019b3836-538c-7303-9938-6082ba88ce97
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 8049 | artifact.fetch | complete | 1 / 3 | 4 months ago |
| 8050 | tool.cast_disasm | complete | 1 / 3 | 4 months ago |
| 51488 | analysis.bundle | complete | 1 / 3 | 2 weeks ago |
| 51489 | capability.graph | complete | 1 / 3 | 2 weeks ago |
| 51490 | detector.run | complete | 1 / 3 | 2 weeks ago |
| 51491 | validation.fork | complete | 1 / 3 | 2 weeks ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x60 00000002: PUSH1 0x40 00000004: MSTORE 00000005: PUSH1 0xe0 00000007: PUSH1 0x02 00000009: EXP 0000000a: PUSH1 0x00 0000000c: CALLDATALOAD 0000000d: DIV 0000000e: PUSH4 0x94e4a822 00000013: DUP2 00000014: EQ 00000015: PUSH1 0x1a 00000017: JUMPI 00000018: JUMPDEST 00000019: STOP 0000001a: JUMPDEST 0000001b: PUSH1 0x80 0000001d: PUSH1 0x04 0000001f: DUP1 00000020: CALLDATALOAD 00000021: DUP1 00000022: DUP3 00000023: ADD 00000024: CALLDATALOAD 00000025: PUSH1 0x20 00000027: DUP2 00000028: MUL 00000029: DUP5 0000002a: DUP2 0000002b: ADD 0000002c: PUSH1 0x40 0000002e: MSTORE 0000002f: PUSH1 0x60 00000031: DUP3 00000032: DUP2 00000033: MSTORE 00000034: PUSH1 0x18 00000036: SWAP6 00000037: PUSH1 0x24 00000039: SWAP5 0000003a: SWAP2 0000003b: SWAP4 0000003c: SWAP2 0000003d: DUP6 0000003e: ADD 0000003f: SWAP3 00000040: DUP3 00000041: SWAP2 00000042: SWAP1 00000043: DUP5 00000044: SWAP1 00000045: DUP1 00000046: DUP3 00000047: DUP5 00000048: CALLDATACOPY 00000049: POP 0000004a: SWAP5 0000004b: SWAP7 0000004c: POP 0000004d: POP 0000004e: POP 0000004f: POP 00000050: POP 00000051: POP 00000052: POP 00000053: DUP1 00000054: MLOAD 00000055: DUP2 00000056: SWAP1 00000057: PUSH1 0x00 00000059: NOT 0000005a: NUMBER 0000005b: ADD 0000005c: BLOCKHASH 0000005d: DUP2 0000005e: SWAP1 0000005f: MOD 00000060: SWAP1 00000061: DUP2 00000062: LT 00000063: ISZERO 00000064: PUSH1 0x02 00000066: JUMPI 00000067: PUSH1 0x20 00000069: MUL 0000006a: PUSH1 0x80 0000006c: ADD 0000006d: MLOAD 0000006e: PUSH1 0x40 00000070: MLOAD 00000071: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000086: SWAP1 00000087: SWAP2 00000088: AND 00000089: SWAP2 0000008a: POP 0000008b: PUSH1 0x00 0000008d: SWAP1 0000008e: CALLVALUE 0000008f: SWAP1 00000090: DUP3 00000091: DUP2 00000092: DUP2 00000093: DUP2 00000094: DUP6 00000095: DUP9 00000096: DUP4 00000097: CALL 00000098: SWAP4 00000099: POP 0000009a: POP 0000009b: POP 0000009c: POP 0000009d: ISZERO 0000009e: ISZERO 0000009f: PUSH1 0xa5 000000a1: JUMPI 000000a2: PUSH1 0x02 000000a4: JUMP 000000a5: JUMPDEST 000000a6: POP 000000a7: JUMP
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| high | other | detector | Untrusted CALL target/value reachable | 60 | no | no |
viewtrace_id: 0xe0ba2da2f585ac38bca32871b28492cdade63acc95575cb94d1feba59947575d
call_targets:
0x769a44cca0d85d96c70d8bcb84e5baf1dc6ee959
target_varies:
no
classification:
constant_target
validation_json{
"sink": "CALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0xe0ba2da2f585ac38bca32871b28492cdade63acc95575cb94d1feba59947575d",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x769a44cca0d85d96c70d8bcb84e5baf1dc6ee959"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x94e4a822",
"selector": "0x94e4a822",
"calldata_variants": [
"0x94e4a822",
"0x94e4a8220000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 151,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"call_count": 1,
"guards_detected": [],
"untrusted_call_count": 1
}
|
| high | other | detector | ETH value transfer possible | 55 | no | no |
viewtrace_id: 0xe0ba2da2f585ac38bca32871b28492cdade63acc95575cb94d1feba59947575d
call_targets:
0x769a44cca0d85d96c70d8bcb84e5baf1dc6ee959
target_varies:
no
classification:
constant_target
validation_json{
"sink": "CALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0xe0ba2da2f585ac38bca32871b28492cdade63acc95575cb94d1feba59947575d",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x769a44cca0d85d96c70d8bcb84e5baf1dc6ee959"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x94e4a822",
"selector": "0x94e4a822",
"calldata_variants": [
"0x94e4a822",
"0x94e4a8220000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 151,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"eth_value_calls": 1,
"guards_detected": []
}
|