019b3844-9512-714d-8d3b-8e1e4999ff89
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 13301 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 13302 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 112242 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 112243 | capability.graph | complete | 1 / 3 | 1 week ago |
| 112244 | detector.run | complete | 1 / 3 | 1 week ago |
| 112245 | validation.fork | complete | 1 / 3 | 1 week ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 0000001a: PUSH1 0x00 0000001c: SLOAD 0000001d: AND 0000001e: CALLDATASIZE 0000001f: PUSH1 0x00 00000021: DUP1 00000022: CALLDATACOPY 00000023: PUSH1 0x00 00000025: DUP1 00000026: CALLDATASIZE 00000027: PUSH1 0x00 00000029: DUP5 0000002a: GAS 0000002b: DELEGATECALL 0000002c: RETURNDATASIZE 0000002d: PUSH1 0x00 0000002f: DUP1 00000030: RETURNDATACOPY 00000031: PUSH1 0x00 00000033: DUP2 00000034: EQ 00000035: ISZERO 00000036: PUSH1 0x3d 00000038: JUMPI 00000039: RETURNDATASIZE 0000003a: PUSH1 0x00 0000003c: REVERT 0000003d: JUMPDEST 0000003e: RETURNDATASIZE 0000003f: PUSH1 0x00 00000041: RETURN 00000042: INVALID 00000043: LOG1 00000044: PUSH6 0x627a7a723058 0000004b: KECCAK256 0000004c: CLZ 0000004d: PUSH30 0x648b83cfac072cbccefc2ffc62a6999d4a050ee87a721942de1da9670db8 0000006c: STOP 0000006d: UNKNOWN(0x29)
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewtrace_id: 0x3d279f9dbba7b1e1ff2b7f26cb191263cd7c9e649b4e9a75aff8db29f05e676f
call_targets:
0xd9db270c1b5e3bd161e8c8503c55ceabee709552
target_varies:
no
classification:
constant_target
validation_json{
"sink": "DELEGATECALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x3d279f9dbba7b1e1ff2b7f26cb191263cd7c9e649b4e9a75aff8db29f05e676f",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0xd9db270c1b5e3bd161e8c8503c55ceabee709552"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 43,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 1,
"untrusted_delegatecall_count": 1
}
|