TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

019b3836-503e-709f-9014-fc717f2792c7

complete
Chain ID
1
Address
Block Number
Created
Fri, Dec 19, 2025 8:04 PM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
2
Validated
2
Source
Bytecode only
Review Backing
Not yet
Best current signal
Untrusted CALL target/value reachable
crit 0 high 2 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
7637 artifact.fetch complete 1 / 3 3 months ago
7638 tool.cast_disasm complete 1 / 3 3 months ago
82183 analysis.bundle complete 1 / 3 1 week ago
82184 capability.graph complete 1 / 3 1 week ago
82185 detector.run complete 1 / 3 1 week ago
82186 validation.fork complete 1 / 3 1 week ago
113647 report.consolidate complete 1 / 6 1 week ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no
Implementation:
Verified Source: no

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate
Job Status
complete
Attempts
1 / 6
Findings
0
No findings?
View stderr
OpenAI Codex v0.118.0 (research preview)
--------
workdir: /tmp/codex-az_vzf6u
model: gpt-5.4
provider: openai
approval: never
sandbox: read-only
reasoning effort: high
reasoning summaries: none
session id: 019d5c9a-445c-7a80-aa92-80afedf35efa
--------
user
You are a security auditor. You ONLY have runtime bytecode + analysis artifacts.
You MUST read `BYTECODE_BUNDLE.json` before concluding; it contains the bytecode summary,
evidence bundle, callsites, storage slots, and detector findings.

Special cases when reasoning from bytecode (be explicit about uncertainty):
- Selector inference is best-effort; missing selectors are common.
- Fallback/receive paths may be the only entrypoints.
- CALL vs DELEGATECALL semantics differ; DELEGATECALL executes in caller storage.
- Proxy patterns (EIP-1967, minimal proxies, beacon) change which storage is authoritative.
- Storage slots are raw; mappings/arrays appear via keccak patterns, names are unknown.
- Guard detection is heuristic; absence of guards does NOT mean unguarded.
- Returndata checking is unknown unless explicitly shown in evidence.
- Precompiles (0x1..0x9) and common ERC20 transfer selectors may appear; do not over-claim.

Output MUST be valid JSON matching the provided schema.
- If you find nothing meaningful: set no_findings=true and findings=[].
- Otherwise: set no_findings=false and include findings with severity/category/title.
- Locations can be pc references like "pc:0x123" or selectors like "selector:0xa9059cbb".

Focus on: reentrancy, access control, upgradeability/proxy issues, signature validation,
accounting/invariant breaks, dangerous delegatecall, and untrusted external calls.
Be conservative: if evidence is weak, mark severity low/medium and explain why.
warning: Codex could not find system bubblewrap on PATH. Please install bubblewrap with your package manager. Codex will use the vendored bubblewrap in the meantime.
ERROR: You've hit your usage limit. Visit https://chatgpt.com/codex/settings/usage to purchase more credits or try again at Apr 8th, 2026 9:11 AM.
ERROR: You've hit your usage limit. Visit https://chatgpt.com/codex/settings/usage to purchase more credits or try again at Apr 8th, 2026 9:11 AM.
