019b3844-b95d-72f8-b5b6-8ac1d12f7e35
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 19823 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 19824 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 110390 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 110391 | capability.graph | complete | 1 / 3 | 1 week ago |
| 110392 | detector.run | complete | 1 / 3 | 1 week ago |
| 110393 | validation.fork | complete | 1 / 3 | 1 week ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: PUSH1 0x00 00000007: SLOAD 00000008: PUSH4 0xa619486e 0000000d: PUSH1 0x00 0000000f: CALLDATALOAD 00000010: PUSH1 0xe0 00000012: SHR 00000013: EQ 00000014: ISZERO 00000015: PUSH1 0x24 00000017: JUMPI 00000018: DUP1 00000019: PUSH1 0x60 0000001b: SHL 0000001c: PUSH1 0x6c 0000001e: MSTORE 0000001f: PUSH1 0x20 00000021: PUSH1 0x60 00000023: RETURN 00000024: JUMPDEST 00000025: CALLDATASIZE 00000026: PUSH1 0x00 00000028: DUP1 00000029: CALLDATACOPY 0000002a: PUSH1 0x00 0000002c: DUP1 0000002d: CALLDATASIZE 0000002e: PUSH1 0x00 00000030: DUP5 00000031: GAS 00000032: DELEGATECALL 00000033: RETURNDATASIZE 00000034: PUSH1 0x00 00000036: DUP1 00000037: RETURNDATACOPY 00000038: DUP1 00000039: PUSH1 0x40 0000003b: JUMPI 0000003c: RETURNDATASIZE 0000003d: PUSH1 0x00 0000003f: REVERT 00000040: JUMPDEST 00000041: RETURNDATASIZE 00000042: PUSH1 0x00 00000044: RETURN 00000045: INVALID 00000046: LOG2 00000047: PUSH5 0x6970667358 0000004d: UNKNOWN(0x22) 0000004e: SLT 0000004f: KECCAK256 00000050: UNKNOWN(0xE6) 00000051: XOR 00000052: CALLVALUE 00000053: UNKNOWN(0xEB) 00000054: UNKNOWN(0xD2) 00000055: UNKNOWN(0xD8) 00000056: UNKNOWN(0xCD) 00000057: SWAP1 00000058: SWAP14 00000059: CALLDATASIZE 0000005a: UNKNOWN(0x2B) 0000005b: UNKNOWN(0xF6) 0000005c: PUSH29 0x47ef58fd665df38e6dd036ce65611101d072e964736f6c634300070600 0000007a: CALLER
Warning: This is a nightly build of Foundry. It is recommended to use the latest stable version. To mute this warning set `FOUNDRY_DISABLE_NIGHTLY_WARNING` in your environment.
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewtrace_id: 0x30ef10b049ca12f50103c1a26c0f68b76c43bdf39087ec421bf15d4a599bb63f
call_targets:
0xedd160febbd92e350d4d398fb636302fccd67c7e
target_varies:
no
classification:
constant_target
validation_json{
"sink": "DELEGATECALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x30ef10b049ca12f50103c1a26c0f68b76c43bdf39087ec421bf15d4a599bb63f",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0xedd160febbd92e350d4d398fb636302fccd67c7e"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 50,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 1,
"untrusted_delegatecall_count": 1
}
|