019b3836-3b59-7373-9144-806083104cb3
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 4379 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 4380 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 47304 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 47305 | capability.graph | complete | 1 / 3 | 1 week ago |
| 47306 | detector.run | complete | 1 / 3 | 1 week ago |
| 47307 | validation.fork | complete | 1 / 3 | 1 week ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x60 00000002: PUSH1 0x40 00000004: MSTORE 00000005: CALLDATASIZE 00000006: ISZERO 00000007: PUSH1 0x31 00000009: JUMPI 0000000a: PUSH1 0xe0 0000000c: PUSH1 0x02 0000000e: EXP 0000000f: PUSH1 0x00 00000011: CALLDATALOAD 00000012: DIV 00000013: PUSH4 0x38af3eed 00000018: DUP2 00000019: EQ 0000001a: PUSH1 0x39 0000001c: JUMPI 0000001d: DUP1 0000001e: PUSH4 0x4c77a10f 00000023: EQ 00000024: PUSH1 0x4a 00000026: JUMPI 00000027: DUP1 00000028: PUSH4 0x69d89575 0000002d: EQ 0000002e: PUSH1 0x52 00000030: JUMPI 00000031: JUMPDEST 00000032: PUSH1 0x75 00000034: PUSH1 0x73 00000036: PUSH1 0x55 00000038: JUMP 00000039: JUMPDEST 0000003a: PUSH1 0x77 0000003c: PUSH1 0x00 0000003e: SLOAD 0000003f: PUSH1 0x01 00000041: PUSH1 0xa0 00000043: PUSH1 0x02 00000045: EXP 00000046: SUB 00000047: AND 00000048: DUP2 00000049: JUMP 0000004a: JUMPDEST 0000004b: PUSH1 0x94 0000004d: PUSH1 0x01 0000004f: SLOAD 00000050: DUP2 00000051: JUMP 00000052: JUMPDEST 00000053: PUSH1 0x75 00000055: JUMPDEST 00000056: ADDRESS 00000057: PUSH1 0x01 00000059: PUSH1 0xa0 0000005b: PUSH1 0x02 0000005d: EXP 0000005e: SUB 0000005f: AND 00000060: BALANCE 00000061: PUSH1 0x00 00000063: EQ 00000064: DUP1 00000065: PUSH1 0x6e 00000067: JUMPI 00000068: POP 00000069: PUSH1 0x01 0000006b: SLOAD 0000006c: NUMBER 0000006d: LT 0000006e: JUMPDEST 0000006f: ISZERO 00000070: PUSH1 0xa6 00000072: JUMPI 00000073: JUMPDEST 00000074: JUMP 00000075: JUMPDEST 00000076: STOP 00000077: JUMPDEST 00000078: PUSH1 0x40 0000007a: DUP1 0000007b: MLOAD 0000007c: PUSH1 0x01 0000007e: PUSH1 0xa0 00000080: PUSH1 0x02 00000082: EXP 00000083: SUB 00000084: SWAP3 00000085: SWAP1 00000086: SWAP3 00000087: AND 00000088: DUP3 00000089: MSTORE 0000008a: MLOAD 0000008b: SWAP1 0000008c: DUP2 0000008d: SWAP1 0000008e: SUB 0000008f: PUSH1 0x20 00000091: ADD 00000092: SWAP1 00000093: RETURN 00000094: JUMPDEST 00000095: PUSH1 0x40 00000097: DUP1 00000098: MLOAD 00000099: SWAP2 0000009a: DUP3 0000009b: MSTORE 0000009c: MLOAD 0000009d: SWAP1 0000009e: DUP2 0000009f: SWAP1 000000a0: SUB 000000a1: PUSH1 0x20 000000a3: ADD 000000a4: SWAP1 000000a5: RETURN 000000a6: JUMPDEST 000000a7: PUSH1 0x00 000000a9: DUP1 000000aa: SLOAD 000000ab: PUSH1 0x40 000000ad: MLOAD 000000ae: PUSH1 0x01 000000b0: PUSH1 0xa0 000000b2: PUSH1 0x02 000000b4: EXP 000000b5: SUB 000000b6: SWAP2 000000b7: DUP3 000000b8: AND 000000b9: SWAP3 000000ba: SWAP2 000000bb: ADDRESS 000000bc: AND 000000bd: BALANCE 000000be: SWAP1 000000bf: DUP3 000000c0: DUP2 000000c1: DUP2 000000c2: DUP2 000000c3: DUP6 000000c4: DUP9 000000c5: DUP4 000000c6: CALL 000000c7: POP 000000c8: POP 000000c9: POP 000000ca: POP 000000cb: POP 000000cc: JUMP
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| high | other | detector | Untrusted CALL target/value reachable | 60 | no | no |
viewtrace_id: 0x17e20716b77292ffb5d490ce10735e9d1b95459d76633e053d211cc1ca2b197f
call_targets:
0x626d20dae530f3fc35ab28d39d917596c75bdf85
target_varies:
no
classification:
constant_target
validation_json{
"sink": "CALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x17e20716b77292ffb5d490ce10735e9d1b95459d76633e053d211cc1ca2b197f",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x626d20dae530f3fc35ab28d39d917596c75bdf85"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x38af3eed",
"selector": "0x38af3eed",
"calldata_variants": [
"0x38af3eed",
"0x38af3eed0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x4c77a10f",
"selector": "0x4c77a10f",
"calldata_variants": [
"0x4c77a10f",
"0x4c77a10f0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x69d89575",
"selector": "0x69d89575",
"calldata_variants": [
"0x69d89575",
"0x69d895750000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 198,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"call_count": 1,
"guards_detected": [],
"untrusted_call_count": 1
}
|
| high | other | detector | ETH value transfer possible | 55 | no | no |
viewtrace_id: 0x17e20716b77292ffb5d490ce10735e9d1b95459d76633e053d211cc1ca2b197f
call_targets:
0x626d20dae530f3fc35ab28d39d917596c75bdf85
target_varies:
no
classification:
constant_target
validation_json{
"sink": "CALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x17e20716b77292ffb5d490ce10735e9d1b95459d76633e053d211cc1ca2b197f",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x626d20dae530f3fc35ab28d39d917596c75bdf85"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x38af3eed",
"selector": "0x38af3eed",
"calldata_variants": [
"0x38af3eed",
"0x38af3eed0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x4c77a10f",
"selector": "0x4c77a10f",
"calldata_variants": [
"0x4c77a10f",
"0x4c77a10f0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x69d89575",
"selector": "0x69d89575",
"calldata_variants": [
"0x69d89575",
"0x69d895750000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 198,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"eth_value_calls": 1,
"guards_detected": []
}
|