Metadata
{
    "codex": {
        "ran_at": "2026-04-05T07:45:08.744391+00:00",
        "returncode": 1
    },
    "project": {
        "mode": "bytecode",
        "bytecode_length": 2024,
        "bytecode_truncated": false,
        "capability_graph_present": true,
        "analysis_artifact_present": true
    },
    "summary": null,
    "no_findings": null,
    "schema_version": 1
}

Opcode Heuristics

tool.cast_disasm
Delegatecall
0
Selfdestruct
1
CREATE2
0
CALL-family (heavy)
1
EXT*/BALANCE
0
Total opcodes
809
Flags
selfdestruct_present
View cast disassembly output
00000000: PUSH1 0x60
00000002: PUSH1 0x40
00000004: MSTORE
00000005: PUSH1 0xe0
00000007: PUSH1 0x02
00000009: EXP
0000000a: PUSH1 0x00
0000000c: CALLDATALOAD
0000000d: DIV
0000000e: PUSH4 0x0121b93f
00000013: DUP2
00000014: EQ
00000015: PUSH2 0x0047
00000018: JUMPI
00000019: DUP1
0000001a: PUSH4 0x2da8f764
0000001f: EQ
00000020: PUSH2 0x0089
00000023: JUMPI
00000024: DUP1
00000025: PUSH4 0x41c0e1b5
0000002a: EQ
0000002b: PUSH2 0x019e
0000002e: JUMPI
0000002f: DUP1
00000030: PUSH4 0xe6821bf5
00000035: EQ
00000036: PUSH2 0x01c6
00000039: JUMPI
0000003a: DUP1
0000003b: PUSH4 0xebec7352
00000040: EQ
00000041: PUSH2 0x01e9
00000044: JUMPI
00000045: JUMPDEST
00000046: STOP
00000047: JUMPDEST
00000048: PUSH2 0x0045
0000004b: PUSH1 0x04
0000004d: CALLDATALOAD
0000004e: PUSH1 0x00
00000050: DUP2
00000051: DUP2
00000052: MSTORE
00000053: PUSH1 0x02
00000055: PUSH1 0x20
00000057: DUP2
00000058: SWAP1
00000059: MSTORE
0000005a: PUSH1 0x40
0000005c: DUP1
0000005d: DUP4
0000005e: KECCAK256
0000005f: SWAP1
00000060: SWAP2
00000061: ADD
00000062: DUP1
00000063: SLOAD
00000064: CALLVALUE
00000065: ADD
00000066: SWAP1
00000067: SSTORE
00000068: MLOAD
00000069: CALLER
0000006a: PUSH1 0x01
0000006c: PUSH1 0xa0
0000006e: PUSH1 0x02
00000070: EXP
00000071: SUB
00000072: AND
00000073: SWAP2
00000074: PUSH2 0x2710
00000077: SWAP2
00000078: PUSH1 0x6f
0000007a: SWAP2
0000007b: DUP2
0000007c: DUP2
0000007d: DUP2
0000007e: DUP6
0000007f: DUP9
00000080: DUP9
00000081: CALL
00000082: POP
00000083: POP
00000084: POP
00000085: POP
00000086: POP
00000087: POP
00000088: JUMP
00000089: JUMPDEST
0000008a: PUSH1 0x40
0000008c: DUP1
0000008d: MLOAD
0000008e: PUSH1 0x20
00000090: PUSH1 0x04
00000092: DUP1
00000093: CALLDATALOAD
00000094: DUP1
00000095: DUP3
00000096: ADD
00000097: CALLDATALOAD
00000098: PUSH1 0x1f
0000009a: DUP2
0000009b: ADD
0000009c: DUP5
0000009d: SWAP1
0000009e: DIV
0000009f: DUP5
000000a0: MUL
000000a1: DUP6
000000a2: ADD
000000a3: DUP5
000000a4: ADD
000000a5: SWAP1
000000a6: SWAP6
000000a7: MSTORE
000000a8: DUP5
000000a9: DUP5
000000aa: MSTORE
000000ab: PUSH2 0x01f2
000000ae: SWAP5
000000af: SWAP2
000000b0: SWAP4
000000b1: PUSH1 0x24
000000b3: SWAP4
000000b4: SWAP1
000000b5: SWAP3
000000b6: SWAP2
000000b7: DUP5
000000b8: ADD
000000b9: SWAP2
000000ba: SWAP1
000000bb: DUP2
000000bc: SWAP1
000000bd: DUP5
000000be: ADD
000000bf: DUP4
000000c0: DUP3
000000c1: DUP1
000000c2: DUP3
000000c3: DUP5
000000c4: CALLDATACOPY
000000c5: POP
000000c6: POP
000000c7: PUSH1 0x40
000000c9: DUP1
000000ca: MLOAD
000000cb: PUSH1 0x20
000000cd: DUP9
000000ce: CALLDATALOAD
000000cf: DUP1
000000d0: DUP12
000000d1: ADD
000000d2: CALLDATALOAD
000000d3: PUSH1 0x1f
