TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

019b477e-b2e3-7044-9e70-9ef5dbe5f743

complete
Chain ID
1
Address
Block Number
Created
Mon, Dec 22, 2025 7:17 PM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
2
Validated
2
Source
Bytecode only
Review Backing
Not yet
Best current signal
Untrusted CALL target/value reachable
crit 0 high 2 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
22443 artifact.fetch complete 1 / 3 3 months ago
22444 tool.cast_disasm complete 1 / 3 3 months ago
65710 analysis.bundle complete 1 / 3 1 week ago
65711 capability.graph complete 1 / 3 1 week ago
65712 detector.run complete 1 / 3 1 week ago
65713 validation.fork complete 1 / 3 1 week ago
113506 report.consolidate complete 1 / 6 1 week ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no
Implementation:
Verified Source: no

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate
Job Status
complete
Attempts
1 / 6
Findings
0
No findings?
View stderr
OpenAI Codex v0.118.0 (research preview)
--------
workdir: /tmp/codex-6b0wfjny
model: gpt-5.4
provider: openai
approval: never
sandbox: read-only
reasoning effort: high
reasoning summaries: none
session id: 019d5c95-ff48-7030-9d47-7dfcd548af6e
--------
user
You are a security auditor. You ONLY have runtime bytecode + analysis artifacts.
You MUST read `BYTECODE_BUNDLE.json` before concluding; it contains the bytecode summary,
evidence bundle, callsites, storage slots, and detector findings.

Special cases when reasoning from bytecode (be explicit about uncertainty):
- Selector inference is best-effort; missing selectors are common.
- Fallback/receive paths may be the only entrypoints.
- CALL vs DELEGATECALL semantics differ; DELEGATECALL executes in caller storage.
- Proxy patterns (EIP-1967, minimal proxies, beacon) change which storage is authoritative.
- Storage slots are raw; mappings/arrays appear via keccak patterns, names are unknown.
- Guard detection is heuristic; absence of guards does NOT mean unguarded.
- Returndata checking is unknown unless explicitly shown in evidence.
- Precompiles (0x1..0x9) and common ERC20 transfer selectors may appear; do not over-claim.

Output MUST be valid JSON matching the provided schema.
- If you find nothing meaningful: set no_findings=true and findings=[].
- Otherwise: set no_findings=false and include findings with severity/category/title.
- Locations can be pc references like "pc:0x123" or selectors like "selector:0xa9059cbb".

Focus on: reentrancy, access control, upgradeability/proxy issues, signature validation,
accounting/invariant breaks, dangerous delegatecall, and untrusted external calls.
Be conservative: if evidence is weak, mark severity low/medium and explain why.
warning: Codex could not find system bubblewrap on PATH. Please install bubblewrap with your package manager. Codex will use the vendored bubblewrap in the meantime.
ERROR: You've hit your usage limit. Visit https://chatgpt.com/codex/settings/usage to purchase more credits or try again at Apr 8th, 2026 9:11 AM.
ERROR: You've hit your usage limit. Visit https://chatgpt.com/codex/settings/usage to purchase more credits or try again at Apr 8th, 2026 9:11 AM.
Metadata
{
    "codex": {
        "ran_at": "2026-04-05T07:40:29.036109+00:00",
        "returncode": 1
    },
    "project": {
        "mode": "bytecode",
        "bytecode_length": 2032,
        "bytecode_truncated": false,
        "capability_graph_present": true,
        "analysis_artifact_present": true
    },
    "summary": null,
    "no_findings": null,
    "schema_version": 1
}

