019b3844-aba0-70d8-b87b-f29796a4351e
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 17257 | artifact.fetch | complete | 1 / 3 | 4 months ago |
| 17258 | tool.cast_disasm | complete | 1 / 3 | 4 months ago |
| 60726 | analysis.bundle | complete | 1 / 3 | 2 weeks ago |
| 60727 | capability.graph | complete | 1 / 3 | 2 weeks ago |
| 60728 | detector.run | complete | 1 / 3 | 2 weeks ago |
| 60729 | validation.fork | complete | 1 / 3 | 2 weeks ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH32 0x000000000000000000000000ad1d68a038fd2586067ef6d135d9628e79c2c924 00000021: CALLER 00000022: EQ 00000023: ISZERO 00000024: PUSH1 0x66 00000026: JUMPI 00000027: CALLDATASIZE 00000028: ISZERO 00000029: PUSH2 0x003e 0000002c: JUMPI 0000002d: PUSH0 0000002e: CALLDATALOAD 0000002f: PUSH1 0x80 00000031: SHL 00000032: TIMESTAMP 00000033: PUSH3 0x093a80 00000037: ADD 00000038: OR 00000039: PUSH0 0000003a: SSTORE 0000003b: PUSH1 0x66 0000003d: JUMP 0000003e: JUMPDEST 0000003f: PUSH0 00000040: SLOAD 00000041: DUP1 00000042: PUSH4 0xffffffff 00000047: AND 00000048: TIMESTAMP 00000049: GT 0000004a: PUSH1 0x50 0000004c: JUMPI 0000004d: PUSH1 0x62 0000004f: JUMP 00000050: JUMPDEST 00000051: PUSH1 0x80 00000053: SHR 00000054: PUSH0 00000055: PUSH0 00000056: PUSH0 00000057: PUSH0 00000058: SWAP4 00000059: CALLER 0000005a: GAS 0000005b: PUSH0 0000005c: PUSH0 0000005d: SSTORE 0000005e: CALL 0000005f: PUSH1 0x66 00000061: JUMPI 00000062: JUMPDEST 00000063: PUSH0 00000064: PUSH0 00000065: REVERT 00000066: JUMPDEST 00000067: PUSH0 00000068: PUSH0 00000069: RETURN
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| medium | other | detector | Untrusted CALL target/value reachable | 45 | no | no |
viewtrace_id: 0xdb1d7bd0035476060c9bce46e955334162995a21a1e4a1e78467d83771d77f98
call_targets:
0x02ba2c5835bf84fc03348de86d80cedea60367da
target_varies:
no
classification:
constant_target
validation_json{
"sink": "CALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0xdb1d7bd0035476060c9bce46e955334162995a21a1e4a1e78467d83771d77f98",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x02ba2c5835bf84fc03348de86d80cedea60367da"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 94,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "constant_zero",
"target_expression_category": "computed"
}
],
"call_count": 1,
"guards_detected": [
{
"pc": 34,
"type": "msg_sender_eq_const",
"value": 9.883112391619485e+47
}
],
"untrusted_call_count": 1
}
|