000000d5: DUP2
000000d6: ADD
000000d7: DUP4
000000d8: SWAP1
000000d9: DIV
000000da: DUP4
000000db: MUL
000000dc: DUP5
000000dd: ADD
000000de: DUP4
000000df: ADD
000000e0: SWAP1
000000e1: SWAP5
000000e2: MSTORE
000000e3: DUP4
000000e4: DUP4
000000e5: MSTORE
000000e6: SWAP8
000000e7: SWAP10
000000e8: SWAP9
000000e9: PUSH1 0x44
000000eb: SWAP9
000000ec: SWAP3
000000ed: SWAP8
000000ee: POP
000000ef: SWAP2
000000f0: SWAP1
000000f1: SWAP2
000000f2: ADD
000000f3: SWAP5
000000f4: POP
000000f5: SWAP1
000000f6: SWAP3
000000f7: POP
000000f8: DUP3
000000f9: SWAP2
000000fa: POP
000000fb: DUP5
000000fc: ADD
000000fd: DUP4
000000fe: DUP3
000000ff: DUP1
00000100: DUP3
00000101: DUP5
00000102: CALLDATACOPY
00000103: POP
00000104: SWAP5
00000105: SWAP7
00000106: POP
00000107: POP
00000108: POP
00000109: POP
0000010a: POP
0000010b: POP
0000010c: POP
0000010d: PUSH1 0x01
0000010f: DUP1
00000110: SLOAD
00000111: PUSH1 0x40
00000113: DUP1
00000114: MLOAD
00000115: PUSH1 0x60
00000117: DUP2
00000118: ADD
00000119: DUP3
0000011a: MSTORE
0000011b: DUP6
0000011c: DUP2
0000011d: MSTORE
0000011e: PUSH1 0x20
00000120: DUP2
00000121: DUP2
00000122: ADD
00000123: DUP7
00000124: SWAP1
00000125: MSTORE
00000126: CALLVALUE
00000127: DUP3
00000128: DUP5
00000129: ADD
0000012a: MSTORE
0000012b: PUSH1 0x00
0000012d: DUP5
0000012e: DUP2
0000012f: MSTORE
00000130: PUSH1 0x02
00000132: DUP1
00000133: DUP4
00000134: MSTORE
00000135: SWAP4
00000136: DUP2
00000137: KECCAK256
00000138: DUP4
00000139: MLOAD
0000013a: DUP1
0000013b: MLOAD
0000013c: DUP3
0000013d: SLOAD
0000013e: DUP4
0000013f: DUP6
00000140: MSTORE
00000141: SWAP4
00000142: DUP6
00000143: SWAP1
00000144: KECCAK256
00000145: SWAP8
00000146: SWAP9
00000147: SWAP6
00000148: SWAP8
00000149: SWAP3
0000014a: SWAP7
0000014b: DUP8
0000014c: SWAP7
0000014d: DUP6
0000014e: AND
0000014f: ISZERO
00000150: PUSH2 0x0100
00000153: MUL
00000154: PUSH1 0x00
00000156: NOT
00000157: ADD
00000158: SWAP1
00000159: SWAP5
0000015a: AND
0000015b: SWAP4
0000015c: SWAP1
0000015d: SWAP4
0000015e: DIV
0000015f: PUSH1 0x1f
00000161: SWAP1
00000162: DUP2
00000163: ADD
00000164: DUP6
00000165: SWAP1
00000166: DIV
00000167: DUP4
00000168: ADD
00000169: SWAP5
0000016a: SWAP2
0000016b: SWAP1
0000016c: SWAP2
0000016d: ADD
0000016e: SWAP1
0000016f: DUP4
00000170: SWAP1
00000171: LT
00000172: PUSH2 0x032e
00000175: JUMPI
00000176: DUP1
00000177: MLOAD
00000178: PUSH1 0xff
0000017a: NOT
0000017b: AND
0000017c: DUP4
0000017d: DUP1
0000017e: ADD
0000017f: OR
00000180: DUP6
00000181: SSTORE
00000182: JUMPDEST
00000183: POP
00000184: PUSH2 0x035e
00000187: SWAP3
00000188: SWAP2
00000189: POP
0000018a: JUMPDEST
0000018b: DUP1
0000018c: DUP3
0000018d: GT
0000018e: ISZERO
0000018f: PUSH2 0x03bd
00000192: JUMPI
00000193: PUSH1 0x00
00000195: DUP2
00000196: SSTORE
00000197: PUSH1 0x01
00000199: ADD
0000019a: PUSH2 0x018a
0000019d: JUMP
0000019e: JUMPDEST
0000019f: PUSH2 0x0045
000001a2: PUSH1 0x00
000001a4: SLOAD
000001a5: CALLER
000001a6: PUSH1 0x01
000001a8: PUSH1 0xa0
000001aa: PUSH1 0x02
000001ac: EXP
000001ad: SUB
000001ae: SWAP1
000001af: DUP2
000001b0: AND
000001b1: SWAP2
000001b2: AND
000001b3: EQ
000001b4: ISZERO
000001b5: PUSH2 0x03f1
000001b8: JUMPI
000001b9: PUSH1 0x00
000001bb: SLOAD
000001bc: PUSH1 0x01
