TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

019b3836-5ddc-73d9-91b3-7aa69a67263b

complete
Chain ID
1
Address
Block Number
Created
Fri, Dec 19, 2025 8:04 PM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
2
Validated
2
Source
Bytecode only
Review Backing
Not yet
Best current signal
Untrusted CALL target/value reachable
crit 0 high 2 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
9397 artifact.fetch complete 1 / 3 3 months ago
9398 tool.cast_disasm complete 1 / 3 3 months ago
82632 analysis.bundle complete 1 / 3 1 week ago
82633 capability.graph complete 1 / 3 1 week ago
82634 detector.run complete 1 / 3 1 week ago
82635 validation.fork complete 1 / 3 1 week ago
113656 report.consolidate complete 1 / 6 1 week ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no
Implementation:
Verified Source: no

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate
Job Status
complete
Attempts
1 / 6
Findings
0
No findings?
View stderr
OpenAI Codex v0.118.0 (research preview)
--------
workdir: /tmp/codex-ip_2jd9a
model: gpt-5.4
provider: openai
approval: never
sandbox: read-only
reasoning effort: high
reasoning summaries: none
session id: 019d5c9a-8c3a-7db3-bf6b-6591c5ac1624
--------
user
You are a security auditor. You ONLY have runtime bytecode + analysis artifacts.
You MUST read `BYTECODE_BUNDLE.json` before concluding; it contains the bytecode summary,
evidence bundle, callsites, storage slots, and detector findings.

Special cases when reasoning from bytecode (be explicit about uncertainty):
- Selector inference is best-effort; missing selectors are common.
- Fallback/receive paths may be the only entrypoints.
- CALL vs DELEGATECALL semantics differ; DELEGATECALL executes in caller storage.
- Proxy patterns (EIP-1967, minimal proxies, beacon) change which storage is authoritative.
- Storage slots are raw; mappings/arrays appear via keccak patterns, names are unknown.
- Guard detection is heuristic; absence of guards does NOT mean unguarded.
- Returndata checking is unknown unless explicitly shown in evidence.
- Precompiles (0x1..0x9) and common ERC20 transfer selectors may appear; do not over-claim.

Output MUST be valid JSON matching the provided schema.
- If you find nothing meaningful: set no_findings=true and findings=[].
- Otherwise: set no_findings=false and include findings with severity/category/title.
- Locations can be pc references like "pc:0x123" or selectors like "selector:0xa9059cbb".

Focus on: reentrancy, access control, upgradeability/proxy issues, signature validation,
accounting/invariant breaks, dangerous delegatecall, and untrusted external calls.
Be conservative: if evidence is weak, mark severity low/medium and explain why.
warning: Codex could not find system bubblewrap on PATH. Please install bubblewrap with your package manager. Codex will use the vendored bubblewrap in the meantime.
ERROR: You've hit your usage limit. Visit https://chatgpt.com/codex/settings/usage to purchase more credits or try again at Apr 8th, 2026 9:11 AM.
ERROR: You've hit your usage limit. Visit https://chatgpt.com/codex/settings/usage to purchase more credits or try again at Apr 8th, 2026 9:11 AM.
Metadata
{
    "codex": {
        "ran_at": "2026-04-05T07:45:27.180511+00:00",
        "returncode": 1
    },
    "project": {
        "mode": "bytecode",
        "bytecode_length": 1682,
        "bytecode_truncated": false,
        "capability_graph_present": true,
        "analysis_artifact_present": true
    },
    "summary": null,
    "no_findings": null,
    "schema_version": 1
}

Opcode Heuristics

tool.cast_disasm
Delegatecall
0
Selfdestruct
0
CREATE2
0
CALL-family (heavy)
3
EXT*/BALANCE
0
Total opcodes
631
Flags
No heuristic flags raised.
