019b477e-a73c-7056-82cc-318bd505246d
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 20219 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 20220 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 88345 | analysis.bundle | complete | 1 / 3 | 2 weeks ago |
| 88346 | capability.graph | complete | 1 / 3 | 2 weeks ago |
| 88347 | detector.run | complete | 1 / 3 | 2 weeks ago |
| 88348 | validation.fork | complete | 1 / 3 | 2 weeks ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x60 00000002: PUSH1 0x40 00000004: MSTORE 00000005: CALLDATASIZE 00000006: ISZERO 00000007: PUSH2 0x0048 0000000a: JUMPI 0000000b: PUSH1 0x00 0000000d: CALLDATALOAD 0000000e: PUSH29 0x0100000000000000000000000000000000000000000000000000000000 0000002c: SWAP1 0000002d: DIV 0000002e: DUP1 0000002f: PUSH4 0x41c0e1b5 00000034: EQ 00000035: PUSH2 0x009f 00000038: JUMPI 00000039: DUP1 0000003a: PUSH4 0xe5225381 0000003f: EQ 00000040: PUSH2 0x00ac 00000043: JUMPI 00000044: PUSH2 0x0048 00000047: JUMP 00000048: JUMPDEST 00000049: PUSH2 0x009d 0000004c: JUMPDEST 0000004d: CALLER 0000004e: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000063: AND 00000064: PUSH32 0xe1fffcc4923d04b559f4d29a8bfc6cda04eb5b0d3c460751c2402c5c5cc9109c 00000085: CALLVALUE 00000086: PUSH1 0x40 00000088: MLOAD 00000089: DUP1 0000008a: DUP3 0000008b: DUP2 0000008c: MSTORE 0000008d: PUSH1 0x20 0000008f: ADD 00000090: SWAP2 00000091: POP 00000092: POP 00000093: PUSH1 0x40 00000095: MLOAD 00000096: DUP1 00000097: SWAP2 00000098: SUB 00000099: SWAP1 0000009a: LOG2 0000009b: JUMPDEST 0000009c: JUMP 0000009d: JUMPDEST 0000009e: STOP 0000009f: JUMPDEST 000000a0: PUSH2 0x00aa 000000a3: PUSH1 0x04 000000a5: POP 000000a6: PUSH2 0x00b9 000000a9: JUMP 000000aa: JUMPDEST 000000ab: STOP 000000ac: JUMPDEST 000000ad: PUSH2 0x00b7 000000b0: PUSH1 0x04 000000b2: POP 000000b3: PUSH2 0x014d 000000b6: JUMP 000000b7: JUMPDEST 000000b8: STOP 000000b9: JUMPDEST 000000ba: PUSH1 0x00 000000bc: PUSH1 0x00 000000be: SWAP1 000000bf: SLOAD 000000c0: SWAP1 000000c1: PUSH2 0x0100 000000c4: EXP 000000c5: SWAP1 000000c6: DIV 000000c7: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 000000dc: AND 000000dd: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 000000f2: AND 000000f3: CALLER 000000f4: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000109: AND 0000010a: EQ 0000010b: ISZERO 0000010c: PUSH2 0x014a 0000010f: JUMPI 00000110: PUSH1 0x00 00000112: PUSH1 0x00 00000114: SWAP1 00000115: SLOAD 00000116: SWAP1 00000117: PUSH2 0x0100 0000011a: EXP 0000011b: SWAP1 0000011c: DIV 0000011d: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000132: AND 00000133: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000148: AND 00000149: SELFDESTRUCT 0000014a: JUMPDEST 0000014b: JUMPDEST 0000014c: JUMP 0000014d: JUMPDEST 0000014e: PUSH1 0x00 00000150: PUSH1 0x00 00000152: SWAP1 00000153: SLOAD 00000154: SWAP1 00000155: PUSH2 0x0100 00000158: EXP 00000159: SWAP1 0000015a: DIV 0000015b: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000170: AND 00000171: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000186: AND 00000187: CALLER 00000188: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 0000019d: AND 0000019e: EQ 0000019f: ISZERO 000001a0: PUSH2 0x0210 000001a3: JUMPI 000001a4: PUSH1 0x00 000001a6: PUSH1 0x00 000001a8: SWAP1 000001a9: SLOAD 000001aa: SWAP1 000001ab: PUSH2 0x0100 000001ae: EXP 000001af: SWAP1 000001b0: DIV 000001b1: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 000001c6: AND 000001c7: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 000001dc: AND 000001dd: PUSH1 0x00 000001df: ADDRESS 000001e0: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 000001f5: AND 000001f6: BALANCE 000001f7: PUSH1 0x40 000001f9: MLOAD 000001fa: DUP1 000001fb: SWAP1 000001fc: POP 000001fd: PUSH1 0x00 000001ff: PUSH1 0x40 00000201: MLOAD 00000202: DUP1 00000203: DUP4 00000204: SUB 00000205: DUP2 00000206: DUP6 00000207: DUP9 00000208: DUP9 00000209: CALL 0000020a: SWAP4 0000020b: POP 0000020c: POP 0000020d: POP 0000020e: POP 0000020f: POP 00000210: JUMPDEST 00000211: JUMPDEST 00000212: JUMP
