54ec59f0102f908272a057581abb3279848028475636e426e46ed2a4dc27",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0xe2bf4a8076aa218de75c6d3191c0eb3cacd6a0f5"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x7a060d8e",
            "selector": "0x7a060d8e",
            "calldata_variants": [
                "0x7a060d8e",
                "0x7a060d8e0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xc3883785",
            "selector": "0xc3883785",
            "calldata_variants": [
                "0xc3883785",
                "0xc38837850000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xdb5b3eea",
            "selector": "0xdb5b3eea",
            "calldata_variants": [
                "0xdb5b3eea",
                "0xdb5b3eea0000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 154,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "call_count": 1,
    "guards_detected": [],
    "untrusted_call_count": 1
}