View cast disassembly output
00000000: PUSH1 0x60
00000002: PUSH1 0x40
00000004: MSTORE
00000005: CALLDATASIZE
00000006: ISZERO
00000007: PUSH2 0x0035
0000000a: JUMPI
0000000b: PUSH1 0xe0
0000000d: PUSH1 0x02
0000000f: EXP
00000010: PUSH1 0x00
00000012: CALLDATALOAD
00000013: DIV
00000014: PUSH4 0x06fdde03
00000019: DUP2
0000001a: EQ
0000001b: PUSH2 0x0042
0000001e: JUMPI
0000001f: DUP1
00000020: PUSH4 0x5a3b7e42
00000025: EQ
00000026: PUSH2 0x00a4
00000029: JUMPI
0000002a: DUP1
0000002b: PUSH4 0xc7802177
00000030: EQ
00000031: PUSH2 0x0107
00000034: JUMPI
00000035: JUMPDEST
00000036: CALLVALUE
00000037: PUSH2 0x0002
0000003a: JUMPI
0000003b: PUSH2 0x02a5
0000003e: PUSH2 0x0002
00000041: JUMP
00000042: JUMPDEST
00000043: CALLVALUE
00000044: PUSH2 0x0002
00000047: JUMPI
00000048: PUSH1 0x40
0000004a: DUP1
0000004b: MLOAD
0000004c: PUSH1 0x01
0000004e: DUP1
0000004f: SLOAD
00000050: PUSH1 0x20
00000052: PUSH1 0x02
00000054: DUP3
00000055: DUP5
00000056: AND
00000057: ISZERO
00000058: PUSH2 0x0100
0000005b: MUL
0000005c: PUSH1 0x00
0000005e: NOT
0000005f: ADD
00000060: SWAP1
00000061: SWAP3
00000062: AND
00000063: SWAP2
00000064: SWAP1
00000065: SWAP2
00000066: DIV
00000067: PUSH1 0x1f
00000069: DUP2
0000006a: ADD
0000006b: DUP3
0000006c: SWAP1
0000006d: DIV
0000006e: DUP3
0000006f: MUL
00000070: DUP5
00000071: ADD
00000072: DUP3
00000073: ADD
00000074: SWAP1
00000075: SWAP5
00000076: MSTORE
00000077: DUP4
00000078: DUP4
00000079: MSTORE
0000007a: PUSH2 0x02a7
0000007d: SWAP4
0000007e: SWAP1
0000007f: DUP4
00000080: ADD
00000081: DUP3
00000082: DUP3
00000083: DUP1
00000084: ISZERO
00000085: PUSH2 0x0340
00000088: JUMPI
00000089: DUP1
0000008a: PUSH1 0x1f
0000008c: LT
0000008d: PUSH2 0x0315
00000090: JUMPI
00000091: PUSH2 0x0100
00000094: DUP1
00000095: DUP4
00000096: SLOAD
00000097: DIV
00000098: MUL
00000099: DUP4
0000009a: MSTORE
0000009b: SWAP2
0000009c: PUSH1 0x20
0000009e: ADD
0000009f: SWAP2
000000a0: PUSH2 0x0340
000000a3: JUMP
000000a4: JUMPDEST
000000a5: CALLVALUE
000000a6: PUSH2 0x0002
000000a9: JUMPI
000000aa: PUSH2 0x02a7
000000ad: PUSH1 0x00
000000af: DUP1
000000b0: SLOAD
000000b1: PUSH1 0x40
000000b3: DUP1
000000b4: MLOAD
000000b5: PUSH1 0x20
000000b7: PUSH1 0x02
000000b9: PUSH1 0x01
000000bb: DUP6
000000bc: AND
000000bd: ISZERO
000000be: PUSH2 0x0100
000000c1: MUL
000000c2: PUSH1 0x00
000000c4: NOT
000000c5: ADD
000000c6: SWAP1
000000c7: SWAP5
000000c8: AND
000000c9: SWAP4
000000ca: SWAP1
000000cb: SWAP4
000000cc: DIV
000000cd: PUSH1 0x1f
000000cf: DUP2
000000d0: ADD
000000d1: DUP5
000000d2: SWAP1
000000d3: DIV
000000d4: DUP5
000000d5: MUL
000000d6: DUP3
000000d7: ADD
000000d8: DUP5
000000d9: ADD
000000da: SWAP1
000000db: SWAP3
000000dc: MSTORE
000000dd: DUP2
000000de: DUP2
000000df: MSTORE
000000e0: SWAP3