Opcode Heuristics

tool.cast_disasm
Delegatecall
0
Selfdestruct
0
CREATE2
0
CALL-family (heavy)
2
EXT*/BALANCE
2
Total opcodes
544
Flags
No heuristic flags raised.
View cast disassembly output
00000000: PUSH1 0x80
00000002: PUSH1 0x40
00000004: MSTORE
00000005: PUSH1 0x04
00000007: CALLDATASIZE
00000008: LT
00000009: PUSH2 0x004c
0000000c: JUMPI
0000000d: PUSH1 0x00
0000000f: CALLDATALOAD
00000010: PUSH29 0x0100000000000000000000000000000000000000000000000000000000
0000002e: SWAP1
0000002f: DIV
00000030: PUSH4 0xffffffff
00000035: AND
00000036: DUP1
00000037: PUSH4 0x14bfd6d0
0000003c: EQ
0000003d: PUSH2 0x01c9
00000040: JUMPI
00000041: DUP1
00000042: PUSH4 0xb69ef8a8
00000047: EQ
00000048: PUSH2 0x0236
0000004b: JUMPI
0000004c: JUMPDEST
0000004d: PUSH1 0x00
0000004f: DUP1
00000050: PUSH1 0x00
00000052: DUP1
00000053: PUSH1 0x00
00000055: CALLVALUE
00000056: SWAP5
00000057: POP
00000058: PUSH1 0x00
0000005a: DUP1
0000005b: SLOAD
0000005c: SWAP1
0000005d: POP
0000005e: DUP6
0000005f: DUP2
00000060: ISZERO
00000061: ISZERO
00000062: PUSH2 0x0067
00000065: JUMPI
00000066: INVALID
00000067: JUMPDEST
00000068: DIV
00000069: SWAP4
0000006a: POP
0000006b: PUSH1 0x00
0000006d: SWAP3
0000006e: POP
0000006f: PUSH1 0x00
00000071: SWAP2
00000072: POP
00000073: JUMPDEST
00000074: PUSH1 0x01
00000076: PUSH1 0x00
00000078: DUP1
00000079: SLOAD
0000007a: SWAP1
0000007b: POP
0000007c: SUB
0000007d: DUP3
0000007e: LT
0000007f: ISZERO
00000080: PUSH2 0x0128
00000083: JUMPI
00000084: PUSH1 0x00
00000086: DUP3
00000087: DUP2
00000088: SLOAD
00000089: DUP2
0000008a: LT
0000008b: ISZERO
0000008c: ISZERO
0000008d: PUSH2 0x0092
00000090: JUMPI
00000091: INVALID
00000092: JUMPDEST
00000093: SWAP1
00000094: PUSH1 0x00
00000096: MSTORE
00000097: PUSH1 0x20
00000099: PUSH1 0x00
0000009b: KECCAK256
0000009c: ADD
0000009d: PUSH1 0x00
0000009f: SWAP1
000000a0: SLOAD
000000a1: SWAP1
000000a2: PUSH2 0x0100
000000a5: EXP
000000a6: SWAP1
000000a7: DIV
000000a8: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000000bd: AND
000000be: SWAP1
000000bf: POP
000000c0: PUSH2 0x00d2
000000c3: DUP5
000000c4: DUP5
000000c5: PUSH2 0x0261
000000c8: SWAP1
000000c9: SWAP2
000000ca: SWAP1
000000cb: PUSH4 0xffffffff
000000d0: AND
000000d1: JUMP
000000d2: JUMPDEST
000000d3: SWAP3
000000d4: POP
000000d5: DUP1
000000d6: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000000eb: AND
000000ec: PUSH2 0x08fc
000000ef: DUP6
000000f0: SWAP1
000000f1: DUP2
000000f2: ISZERO
000000f3: MUL
000000f4: SWAP1
000000f5: PUSH1 0x40
000000f7: MLOAD
000000f8: PUSH1 0x00
000000fa: PUSH1 0x40
000000fc: MLOAD
000000fd: DUP1
000000fe: DUP4
000000ff: SUB
00000100: DUP2
00000101: DUP6
00000102: DUP9
00000103: DUP9
00000104: CALL
00000105: SWAP4
00000106: POP
00000107: POP
00000108: POP
00000109: POP
0000010a: ISZERO
0000010b: DUP1
0000010c: ISZERO
0000010d: PUSH2 0x011a
00000110: JUMPI
00000111: RETURNDATASIZE
00000112: PUSH1 0x00
00000114: DUP1
00000115: RETURNDATACOPY
00000116: RETURNDATASIZE
00000117: PUSH1 0x00
00000119: REVERT
0000011a: JUMPDEST
0000011b: POP
0000011c: DUP2
0000011d: DUP1
0000011e: PUSH1 0x01
00000120: ADD
00000121: SWAP3
00000122: POP
00000123: POP
00000124: PUSH2 0x0073
00000127: JUMP
00000128: JUMPDEST
00000129: PUSH1 0x00
0000012b: PUSH1 0x01
0000012d: PUSH1 0x00
0000012f: DUP1
00000130: SLOAD
00000131: SWAP1
00000132: POP
00000133: SUB
00000134: DUP2
00000135: SLOAD
00000136: DUP2
