019b3836-36c4-7290-8500-196453854451
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 3649 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 3650 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 105061 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 105062 | capability.graph | complete | 1 / 3 | 1 week ago |
| 105063 | detector.run | complete | 1 / 3 | 1 week ago |
| 105064 | validation.fork | complete | 1 / 3 | 1 week ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x60 00000002: PUSH1 0x40 00000004: MSTORE 00000005: CALLDATASIZE 00000006: ISZERO 00000007: PUSH1 0x27 00000009: JUMPI 0000000a: PUSH1 0xe0 0000000c: PUSH1 0x02 0000000e: EXP 0000000f: PUSH1 0x00 00000011: CALLDATALOAD 00000012: DIV 00000013: PUSH4 0x0e6c5f93 00000018: DUP2 00000019: EQ 0000001a: PUSH1 0x2d 0000001c: JUMPI 0000001d: DUP1 0000001e: PUSH4 0xf6fba66d 00000023: EQ 00000024: PUSH1 0x82 00000026: JUMPI 00000027: JUMPDEST 00000028: PUSH1 0xbc 0000002a: PUSH1 0x02 0000002c: JUMP 0000002d: JUMPDEST 0000002e: PUSH1 0xbc 00000030: PUSH1 0x04 00000032: CALLDATALOAD 00000033: CALLER 00000034: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000049: AND 0000004a: PUSH1 0x00 0000004c: SWAP1 0000004d: DUP2 0000004e: MSTORE 0000004f: PUSH1 0x01 00000051: PUSH1 0x20 00000053: MSTORE 00000054: PUSH1 0x40 00000056: SWAP1 00000057: KECCAK256 00000058: SLOAD 00000059: PUSH1 0xff 0000005b: AND 0000005c: ISZERO 0000005d: PUSH1 0x7f 0000005f: JUMPI 00000060: PUSH1 0x00 00000062: DUP1 00000063: SLOAD 00000064: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000079: NOT 0000007a: AND 0000007b: DUP3 0000007c: OR 0000007d: SWAP1 0000007e: SSTORE 0000007f: JUMPDEST 00000080: POP 00000081: JUMP 00000082: JUMPDEST 00000083: PUSH1 0xbc 00000085: PUSH1 0x04 00000087: CALLDATALOAD 00000088: DUP1 00000089: CALLVALUE 0000008a: GT 0000008b: ISZERO 0000008c: PUSH1 0x7f 0000008e: JUMPI 0000008f: PUSH1 0x00 00000091: DUP1 00000092: SLOAD 00000093: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 000000a8: AND 000000a9: SWAP1 000000aa: DUP3 000000ab: PUSH1 0x60 000000ad: DUP3 000000ae: DUP2 000000af: DUP2 000000b0: DUP2 000000b1: DUP6 000000b2: DUP9 000000b3: DUP4 000000b4: CALL 000000b5: POP 000000b6: POP 000000b7: POP 000000b8: POP 000000b9: POP 000000ba: POP 000000bb: JUMP 000000bc: JUMPDEST 000000bd: STOP
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| high | other | detector | Untrusted CALL target/value reachable | 60 | no | no |
viewtrace_id: 0x4ce4c4dae798b73f440d1834aa1aa8c13edc0cac471d9be22429343001e6e9af
call_targets:
0x30f10b3dd91de781323536370a9a9ba464cf6604
target_varies:
no
classification:
constant_target
validation_json{
"sink": "CALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x4ce4c4dae798b73f440d1834aa1aa8c13edc0cac471d9be22429343001e6e9af",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x30f10b3dd91de781323536370a9a9ba464cf6604"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x0e6c5f93",
"selector": "0x0e6c5f93",
"calldata_variants": [
"0x0e6c5f93",
"0x0e6c5f930000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0xf6fba66d",
"selector": "0xf6fba66d",
"calldata_variants": [
"0xf6fba66d",
"0xf6fba66d0000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 180,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"call_count": 1,
"guards_detected": [],
"untrusted_call_count": 1
}
|
| high | other | detector | ETH value transfer possible | 55 | no | no |
viewtrace_id: 0x4ce4c4dae798b73f440d1834aa1aa8c13edc0cac471d9be22429343001e6e9af
call_targets:
0x30f10b3dd91de781323536370a9a9ba464cf6604
target_varies:
no
classification:
constant_target
validation_json{
"sink": "CALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x4ce4c4dae798b73f440d1834aa1aa8c13edc0cac471d9be22429343001e6e9af",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x30f10b3dd91de781323536370a9a9ba464cf6604"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x0e6c5f93",
"selector": "0x0e6c5f93",
"calldata_variants": [
"0x0e6c5f93",
"0x0e6c5f930000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0xf6fba66d",
"selector": "0xf6fba66d",
"calldata_variants": [
"0xf6fba66d",
"0xf6fba66d0000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 180,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"eth_value_calls": 1,
"guards_detected": []
}
|