000000e1: SWAP2
000000e2: DUP4
000000e3: ADD
000000e4: DUP3
000000e5: DUP3
000000e6: DUP1
000000e7: ISZERO
000000e8: PUSH2 0x0340
000000eb: JUMPI
000000ec: DUP1
000000ed: PUSH1 0x1f
000000ef: LT
000000f0: PUSH2 0x0315
000000f3: JUMPI
000000f4: PUSH2 0x0100
000000f7: DUP1
000000f8: DUP4
000000f9: SLOAD
000000fa: DIV
000000fb: MUL
000000fc: DUP4
000000fd: MSTORE
000000fe: SWAP2
000000ff: PUSH1 0x20
00000101: ADD
00000102: SWAP2
00000103: PUSH2 0x0340
00000106: JUMP
00000107: JUMPDEST
00000108: CALLVALUE
00000109: PUSH2 0x0002
0000010c: JUMPI
0000010d: PUSH2 0x02a5
00000110: PUSH1 0x04
00000112: DUP1
00000113: DUP1
00000114: CALLDATALOAD
00000115: SWAP1
00000116: PUSH1 0x20
00000118: ADD
00000119: SWAP1
0000011a: DUP3
0000011b: ADD
0000011c: DUP1
0000011d: CALLDATALOAD
0000011e: SWAP1
0000011f: PUSH1 0x20
00000121: ADD
00000122: SWAP2
00000123: SWAP2
00000124: SWAP1
00000125: DUP1
00000126: DUP1
00000127: PUSH1 0x1f
00000129: ADD
0000012a: PUSH1 0x20
0000012c: DUP1
0000012d: SWAP2
0000012e: DIV
0000012f: MUL
00000130: PUSH1 0x20
00000132: ADD
00000133: PUSH1 0x40
00000135: MLOAD
00000136: SWAP1
00000137: DUP2
00000138: ADD
00000139: PUSH1 0x40
0000013b: MSTORE
0000013c: DUP1
0000013d: SWAP4
0000013e: SWAP3
0000013f: SWAP2
00000140: SWAP1
00000141: DUP2
00000142: DUP2
00000143: MSTORE
00000144: PUSH1 0x20
00000146: ADD
00000147: DUP4
00000148: DUP4
00000149: DUP1
0000014a: DUP3
0000014b: DUP5
0000014c: CALLDATACOPY
0000014d: POP
0000014e: POP
0000014f: PUSH1 0x40
00000151: DUP1
00000152: MLOAD
00000153: PUSH1 0x20
00000155: DUP9
00000156: CALLDATALOAD
00000157: DUP1
00000158: DUP12
00000159: ADD
0000015a: CALLDATALOAD
0000015b: PUSH1 0x1f
0000015d: DUP2
0000015e: ADD
0000015f: DUP4
00000160: SWAP1
00000161: DIV
00000162: DUP4
00000163: MUL
00000164: DUP5
00000165: ADD
00000166: DUP4
00000167: ADD
00000168: SWAP1
00000169: SWAP5
0000016a: MSTORE
0000016b: DUP4
0000016c: DUP4
0000016d: MSTORE
0000016e: SWAP8
0000016f: SWAP10
00000170: SWAP9
00000171: PUSH1 0x44
00000173: SWAP9
00000174: SWAP3
00000175: SWAP8
00000176: POP
00000177: SWAP2
00000178: SWAP1
00000179: SWAP2
0000017a: ADD
0000017b: SWAP5
0000017c: POP
0000017d: SWAP1
0000017e: SWAP3
0000017f: POP
00000180: DUP3
00000181: SWAP2
00000182: POP
00000183: DUP5
00000184: ADD
00000185: DUP4
00000186: DUP3
00000187: DUP1
00000188: DUP3
00000189: DUP5
0000018a: CALLDATACOPY
0000018b: POP
0000018c: SWAP5
0000018d: SWAP7
0000018e: POP
0000018f: POP
00000190: POP
00000191: POP
00000192: POP
00000193: POP
00000194: POP
00000195: PUSH32 0xa2e1007a79e0f45c550338d11c793e45b18d99df380f3f4da25feb3bbdea5ef0
000001b6: CALLER
000001b7: DUP4
000001b8: DUP4
000001b9: PUSH1 0x40
000001bb: MLOAD
000001bc: DUP1
000001bd: DUP5
000001be: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000001d3: AND