00000137: LT
00000138: ISZERO
00000139: ISZERO
0000013a: PUSH2 0x013f
0000013d: JUMPI
0000013e: INVALID
0000013f: JUMPDEST
00000140: SWAP1
00000141: PUSH1 0x00
00000143: MSTORE
00000144: PUSH1 0x20
00000146: PUSH1 0x00
00000148: KECCAK256
00000149: ADD
0000014a: PUSH1 0x00
0000014c: SWAP1
0000014d: SLOAD
0000014e: SWAP1
0000014f: PUSH2 0x0100
00000152: EXP
00000153: SWAP1
00000154: DIV
00000155: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000016a: AND
0000016b: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000180: AND
00000181: PUSH2 0x08fc
00000184: PUSH2 0x0196
00000187: DUP6
00000188: DUP9
00000189: PUSH2 0x02e9
0000018c: SWAP1
0000018d: SWAP2
0000018e: SWAP1
0000018f: PUSH4 0xffffffff
00000194: AND
00000195: JUMP
00000196: JUMPDEST
00000197: SWAP1
00000198: DUP2
00000199: ISZERO
0000019a: MUL
0000019b: SWAP1
0000019c: PUSH1 0x40
0000019e: MLOAD
0000019f: PUSH1 0x00
000001a1: PUSH1 0x40
000001a3: MLOAD
000001a4: DUP1
000001a5: DUP4
000001a6: SUB
000001a7: DUP2
000001a8: DUP6
000001a9: DUP9
000001aa: DUP9
000001ab: CALL
000001ac: SWAP4
000001ad: POP
000001ae: POP
000001af: POP
000001b0: POP
000001b1: ISZERO
000001b2: DUP1
000001b3: ISZERO
000001b4: PUSH2 0x01c1
000001b7: JUMPI
000001b8: RETURNDATASIZE
000001b9: PUSH1 0x00
000001bb: DUP1
000001bc: RETURNDATACOPY
000001bd: RETURNDATASIZE
000001be: PUSH1 0x00
000001c0: REVERT
000001c1: JUMPDEST
000001c2: POP
000001c3: POP
000001c4: POP
000001c5: POP
000001c6: POP
000001c7: POP
000001c8: STOP
000001c9: JUMPDEST
000001ca: CALLVALUE
000001cb: DUP1
000001cc: ISZERO
000001cd: PUSH2 0x01d5
000001d0: JUMPI
000001d1: PUSH1 0x00
000001d3: DUP1
000001d4: REVERT
000001d5: JUMPDEST
000001d6: POP
000001d7: PUSH2 0x01f4
000001da: PUSH1 0x04
000001dc: DUP1
000001dd: CALLDATASIZE
000001de: SUB
000001df: DUP2
000001e0: ADD
000001e1: SWAP1
000001e2: DUP1
000001e3: DUP1
000001e4: CALLDATALOAD
000001e5: SWAP1
000001e6: PUSH1 0x20
000001e8: ADD
000001e9: SWAP1
000001ea: SWAP3
000001eb: SWAP2
000001ec: SWAP1
000001ed: POP
000001ee: POP
000001ef: POP
000001f0: PUSH2 0x036e
000001f3: JUMP
000001f4: JUMPDEST
000001f5: PUSH1 0x40
000001f7: MLOAD
000001f8: DUP1
000001f9: DUP3
000001fa: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000020f: AND
00000210: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000225: AND
00000226: DUP2
00000227: MSTORE
00000228: PUSH1 0x20
0000022a: ADD
0000022b: SWAP2
0000022c: POP
0000022d: POP
0000022e: PUSH1 0x40
00000230: MLOAD
00000231: DUP1
00000232: SWAP2
00000233: SUB
00000234: SWAP1
00000235: RETURN
00000236: JUMPDEST
00000237: CALLVALUE
00000238: DUP1
00000239: ISZERO
0000023a: PUSH2 0x0242
0000023d: JUMPI
0000023e: PUSH1 0x00
00000240: DUP1
00000241: REVERT
00000242: JUMPDEST
00000243: POP
00000244: PUSH2 0x024b
00000247: PUSH2 0x03ac
0000024a: JUMP
0000024b: JUMPDEST
0000024c: PUSH1 0x40
0000024e: MLOAD
0000024f: DUP1
00000250: DUP3
00000251: DUP2
00000252: MSTORE
00000253: PUSH1 0x20
00000255: ADD
00000256: SWAP2
00000257: POP
00000258: POP
00000259: PUSH1 0x40
0000025b: MLOAD
0000025c: DUP1
0000025d: SWAP2
0000025e: SUB
0000025f: SWAP1
00000260: RETURN
00000261: JUMPDEST
00000262: PUSH1 0x00
00000264: DUP2
00000265: DUP4
00000266: ADD
00000267: SWAP1
00000268: POP
00000269: DUP3
0000026a: DUP2
0000026b: LT
0000026c: ISZERO
0000026d: ISZERO
0000026e: ISZERO
0000026f: PUSH2 0x02e0
00000272: JUMPI
00000273: PUSH1 0x40
00000275: MLOAD
