TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

019b3844-adce-7061-9abb-ba6a4073ad37

complete
Chain ID
1
Address
Block Number
Created
Fri, Dec 19, 2025 8:19 PM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
0
Validated
0
Source
Bytecode only
Review Backing
Not yet
Best current signal
No finding summary available yet.
crit 0 high 0 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
17673 artifact.fetch complete 1 / 3 4 months ago
17674 tool.cast_disasm complete 1 / 3 4 months ago
86688 analysis.bundle complete 1 / 3 3 weeks ago
86689 capability.graph complete 1 / 3 3 weeks ago
86690 detector.run complete 1 / 3 3 weeks ago
86691 validation.fork complete 1 / 3 3 weeks ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no
Implementation:
Verified Source: no

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate

No codex job recorded yet.

Opcode Heuristics

tool.cast_disasm
Delegatecall
1
Selfdestruct
0
CREATE2
0
CALL-family (heavy)
0
EXT*/BALANCE
0
Total opcodes
85
Flags
delegatecall_present
View cast disassembly output
00000000: CALLDATASIZE
00000001: PUSH1 0x2f
00000003: JUMPI
00000004: CALLVALUE
00000005: RETURNDATASIZE
00000006: MSTORE
00000007: PUSH32 0x9e4ac34f21c619cefc926c8bd93b54bf5a39c7ab2127a895af1cc0691d7e3dff
00000028: PUSH1 0x20
0000002a: RETURNDATASIZE
0000002b: LOG1
0000002c: RETURNDATASIZE
0000002d: RETURNDATASIZE
0000002e: RETURN
0000002f: JUMPDEST
00000030: RETURNDATASIZE
00000031: RETURNDATASIZE
00000032: RETURNDATASIZE
00000033: RETURNDATASIZE
00000034: CALLDATASIZE
00000035: RETURNDATASIZE
00000036: RETURNDATASIZE
00000037: CALLDATACOPY
00000038: PUSH2 0x0036
0000003b: PUSH1 0x67
0000003d: CALLDATASIZE
0000003e: CODECOPY
0000003f: CALLDATASIZE
00000040: PUSH2 0x0036
00000043: ADD
00000044: RETURNDATASIZE
00000045: PUSH20 0x652a2a2876b855d9c30d9265f882f0a486608976
0000005a: GAS
0000005b: DELEGATECALL
0000005c: RETURNDATASIZE
0000005d: RETURNDATASIZE
0000005e: SWAP4
0000005f: DUP1
00000060: RETURNDATACOPY
00000061: PUSH1 0x65
00000063: JUMPI
00000064: REVERT
00000065: JUMPDEST
00000066: RETURN
00000067: UNKNOWN(0x2E)
00000068: BYTE
00000069: UNKNOWN(0x28)
0000006a: UNKNOWN(0x23)
0000006b: UNKNOWN(0xB6)
0000006c: UNKNOWN(0xE6)
0000006d: MCOPY
0000006e: PUSH11 0xc46bad6e0cc4096976fc26
0000007a: MCOPY
0000007b: STOP
0000007c: STOP
0000007d: STOP
0000007e: STOP
0000007f: STOP
00000080: STOP
00000081: STOP
00000082: STOP
00000083: STOP
00000084: STOP
00000085: STOP
00000086: STOP
00000087: STOP
00000088: STOP
00000089: STOP
0000008a: STOP
0000008b: STOP
0000008c: STOP
0000008d: STOP
0000008e: STOP
0000008f: STOP
00000090: STOP
00000091: STOP
00000092: STOP
00000093: STOP
00000094: STOP
00000095: STOP
00000096: STOP
00000097: SMOD
00000098: DUP7
00000099: ISZERO
0000009a: PUSH1 0x00
0000009c: CALLVALUE
View stderr
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
No findings yet.