000001d4: DUP2
000001d5: MSTORE
000001d6: PUSH1 0x20
000001d8: ADD
000001d9: DUP1
000001da: PUSH1 0x20
000001dc: ADD
000001dd: DUP1
000001de: PUSH1 0x20
000001e0: ADD
000001e1: DUP4
000001e2: DUP2
000001e3: SUB
000001e4: DUP4
000001e5: MSTORE
000001e6: DUP6
000001e7: DUP2
000001e8: DUP2
000001e9: MLOAD
000001ea: DUP2
000001eb: MSTORE
000001ec: PUSH1 0x20
000001ee: ADD
000001ef: SWAP2
000001f0: POP
000001f1: DUP1
000001f2: MLOAD
000001f3: SWAP1
000001f4: PUSH1 0x20
000001f6: ADD
000001f7: SWAP1
000001f8: DUP1
000001f9: DUP4
000001fa: DUP4
000001fb: DUP3
000001fc: SWAP1
000001fd: PUSH1 0x00
000001ff: PUSH1 0x04
00000201: PUSH1 0x20
00000203: DUP5
00000204: PUSH1 0x1f
00000206: ADD
00000207: DIV
00000208: PUSH1 0x03
0000020a: MUL
0000020b: PUSH1 0x0f
0000020d: ADD
0000020e: CALL
0000020f: POP
00000210: SWAP1
00000211: POP
00000212: SWAP1
00000213: DUP2
00000214: ADD
00000215: SWAP1
00000216: PUSH1 0x1f
00000218: AND
00000219: DUP1
0000021a: ISZERO
0000021b: PUSH2 0x0238
0000021e: JUMPI
0000021f: DUP1
00000220: DUP3
00000221: SUB
00000222: DUP1
00000223: MLOAD
00000224: PUSH1 0x01
00000226: DUP4
00000227: PUSH1 0x20
00000229: SUB
0000022a: PUSH2 0x0100
0000022d: EXP
0000022e: SUB
0000022f: NOT
00000230: AND
00000231: DUP2
00000232: MSTORE
00000233: PUSH1 0x20
00000235: ADD
00000236: SWAP2
00000237: POP
00000238: JUMPDEST
00000239: POP
0000023a: DUP4
0000023b: DUP2
0000023c: SUB
0000023d: DUP3
0000023e: MSTORE
0000023f: DUP5
00000240: DUP2
00000241: DUP2
00000242: MLOAD
00000243: DUP2
00000244: MSTORE
00000245: PUSH1 0x20
00000247: ADD
00000248: SWAP2
00000249: POP
0000024a: DUP1
0000024b: MLOAD
0000024c: SWAP1
0000024d: PUSH1 0x20
0000024f: ADD
00000250: SWAP1
00000251: DUP1
00000252: DUP4
00000253: DUP4
00000254: DUP3
00000255: SWAP1
00000256: PUSH1 0x00
00000258: PUSH1 0x04
0000025a: PUSH1 0x20
0000025c: DUP5
0000025d: PUSH1 0x1f
0000025f: ADD
00000260: DIV
00000261: PUSH1 0x03
00000263: MUL
00000264: PUSH1 0x0f
00000266: ADD
00000267: CALL
00000268: POP
00000269: SWAP1
0000026a: POP
0000026b: SWAP1
0000026c: DUP2
0000026d: ADD
0000026e: SWAP1
0000026f: PUSH1 0x1f
00000271: AND
00000272: DUP1
00000273: ISZERO
00000274: PUSH2 0x0291
00000277: JUMPI
00000278: DUP1
00000279: DUP3
0000027a: SUB
0000027b: DUP1
0000027c: MLOAD
0000027d: PUSH1 0x01
0000027f: DUP4
00000280: PUSH1 0x20
00000282: SUB
00000283: PUSH2 0x0100
00000286: EXP
00000287: SUB
00000288: NOT
00000289: AND
0000028a: DUP2
0000028b: MSTORE
0000028c: PUSH1 0x20
0000028e: ADD
0000028f: SWAP2
00000290: POP
00000291: JUMPDEST
00000292: POP
00000293: SWAP6
00000294: POP
00000295: POP
00000296: POP
00000297: POP
00000298: POP
00000299: POP
0000029a: PUSH1 0x40
0000029c: MLOAD
0000029d: DUP1
0000029e: SWAP2
0000029f: SUB
000002a0: SWAP1
000002a1: LOG1
000002a2: POP
000002a3: POP