00000276: PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
00000297: DUP2
00000298: MSTORE
00000299: PUSH1 0x04
0000029b: ADD
0000029c: DUP1
0000029d: DUP1
0000029e: PUSH1 0x20
000002a0: ADD
000002a1: DUP3
000002a2: DUP2
000002a3: SUB
000002a4: DUP3
000002a5: MSTORE
000002a6: PUSH1 0x13
000002a8: DUP2
000002a9: MSTORE
000002aa: PUSH1 0x20
000002ac: ADD
000002ad: DUP1
000002ae: PUSH32 0x536166654d61746820616464206661696c656400000000000000000000000000
000002cf: DUP2
000002d0: MSTORE
000002d1: POP
000002d2: PUSH1 0x20
000002d4: ADD
000002d5: SWAP2
000002d6: POP
000002d7: POP
000002d8: PUSH1 0x40
000002da: MLOAD
000002db: DUP1
000002dc: SWAP2
000002dd: SUB
000002de: SWAP1
000002df: REVERT
000002e0: JUMPDEST
000002e1: DUP1
000002e2: SWAP1
000002e3: POP
000002e4: SWAP3
000002e5: SWAP2
000002e6: POP
000002e7: POP
000002e8: JUMP
000002e9: JUMPDEST
000002ea: PUSH1 0x00
000002ec: DUP3
000002ed: DUP3
000002ee: GT
000002ef: ISZERO
000002f0: ISZERO
000002f1: ISZERO
000002f2: PUSH2 0x0363
000002f5: JUMPI
000002f6: PUSH1 0x40
000002f8: MLOAD
000002f9: PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
0000031a: DUP2
0000031b: MSTORE
0000031c: PUSH1 0x04
0000031e: ADD
0000031f: DUP1
00000320: DUP1
00000321: PUSH1 0x20
00000323: ADD
00000324: DUP3
00000325: DUP2
00000326: SUB
00000327: DUP3
00000328: MSTORE
00000329: PUSH1 0x13
0000032b: DUP2
0000032c: MSTORE
0000032d: PUSH1 0x20
0000032f: ADD
00000330: DUP1
00000331: PUSH32 0x536166654d61746820737562206661696c656400000000000000000000000000
00000352: DUP2
00000353: MSTORE
00000354: POP
00000355: PUSH1 0x20
00000357: ADD
00000358: SWAP2
00000359: POP
0000035a: POP
0000035b: PUSH1 0x40
0000035d: MLOAD
0000035e: DUP1
0000035f: SWAP2
00000360: SUB
00000361: SWAP1
00000362: REVERT
00000363: JUMPDEST
00000364: DUP2
00000365: DUP4
00000366: SUB
00000367: SWAP1
00000368: POP
00000369: SWAP3
0000036a: SWAP2
0000036b: POP
0000036c: POP
0000036d: JUMP
0000036e: JUMPDEST
0000036f: PUSH1 0x00
00000371: DUP2
00000372: DUP2
00000373: SLOAD
00000374: DUP2
00000375: LT
00000376: ISZERO
00000377: ISZERO
00000378: PUSH2 0x037d
0000037b: JUMPI
0000037c: INVALID
0000037d: JUMPDEST
0000037e: SWAP1
0000037f: PUSH1 0x00
00000381: MSTORE
00000382: PUSH1 0x20
00000384: PUSH1 0x00
00000386: KECCAK256
00000387: ADD
00000388: PUSH1 0x00
0000038a: SWAP2
0000038b: POP
0000038c: SLOAD
0000038d: SWAP1
0000038e: PUSH2 0x0100
00000391: EXP
00000392: SWAP1
00000393: DIV
00000394: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000003a9: AND
000003aa: DUP2
000003ab: JUMP
000003ac: JUMPDEST
000003ad: PUSH1 0x00
000003af: ADDRESS
000003b0: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000003c5: AND
000003c6: BALANCE
000003c7: SWAP1
000003c8: POP
000003c9: SWAP1
000003ca: JUMP
000003cb: STOP
000003cc: LOG1
000003cd: PUSH6 0x627a7a723058
000003d4: KECCAK256
000003d5: DUP2
000003d6: UNKNOWN(0xB8)
000003d7: UNKNOWN(0x0D)
000003d8: UNKNOWN(0xAC)
000003d9: UNKNOWN(0x4F)
000003da: SWAP9
000003db: GASLIMIT
000003dc: RETURNDATACOPY
000003dd: UNKNOWN(0xCE)
000003de: BALANCE
000003df: DUP1
000003e0: PUSH5 0x9061b6d7b9
000003e6: UNKNOWN(0xDA)
000003e7: GT
000003e8: LOG3
000003e9: UNKNOWN(0x0D)
000003ea: TSTORE
000003eb: UNKNOWN(0xAB)
000003ec: CODECOPY
000003ed: NUMBER
000003ee: MLOAD
000003ef: SWAP1
000003f0: UNKNOWN(0xC5)
000003f1: SWAP3
000003f2: RETURNDATACOPY
000003f3: UNKNOWN(0xE7)
000003f4: UNKNOWN(0xA9)
000003f5: STOP
000003f6: UNKNOWN(0x29)