000001be: PUSH1 0xa0
000001c0: PUSH1 0x02
000001c2: EXP
000001c3: SUB
000001c4: AND
000001c5: SELFDESTRUCT
000001c6: JUMPDEST
000001c7: PUSH2 0x0204
000001ca: PUSH1 0x04
000001cc: CALLDATALOAD
000001cd: PUSH1 0x02
000001cf: PUSH1 0x20
000001d1: DUP2
000001d2: SWAP1
000001d3: MSTORE
000001d4: PUSH1 0x00
000001d6: SWAP2
000001d7: DUP3
000001d8: MSTORE
000001d9: PUSH1 0x40
000001db: SWAP1
000001dc: SWAP2
000001dd: KECCAK256
000001de: SWAP1
000001df: DUP2
000001e0: ADD
000001e1: SLOAD
000001e2: PUSH1 0x01
000001e4: DUP3
000001e5: ADD
000001e6: SWAP1
000001e7: DUP4
000001e8: JUMP
000001e9: JUMPDEST
000001ea: PUSH2 0x01f2
000001ed: PUSH1 0x01
000001ef: SLOAD
000001f0: DUP2
000001f1: JUMP
000001f2: JUMPDEST
000001f3: PUSH1 0x40
000001f5: DUP1
000001f6: MLOAD
000001f7: SWAP2
000001f8: DUP3
000001f9: MSTORE
000001fa: MLOAD
000001fb: SWAP1
000001fc: DUP2
000001fd: SWAP1
000001fe: SUB
000001ff: PUSH1 0x20
00000201: ADD
00000202: SWAP1
00000203: RETURN
00000204: JUMPDEST
00000205: PUSH1 0x40
00000207: DUP1
00000208: MLOAD
00000209: SWAP1
0000020a: DUP2
0000020b: ADD
0000020c: DUP3
0000020d: SWAP1
0000020e: MSTORE
0000020f: PUSH1 0x60
00000211: DUP1
00000212: DUP3
00000213: MSTORE
00000214: DUP5
00000215: SLOAD
00000216: PUSH1 0x02
00000218: PUSH1 0x01
0000021a: DUP3
0000021b: AND
0000021c: ISZERO
0000021d: PUSH2 0x0100
00000220: MUL
00000221: PUSH1 0x00
00000223: NOT
00000224: ADD
00000225: SWAP1
00000226: SWAP2
00000227: AND
00000228: DIV
00000229: SWAP1
0000022a: DUP3
0000022b: ADD
0000022c: DUP2
0000022d: SWAP1
0000022e: MSTORE
0000022f: DUP2
00000230: SWAP1
00000231: PUSH1 0x20
00000233: DUP3
00000234: ADD
00000235: SWAP1
00000236: PUSH1 0x80
00000238: DUP4
00000239: ADD
0000023a: SWAP1
0000023b: DUP8
0000023c: SWAP1
0000023d: DUP1
0000023e: ISZERO
0000023f: PUSH2 0x0289
00000242: JUMPI
00000243: DUP1
00000244: PUSH1 0x1f
00000246: LT
00000247: PUSH2 0x025e
0000024a: JUMPI
0000024b: PUSH2 0x0100
0000024e: DUP1
0000024f: DUP4
00000250: SLOAD
00000251: DIV
00000252: MUL
00000253: DUP4
00000254: MSTORE
00000255: SWAP2
00000256: PUSH1 0x20
00000258: ADD
00000259: SWAP2
0000025a: PUSH2 0x0289
0000025d: JUMP
0000025e: JUMPDEST
0000025f: DUP3
00000260: ADD
00000261: SWAP2
00000262: SWAP1
00000263: PUSH1 0x00
00000265: MSTORE
00000266: PUSH1 0x20
00000268: PUSH1 0x00
0000026a: KECCAK256
0000026b: SWAP1
0000026c: JUMPDEST
0000026d: DUP2
0000026e: SLOAD
0000026f: DUP2
00000270: MSTORE
00000271: SWAP1
00000272: PUSH1 0x01
00000274: ADD
00000275: SWAP1
00000276: PUSH1 0x20
00000278: ADD
00000279: DUP1
0000027a: DUP4
0000027b: GT
0000027c: PUSH2 0x026c
0000027f: JUMPI
00000280: DUP3
00000281: SWAP1
00000282: SUB
00000283: PUSH1 0x1f
00000285: AND
00000286: DUP3
00000287: ADD
00000288: SWAP2
00000289: JUMPDEST
0000028a: POP
0000028b: POP
0000028c: DUP4
0000028d: DUP2
0000028e: SUB
0000028f: DUP3
00000290: MSTORE
00000291: DUP6
00000292: SLOAD
00000293: PUSH1 0x02
00000295: PUSH1 0x01
00000297: DUP3
00000298: AND
00000299: ISZERO
0000029a: PUSH2 0x0100
0000029d: MUL
0000029e: PUSH1 0x00
000002a0: NOT
000002a1: ADD
000002a2: SWAP1
000002a3: SWAP2
000002a4: AND
000002a5: DIV
000002a6: DUP1
000002a7: DUP3
000002a8: MSTORE
000002a9: PUSH1 0x20
000002ab: SWAP2
000002ac: SWAP1
000002ad: SWAP2
000002ae: ADD
000002af: SWAP1