000002a4: JUMP
000002a5: JUMPDEST
000002a6: STOP
000002a7: JUMPDEST
000002a8: PUSH1 0x40
000002aa: MLOAD
000002ab: DUP1
000002ac: DUP1
000002ad: PUSH1 0x20
000002af: ADD
000002b0: DUP3
000002b1: DUP2
000002b2: SUB
000002b3: DUP3
000002b4: MSTORE
000002b5: DUP4
000002b6: DUP2
000002b7: DUP2
000002b8: MLOAD
000002b9: DUP2
000002ba: MSTORE
000002bb: PUSH1 0x20
000002bd: ADD
000002be: SWAP2
000002bf: POP
000002c0: DUP1
000002c1: MLOAD
000002c2: SWAP1
000002c3: PUSH1 0x20
000002c5: ADD
000002c6: SWAP1
000002c7: DUP1
000002c8: DUP4
000002c9: DUP4
000002ca: DUP3
000002cb: SWAP1
000002cc: PUSH1 0x00
000002ce: PUSH1 0x04
000002d0: PUSH1 0x20
000002d2: DUP5
000002d3: PUSH1 0x1f
000002d5: ADD
000002d6: DIV
000002d7: PUSH1 0x03
000002d9: MUL
000002da: PUSH1 0x0f
000002dc: ADD
000002dd: CALL
000002de: POP
000002df: SWAP1
000002e0: POP
000002e1: SWAP1
000002e2: DUP2
000002e3: ADD
000002e4: SWAP1
000002e5: PUSH1 0x1f
000002e7: AND
000002e8: DUP1
000002e9: ISZERO
000002ea: PUSH2 0x0307
000002ed: JUMPI
000002ee: DUP1
000002ef: DUP3
000002f0: SUB
000002f1: DUP1
000002f2: MLOAD
000002f3: PUSH1 0x01
000002f5: DUP4
000002f6: PUSH1 0x20
000002f8: SUB
000002f9: PUSH2 0x0100
000002fc: EXP
000002fd: SUB
000002fe: NOT
000002ff: AND
00000300: DUP2
00000301: MSTORE
00000302: PUSH1 0x20
00000304: ADD
00000305: SWAP2
00000306: POP
00000307: JUMPDEST
00000308: POP
00000309: SWAP3
0000030a: POP
0000030b: POP
0000030c: POP
0000030d: PUSH1 0x40
0000030f: MLOAD
00000310: DUP1
00000311: SWAP2
00000312: SUB
00000313: SWAP1
00000314: RETURN
00000315: JUMPDEST
00000316: DUP3
00000317: ADD
00000318: SWAP2
00000319: SWAP1
0000031a: PUSH1 0x00
0000031c: MSTORE
0000031d: PUSH1 0x20
0000031f: PUSH1 0x00
00000321: KECCAK256
00000322: SWAP1
00000323: JUMPDEST
00000324: DUP2
00000325: SLOAD
00000326: DUP2
00000327: MSTORE
00000328: SWAP1
00000329: PUSH1 0x01
0000032b: ADD
0000032c: SWAP1
0000032d: PUSH1 0x20
0000032f: ADD
00000330: DUP1
00000331: DUP4
00000332: GT
00000333: PUSH2 0x0323
00000336: JUMPI
00000337: DUP3
00000338: SWAP1
00000339: SUB
0000033a: PUSH1 0x1f
0000033c: AND
0000033d: DUP3
0000033e: ADD
0000033f: SWAP2
00000340: JUMPDEST
00000341: POP
00000342: POP
00000343: POP
00000344: POP
00000345: POP
00000346: DUP2
00000347: JUMP
View stderr
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
high other detector Untrusted CALL target/value reachable 60 yes yes
view
trace_id: 0x7e661e94b7112e7813c79a42cb9c8847d21d411baa155f80647270317d753d9b
call_targets: 0x0000000000000000000000000000000000000004, 0x60efbf5404f35bb8d695d51839d32750a8d12775
target_varies: yes
classification: target_varies
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "confirmed",
    "attempts": 1,
    "trace_id": "0x7e661e94b7112e7813c79a42cb9c8847d21d411baa155f80647270317d753d9b",
