019b3844-98b8-725b-a832-c2feacf6fbf0
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 13959 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 13960 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 85212 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 85213 | capability.graph | complete | 1 / 3 | 1 week ago |
| 85214 | detector.run | complete | 1 / 3 | 1 week ago |
| 85215 | validation.fork | complete | 1 / 3 | 1 week ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: CALLDATASIZE 00000006: PUSH1 0x83 00000008: JUMPI 00000009: CALLER 0000000a: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 0000001f: AND 00000020: CALLVALUE 00000021: PUSH32 0x606834f57405380c4fb88d1f4850326ad3885f014bab3b568dfbf7a041eef738 00000042: PUSH1 0x00 00000044: CALLDATASIZE 00000045: PUSH1 0x40 00000047: MLOAD 00000048: DUP1 00000049: DUP1 0000004a: PUSH1 0x20 0000004c: ADD 0000004d: DUP3 0000004e: DUP2 0000004f: SUB 00000050: DUP3 00000051: MSTORE 00000052: DUP5 00000053: DUP5 00000054: DUP3 00000055: DUP2 00000056: DUP2 00000057: MSTORE 00000058: PUSH1 0x20 0000005a: ADD 0000005b: SWAP3 0000005c: POP 0000005d: DUP1 0000005e: DUP3 0000005f: DUP5 00000060: CALLDATACOPY 00000061: PUSH1 0x00 00000063: DUP4 00000064: DUP3 00000065: ADD 00000066: MSTORE 00000067: PUSH1 0x40 00000069: MLOAD 0000006a: PUSH1 0x1f 0000006c: SWAP1 0000006d: SWAP2 0000006e: ADD 0000006f: PUSH1 0x1f 00000071: NOT 00000072: AND 00000073: SWAP1 00000074: SWAP3 00000075: ADD 00000076: DUP3 00000077: SWAP1 00000078: SUB 00000079: SWAP6 0000007a: POP 0000007b: SWAP1 0000007c: SWAP4 0000007d: POP 0000007e: POP 0000007f: POP 00000080: POP 00000081: LOG3 00000082: STOP 00000083: JUMPDEST 00000084: PUSH1 0x00 00000086: DUP1 00000087: SLOAD 00000088: CALLDATASIZE 00000089: DUP3 0000008a: DUP4 0000008b: CALLDATACOPY 0000008c: DUP2 0000008d: DUP3 0000008e: CALLDATASIZE 0000008f: DUP5 00000090: DUP5 00000091: GAS 00000092: DELEGATECALL 00000093: SWAP1 00000094: POP 00000095: RETURNDATASIZE 00000096: DUP3 00000097: DUP4 00000098: RETURNDATACOPY 00000099: DUP1 0000009a: DUP1 0000009b: ISZERO 0000009c: PUSH1 0xa2 0000009e: JUMPI 0000009f: RETURNDATASIZE 000000a0: DUP4 000000a1: RETURN 000000a2: JUMPDEST 000000a3: RETURNDATASIZE 000000a4: DUP4 000000a5: REVERT 000000a6: INVALID 000000a7: LOG2 000000a8: PUSH5 0x6970667358 000000ae: UNKNOWN(0x22) 000000af: SLT 000000b0: KECCAK256 000000b1: UNKNOWN(0xBE) 000000b2: UNKNOWN(0x24) 000000b3: UNKNOWN(0xB9) 000000b4: BALANCE 000000b5: SWAP1 000000b6: SWAP1 000000b7: PUSH14 0x77639a34f833222a884fa6380809 000000c6: UNKNOWN(0xE0) 000000c7: UNKNOWN(0xCF) 000000c8: SWAP9 000000c9: UNKNOWN(0xEB) 000000ca: PUSH26
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewvalidation_json{
"sink": "DELEGATECALL",
"errors": 10,
"status": "unknown",
"attempts": 11,
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": null,
"matched_probe": null,
"target_varies": null,
"classification": "no_sink"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 146,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 1,
"untrusted_delegatecall_count": 1
}
|