000002b0: DUP7
000002b1: SWAP1
000002b2: DUP1
000002b3: ISZERO
000002b4: PUSH2 0x02fe
000002b7: JUMPI
000002b8: DUP1
000002b9: PUSH1 0x1f
000002bb: LT
000002bc: PUSH2 0x02d3
000002bf: JUMPI
000002c0: PUSH2 0x0100
000002c3: DUP1
000002c4: DUP4
000002c5: SLOAD
000002c6: DIV
000002c7: MUL
000002c8: DUP4
000002c9: MSTORE
000002ca: SWAP2
000002cb: PUSH1 0x20
000002cd: ADD
000002ce: SWAP2
000002cf: PUSH2 0x02fe
000002d2: JUMP
000002d3: JUMPDEST
000002d4: DUP3
000002d5: ADD
000002d6: SWAP2
000002d7: SWAP1
000002d8: PUSH1 0x00
000002da: MSTORE
000002db: PUSH1 0x20
000002dd: PUSH1 0x00
000002df: KECCAK256
000002e0: SWAP1
000002e1: JUMPDEST
000002e2: DUP2
000002e3: SLOAD
000002e4: DUP2
000002e5: MSTORE
000002e6: SWAP1
000002e7: PUSH1 0x01
000002e9: ADD
000002ea: SWAP1
000002eb: PUSH1 0x20
000002ed: ADD
000002ee: DUP1
000002ef: DUP4
000002f0: GT
000002f1: PUSH2 0x02e1
000002f4: JUMPI
000002f5: DUP3
000002f6: SWAP1
000002f7: SUB
000002f8: PUSH1 0x1f
000002fa: AND
000002fb: DUP3
000002fc: ADD
000002fd: SWAP2
000002fe: JUMPDEST
000002ff: POP
00000300: POP
00000301: SWAP6
00000302: POP
00000303: POP
00000304: POP
00000305: POP
00000306: POP
00000307: POP
00000308: PUSH1 0x40
0000030a: MLOAD
0000030b: DUP1
0000030c: SWAP2
0000030d: SUB
0000030e: SWAP1
0000030f: RETURN
00000310: JUMPDEST
00000311: POP
00000312: POP
00000313: PUSH1 0x40
00000315: SWAP2
00000316: SWAP1
00000317: SWAP2
00000318: ADD
00000319: MLOAD
0000031a: PUSH1 0x02
0000031c: SWAP2
0000031d: SWAP1
0000031e: SWAP2
0000031f: ADD
00000320: SSTORE
00000321: PUSH1 0x01
00000323: DUP1
00000324: SLOAD
00000325: DUP2
00000326: ADD
00000327: SWAP1
00000328: SSTORE
00000329: SWAP3
0000032a: SWAP2
0000032b: POP
0000032c: POP
0000032d: JUMP
0000032e: JUMPDEST
0000032f: DUP3
00000330: DUP1
00000331: ADD
00000332: PUSH1 0x01
00000334: ADD
00000335: DUP6
00000336: SSTORE
00000337: DUP3
00000338: ISZERO
00000339: PUSH2 0x0182
0000033c: JUMPI
0000033d: SWAP2
0000033e: DUP3
0000033f: ADD
00000340: JUMPDEST
00000341: DUP3
00000342: DUP2
00000343: GT
00000344: ISZERO
00000345: PUSH2 0x0182
00000348: JUMPI
00000349: DUP3
0000034a: MLOAD
0000034b: DUP3
0000034c: PUSH1 0x00
0000034e: POP
0000034f: SSTORE
00000350: SWAP2
00000351: PUSH1 0x20
00000353: ADD
00000354: SWAP2
00000355: SWAP1
00000356: PUSH1 0x01
00000358: ADD
00000359: SWAP1
0000035a: PUSH2 0x0340
0000035d: JUMP
0000035e: JUMPDEST
0000035f: POP
00000360: POP
00000361: PUSH1 0x20
00000363: DUP3
00000364: ADD
00000365: MLOAD
00000366: DUP2
00000367: PUSH1 0x01
00000369: ADD
0000036a: PUSH1 0x00
0000036c: POP
0000036d: SWAP1
0000036e: DUP1
0000036f: MLOAD
00000370: SWAP1
00000371: PUSH1 0x20
00000373: ADD
00000374: SWAP1
00000375: DUP3
00000376: DUP1
00000377: SLOAD
00000378: PUSH1 0x01
0000037a: DUP2
0000037b: PUSH1 0x01
0000037d: AND
0000037e: ISZERO
0000037f: PUSH2 0x0100
00000382: MUL
00000383: SUB
00000384: AND
00000385: PUSH1 0x02
00000387: SWAP1
00000388: DIV
00000389: SWAP1
0000038a: PUSH1 0x00
0000038c: MSTORE
0000038d: PUSH1 0x20
0000038f: PUSH1 0x00
00000391: KECCAK256
00000392: SWAP1
00000393: PUSH1 0x1f
00000395: ADD
00000396: PUSH1 0x20
00000398: SWAP1
00000399: DIV
0000039a: DUP2
0000039b: ADD
0000039c: SWAP3
0000039d: DUP3
0000039e: PUSH1 0x1f
000003a0: LT
000003a1: PUSH2 0x03c1
000003a4: JUMPI