    "confirmed": true,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x0000000000000000000000000000000000000004",
        "0x60efbf5404f35bb8d695d51839d32750a8d12775"
    ],
    "matched_probe": null,
    "target_varies": true,
    "classification": "target_varies"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x06fdde03",
            "selector": "0x06fdde03",
            "calldata_variants": [
                "0x06fdde03",
                "0x06fdde030000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x5a3b7e42",
            "selector": "0x5a3b7e42",
            "calldata_variants": [
                "0x5a3b7e42",
                "0x5a3b7e420000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xc7802177",
            "selector": "0xc7802177",
            "calldata_variants": [
                "0xc7802177",
                "0xc78021770000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 526,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 615,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 733,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "call_count": 3,
    "guards_detected": [],
    "untrusted_call_count": 3
}
high other detector ETH value transfer possible 55 yes yes
view
trace_id: 0x7e661e94b7112e7813c79a42cb9c8847d21d411baa155f80647270317d753d9b
call_targets: 0x0000000000000000000000000000000000000004, 0x60efbf5404f35bb8d695d51839d32750a8d12775
target_varies: yes
classification: target_varies
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "confirmed",
    "attempts": 1,
    "trace_id": "0x7e661e94b7112e7813c79a42cb9c8847d21d411baa155f80647270317d753d9b",
    "confirmed": true,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x0000000000000000000000000000000000000004",
        "0x60efbf5404f35bb8d695d51839d32750a8d12775"
    ],
    "matched_probe": null,
    "target_varies": true,
    "classification": "target_varies"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x06fdde03",
            "selector": "0x06fdde03",
            "calldata_variants": [
                "0x06fdde03",
                "0x06fdde030000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x5a3b7e42",
            "selector": "0x5a3b7e42",
            "calldata_variants": [
                "0x5a3b7e42",
                "0x5a3b7e420000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xc7802177",
            "selector": "0xc7802177",
            "calldata_variants": [
                "0xc7802177",
                "0xc78021770000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 526,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 615,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 733,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "eth_value_calls": 3,
    "guards_detected": []
}