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| medium | other | detector | SELFDESTRUCT reachable | 45 | no | no |
viewtrace_id: 0x586aa3baca6b53528479721212e350098f6d501df494ff3641e58f8d2b888843
validation_json{
"sink": "SELFDESTRUCT",
"errors": 0,
"status": "unknown",
"attempts": 4,
"trace_id": "0x586aa3baca6b53528479721212e350098f6d501df494ff3641e58f8d2b888843",
"confirmed": false,
"trace_mode": "structLogs",
"call_targets": null,
"matched_probe": null,
"target_varies": null,
"classification": "no_sink"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x41c0e1b5",
"selector": "0x41c0e1b5",
"calldata_variants": [
"0x41c0e1b5",
"0x41c0e1b50000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0xe5225381",
"selector": "0xe5225381",
"calldata_variants": [
"0xe5225381",
"0xe52253810000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"guards_detected": [
{
"pc": 243,
"type": "msg_sender_eq_const",
"value": "0xffffffffffffffffffffffffffffffffffffffff"
},
{
"pc": 391,
"type": "msg_sender_eq_const",
"value": "0xffffffffffffffffffffffffffffffffffffffff"
}
],
"selfdestruct_count": 1
}
|
| medium | other | detector | Untrusted CALL target/value reachable | 45 | no | no |
viewtrace_id: 0xc14a1248f501f759bfe1b014b9477cc92ef466f6e0181f8e069cd70624b48da5
call_targets:
0x986058b63c1d3ed610b7ca4cb9cd869a6767da20
target_varies:
no
classification:
constant_target
validation_json{
"sink": "CALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0xc14a1248f501f759bfe1b014b9477cc92ef466f6e0181f8e069cd70624b48da5",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x986058b63c1d3ed610b7ca4cb9cd869a6767da20"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x41c0e1b5",
"selector": "0x41c0e1b5",
"calldata_variants": [
"0x41c0e1b5",
"0x41c0e1b50000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0xe5225381",
"selector": "0xe5225381",
"calldata_variants": [
"0xe5225381",
"0xe52253810000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 521,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"call_count": 1,
"guards_detected": [
{
"pc": 243,
"type": "msg_sender_eq_const",
"value": "0xffffffffffffffffffffffffffffffffffffffff"
},
{
"pc": 391,
"type": "msg_sender_eq_const",
"value": "0xffffffffffffffffffffffffffffffffffffffff"
}
],
"untrusted_call_count": 1
}
|
| medium | other | detector | ETH value transfer possible | 40 | no | no |
viewtrace_id: 0xc14a1248f501f759bfe1b014b9477cc92ef466f6e0181f8e069cd70624b48da5
call_targets:
0x986058b63c1d3ed610b7ca4cb9cd869a6767da20
target_varies:
no
classification:
constant_target
validation_json{
"sink": "CALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0xc14a1248f501f759bfe1b014b9477cc92ef466f6e0181f8e069cd70624b48da5",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x986058b63c1d3ed610b7ca4cb9cd869a6767da20"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x41c0e1b5",
"selector": "0x41c0e1b5",
"calldata_variants": [
"0x41c0e1b5",
"0x41c0e1b50000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0xe5225381",
"selector": "0xe5225381",
"calldata_variants": [
"0xe5225381",
"0xe52253810000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 521,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"eth_value_calls": 1,
"guards_detected": [
{
"pc": 243,
"type": "msg_sender_eq_const",
"value": "0xffffffffffffffffffffffffffffffffffffffff"
},
{
"pc": 391,
"type": "msg_sender_eq_const",
"value": "0xffffffffffffffffffffffffffffffffffffffff"
}
]
}
|