000003a5: DUP1
000003a6: MLOAD
000003a7: PUSH1 0xff
000003a9: NOT
000003aa: AND
000003ab: DUP4
000003ac: DUP1
000003ad: ADD
000003ae: OR
000003af: DUP6
000003b0: SSTORE
000003b1: JUMPDEST
000003b2: POP
000003b3: PUSH2 0x0310
000003b6: SWAP3
000003b7: SWAP2
000003b8: POP
000003b9: PUSH2 0x018a
000003bc: JUMP
000003bd: JUMPDEST
000003be: POP
000003bf: SWAP1
000003c0: JUMP
000003c1: JUMPDEST
000003c2: DUP3
000003c3: DUP1
000003c4: ADD
000003c5: PUSH1 0x01
000003c7: ADD
000003c8: DUP6
000003c9: SSTORE
000003ca: DUP3
000003cb: ISZERO
000003cc: PUSH2 0x03b1
000003cf: JUMPI
000003d0: SWAP2
000003d1: DUP3
000003d2: ADD
000003d3: JUMPDEST
000003d4: DUP3
000003d5: DUP2
000003d6: GT
000003d7: ISZERO
000003d8: PUSH2 0x03b1
000003db: JUMPI
000003dc: DUP3
000003dd: MLOAD
000003de: DUP3
000003df: PUSH1 0x00
000003e1: POP
000003e2: SSTORE
000003e3: SWAP2
000003e4: PUSH1 0x20
000003e6: ADD
000003e7: SWAP2
000003e8: SWAP1
000003e9: PUSH1 0x01
000003eb: ADD
000003ec: SWAP1
000003ed: PUSH2 0x03d3
000003f0: JUMP
000003f1: JUMPDEST
000003f2: JUMP
View stderr
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
high other detector SELFDESTRUCT reachable 65 no no
view
trace_id: 0x00f4af7cc7fba033486491a6fe6fcbf48d6ebffe454b040835507b09edae27e2
validation_json
{
    "sink": "SELFDESTRUCT",
    "errors": 0,
    "status": "unknown",
    "attempts": 10,
    "trace_id": "0x00f4af7cc7fba033486491a6fe6fcbf48d6ebffe454b040835507b09edae27e2",
    "confirmed": false,
    "trace_mode": "structLogs",
    "call_targets": null,
    "matched_probe": null,
    "target_varies": null,
    "classification": "no_sink"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x0121b93f",
            "selector": "0x0121b93f",
            "calldata_variants": [
                "0x0121b93f",
                "0x0121b93f0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x2da8f764",
            "selector": "0x2da8f764",
            "calldata_variants": [
                "0x2da8f764",
                "0x2da8f7640000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x41c0e1b5",
            "selector": "0x41c0e1b5",
            "calldata_variants": [
                "0x41c0e1b5",
                "0x41c0e1b50000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xe6821bf5",
            "selector": "0xe6821bf5",
            "calldata_variants": [
                "0xe6821bf5",
                "0xe6821bf50000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xebec7352",
            "selector": "0xebec7352",
            "calldata_variants": [
                "0xebec7352",
                "0xebec73520000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "guards_detected": [],
    "selfdestruct_count": 1
}
high other detector Untrusted CALL target/value reachable 60 yes yes
view
trace_id: 0x42ead53b6f17b6878e8f2fa8f20e9f2d55d33ffa94fc5f7f74adee87e10afb66
call_targets: 0x0000000000000000000000000000000000000001, 0xa6ab1190c26bd9163dbbfb08166ac941d75b3bed
target_varies: yes
classification: target_varies
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "confirmed",
    "attempts": 1,
    "trace_id": "0x42ead53b6f17b6878e8f2fa8f20e9f2d55d33ffa94fc5f7f74adee87e10afb66",
    "confirmed": true,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x0000000000000000000000000000000000000001",