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
high other detector Untrusted CALL target/value reachable 60 yes yes
view
trace_id: 0xd6f646a0bfbc347f172e2a065859f65d9f51c23601fdfcd27c7c43860d9bc1db
call_targets: 0x913db760d468485f463ef627e3080d17e60d411b, 0xd5e457122db4b7b31ed27665730d9a0278f639bc
target_varies: yes
classification: target_varies
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "confirmed",
    "attempts": 1,
    "trace_id": "0xd6f646a0bfbc347f172e2a065859f65d9f51c23601fdfcd27c7c43860d9bc1db",
    "confirmed": true,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x913db760d468485f463ef627e3080d17e60d411b",
        "0xd5e457122db4b7b31ed27665730d9a0278f639bc"
    ],
    "matched_probe": null,
    "target_varies": true,
    "classification": "target_varies"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0xffffffff",
            "selector": "0xffffffff",
            "calldata_variants": [
                "0xffffffff",
                "0xffffffff0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x14bfd6d0",
            "selector": "0x14bfd6d0",
            "calldata_variants": [
                "0x14bfd6d0",
                "0x14bfd6d00000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xb69ef8a8",
            "selector": "0xb69ef8a8",
            "calldata_variants": [
                "0xb69ef8a8",
                "0xb69ef8a80000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 260,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 427,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "call_count": 2,
    "guards_detected": [],
    "untrusted_call_count": 2
}
high other detector ETH value transfer possible 55 yes yes
view
trace_id: 0xd6f646a0bfbc347f172e2a065859f65d9f51c23601fdfcd27c7c43860d9bc1db
call_targets: 0x913db760d468485f463ef627e3080d17e60d411b, 0xd5e457122db4b7b31ed27665730d9a0278f639bc
target_varies: yes
classification: target_varies
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "confirmed",
    "attempts": 1,
    "trace_id": "0xd6f646a0bfbc347f172e2a065859f65d9f51c23601fdfcd27c7c43860d9bc1db",
    "confirmed": true,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x913db760d468485f463ef627e3080d17e60d411b",
        "0xd5e457122db4b7b31ed27665730d9a0278f639bc"
    ],
    "matched_probe": null,
    "target_varies": true,
    "classification": "target_varies"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0xffffffff",
            "selector": "0xffffffff",
            "calldata_variants": [
                "0xffffffff",
                "0xffffffff0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x14bfd6d0",
            "selector": "0x14bfd6d0",
            "calldata_variants": [
                "0x14bfd6d0",
                "0x14bfd6d00000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xb69ef8a8",
            "selector": "0xb69ef8a8",
            "calldata_variants": [
                "0xb69ef8a8",
                "0xb69ef8a80000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 260,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 427,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "eth_value_calls": 2,
    "guards_detected": []
}