TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

019b3836-3f47-736f-bb96-48c4ab13770c

complete
Chain ID
1
Address
Block Number
Created
Fri, Dec 19, 2025 8:03 PM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
0
Validated
0
Source
Bytecode only
Review Backing
Not yet
Best current signal
Untrusted CALL target/value reachable
crit 0 high 0 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
5023 artifact.fetch complete 1 / 3 4 months ago
5024 tool.cast_disasm complete 1 / 3 4 months ago
80487 analysis.bundle complete 1 / 3 2 weeks ago
80488 capability.graph complete 1 / 3 2 weeks ago
80489 detector.run complete 1 / 3 2 weeks ago
80490 validation.fork complete 1 / 3 2 weeks ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no
Implementation:
Verified Source: no

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate

No codex job recorded yet.

Opcode Heuristics

tool.cast_disasm
Delegatecall
0
Selfdestruct
0
CREATE2
0
CALL-family (heavy)
3
EXT*/BALANCE
1
Total opcodes
117
Flags
No heuristic flags raised.
View cast disassembly output
00000000: PUSH1 0x60
00000002: PUSH1 0x40
00000004: MSTORE
00000005: CALLDATASIZE
00000006: ISZERO
00000007: PUSH2 0x001f
0000000a: JUMPI
0000000b: PUSH1 0xe0
0000000d: PUSH1 0x02
0000000f: EXP
00000010: PUSH1 0x00
00000012: CALLDATALOAD
00000013: DIV
00000014: PUSH4 0xcbedbf5a
00000019: DUP2
0000001a: EQ
0000001b: PUSH2 0x0078
0000001e: JUMPI
0000001f: JUMPDEST
00000020: PUSH2 0x0121
00000023: PUSH1 0x20
00000025: PUSH1 0x60
00000027: SWAP1
00000028: DUP2
00000029: MSTORE
0000002a: PUSH1 0x0d
0000002c: PUSH1 0x80
0000002e: MSTORE
0000002f: PUSH32 0x48656c6c6f2c20576f726c642100000000000000000000000000000000000000
00000050: PUSH1 0xa0
00000052: MSTORE
00000053: PUSH32 0x241ba3bafc919fb4308284ce03a8f4867a8ec2f0401445d3cf41a468e7db4ae0
00000074: SWAP1
00000075: DUP1
00000076: LOG1
00000077: JUMP
00000078: JUMPDEST
00000079: PUSH2 0x0121
0000007c: PUSH1 0x00
0000007e: DUP1
0000007f: ADDRESS
00000080: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000095: DUP2
00000096: AND
00000097: BALANCE
00000098: PUSH20 0x7e5036bf0177702deca2e40ba8dab732fac49b5d
000000ad: PUSH20 0xa387e7b5139f19652d6bd20ccbc91f1b78ed6bd1
000000c2: PUSH20 0xeda396755db5a6902a44c4a5db53ed18c2ac7ed1
000000d7: PUSH1 0x03
000000d9: DUP5
000000da: GT
000000db: ISZERO
000000dc: PUSH2 0x0118
000000df: JUMPI
000000e0: PUSH1 0x03
000000e2: DUP5
000000e3: DIV
000000e4: SWAP7
000000e5: POP
000000e6: DUP3
000000e7: DUP7
000000e8: DUP9
000000e9: PUSH1 0x60
000000eb: DUP3
000000ec: DUP2
000000ed: DUP2
000000ee: DUP2
000000ef: DUP6
000000f0: DUP9
000000f1: DUP4
000000f2: CALL
000000f3: POP
000000f4: POP
000000f5: PUSH1 0x40
000000f7: MLOAD
000000f8: DUP6
000000f9: SWAP4
000000fa: POP
000000fb: DUP3
000000fc: DUP2
000000fd: DUP2
000000fe: DUP2
000000ff: DUP6
00000100: DUP9
00000101: DUP4
00000102: CALL
00000103: POP
00000104: POP
00000105: PUSH1 0x40
00000107: MLOAD
00000108: DUP5
00000109: SWAP4
0000010a: POP
0000010b: DUP3
0000010c: DUP2
0000010d: DUP2
0000010e: DUP2
0000010f: DUP6
00000110: DUP9
00000111: DUP4
00000112: CALL
00000113: POP
00000114: POP
00000115: POP
00000116: POP
00000117: POP
00000118: JUMPDEST
00000119: POP
0000011a: POP
0000011b: POP
0000011c: POP
0000011d: POP
0000011e: POP
0000011f: POP
00000120: JUMP
00000121: JUMPDEST
00000122: STOP
View stderr
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
high other detector Untrusted CALL target/value reachable 60 no no
view
trace_id: 0x2cce5ad40238a300942adcb7830bba7e85baebf5ba2e0b94100939aa162a36ad
call_targets: 0xec79a6cce16d6209aa04319e9c4c5dcdbe5ae7f5
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0x2cce5ad40238a300942adcb7830bba7e85baebf5ba2e0b94100939aa162a36ad",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0xec79a6cce16d6209aa04319e9c4c5dcdbe5ae7f5"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0xcbedbf5a",
            "selector": "0xcbedbf5a",
            "calldata_variants": [
                "0xcbedbf5a",
                "0xcbedbf5a0000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 242,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 258,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 274,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "call_count": 3,
    "guards_detected": [],
    "untrusted_call_count": 3
}
high other detector ETH value transfer possible 55 no no
view
trace_id: 0x2cce5ad40238a300942adcb7830bba7e85baebf5ba2e0b94100939aa162a36ad
call_targets: 0xec79a6cce16d6209aa04319e9c4c5dcdbe5ae7f5
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0x2cce5ad40238a300942adcb7830bba7e85baebf5ba2e0b94100939aa162a36ad",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0xec79a6cce16d6209aa04319e9c4c5dcdbe5ae7f5"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0xcbedbf5a",
            "selector": "0xcbedbf5a",
            "calldata_variants": [
                "0xcbedbf5a",
                "0xcbedbf5a0000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 242,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 258,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 274,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "eth_value_calls": 3,
    "guards_detected": []
}