        "0xa6ab1190c26bd9163dbbfb08166ac941d75b3bed"
    ],
    "matched_probe": null,
    "target_varies": true,
    "classification": "target_varies"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x0121b93f",
            "selector": "0x0121b93f",
            "calldata_variants": [
                "0x0121b93f",
                "0x0121b93f0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x2da8f764",
            "selector": "0x2da8f764",
            "calldata_variants": [
                "0x2da8f764",
                "0x2da8f7640000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x41c0e1b5",
            "selector": "0x41c0e1b5",
            "calldata_variants": [
                "0x41c0e1b5",
                "0x41c0e1b50000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xe6821bf5",
            "selector": "0xe6821bf5",
            "calldata_variants": [
                "0xe6821bf5",
                "0xe6821bf50000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xebec7352",
            "selector": "0xebec7352",
            "calldata_variants": [
                "0xebec7352",
                "0xebec73520000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 129,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "call_count": 1,
    "guards_detected": [],
    "untrusted_call_count": 1
}
high other detector ETH value transfer possible 55 yes yes
view
trace_id: 0x42ead53b6f17b6878e8f2fa8f20e9f2d55d33ffa94fc5f7f74adee87e10afb66
call_targets: 0x0000000000000000000000000000000000000001, 0xa6ab1190c26bd9163dbbfb08166ac941d75b3bed
target_varies: yes
classification: target_varies
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "confirmed",
    "attempts": 1,
    "trace_id": "0x42ead53b6f17b6878e8f2fa8f20e9f2d55d33ffa94fc5f7f74adee87e10afb66",
    "confirmed": true,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x0000000000000000000000000000000000000001",
        "0xa6ab1190c26bd9163dbbfb08166ac941d75b3bed"
    ],
    "matched_probe": null,
    "target_varies": true,
    "classification": "target_varies"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x0121b93f",
            "selector": "0x0121b93f",
            "calldata_variants": [
                "0x0121b93f",
                "0x0121b93f0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x2da8f764",
            "selector": "0x2da8f764",
            "calldata_variants": [
                "0x2da8f764",
                "0x2da8f7640000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x41c0e1b5",
            "selector": "0x41c0e1b5",
            "calldata_variants": [
                "0x41c0e1b5",
                "0x41c0e1b50000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xe6821bf5",
            "selector": "0xe6821bf5",
            "calldata_variants": [
                "0xe6821bf5",
                "0xe6821bf50000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xebec7352",
            "selector": "0xebec7352",
            "calldata_variants": [
                "0xebec7352",
                "0xebec73520000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 129,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "eth_value_calls": 1,
    "guards_detected": []
}