TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

019b477e-b560-716a-959c-d9c06ca59738

complete
Chain ID
1
Address
Block Number
Created
Mon, Dec 22, 2025 7:17 PM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
0
Validated
0
Source
Bytecode only
Review Backing
Not yet
Best current signal
Untrusted CALL target/value reachable
crit 0 high 0 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
22913 artifact.fetch complete 1 / 3 3 months ago
22914 tool.cast_disasm complete 1 / 3 3 months ago
107473 analysis.bundle complete 1 / 3 1 week ago
107474 capability.graph complete 1 / 3 1 week ago
107475 detector.run complete 1 / 3 1 week ago
107476 validation.fork complete 1 / 3 1 week ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no
Implementation:
Verified Source: no

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate

No codex job recorded yet.

Opcode Heuristics

tool.cast_disasm
Delegatecall
0
Selfdestruct
0
CREATE2
0
CALL-family (heavy)
2
EXT*/BALANCE
1
Total opcodes
441
Flags
No heuristic flags raised.
View cast disassembly output
00000000: PUSH1 0x80
00000002: PUSH1 0x40
00000004: MSTORE
00000005: PUSH1 0x04
00000007: CALLDATASIZE
00000008: LT
00000009: PUSH2 0x0056
0000000c: JUMPI
0000000d: PUSH4 0xffffffff
00000012: PUSH29 0x0100000000000000000000000000000000000000000000000000000000
00000030: PUSH1 0x00
00000032: CALLDATALOAD
00000033: DIV
00000034: AND
00000035: PUSH4 0x69076788
0000003a: DUP2
0000003b: EQ
0000003c: PUSH2 0x0086
0000003f: JUMPI
00000040: DUP1
00000041: PUSH4 0xbbe233fa
00000046: EQ
00000047: PUSH2 0x00b7
0000004a: JUMPI
0000004b: DUP1
0000004c: PUSH4 0xd9caed12
00000051: EQ
00000052: PUSH2 0x00cc
00000055: JUMPI
00000056: JUMPDEST
00000057: PUSH1 0x00
00000059: SLOAD
0000005a: PUSH1 0x01
0000005c: PUSH1 0xa0
0000005e: PUSH1 0x02
00000060: EXP
00000061: SUB
00000062: AND
00000063: CALLER
00000064: EQ
00000065: DUP1
00000066: PUSH2 0x0079
00000069: JUMPI
0000006a: POP
0000006b: PUSH1 0x01
0000006d: SLOAD
0000006e: PUSH1 0x01
00000070: PUSH1 0xa0
00000072: PUSH1 0x02
00000074: EXP
00000075: SUB
00000076: AND
00000077: CALLER
00000078: EQ
00000079: JUMPDEST
0000007a: ISZERO
0000007b: ISZERO
0000007c: PUSH2 0x0084
0000007f: JUMPI
00000080: PUSH1 0x00
00000082: DUP1
00000083: REVERT
00000084: JUMPDEST
00000085: STOP
00000086: JUMPDEST
00000087: CALLVALUE
00000088: DUP1
00000089: ISZERO
0000008a: PUSH2 0x0092
0000008d: JUMPI
0000008e: PUSH1 0x00
00000090: DUP1
00000091: REVERT
00000092: JUMPDEST
00000093: POP
00000094: PUSH2 0x009b
00000097: PUSH2 0x010a
0000009a: JUMP
0000009b: JUMPDEST
0000009c: PUSH1 0x40
0000009e: DUP1
0000009f: MLOAD
000000a0: PUSH1 0x01
000000a2: PUSH1 0xa0
000000a4: PUSH1 0x02
000000a6: EXP
000000a7: SUB
000000a8: SWAP1
000000a9: SWAP3
000000aa: AND
000000ab: DUP3
000000ac: MSTORE
000000ad: MLOAD
000000ae: SWAP1
000000af: DUP2
000000b0: SWAP1
000000b1: SUB
000000b2: PUSH1 0x20
000000b4: ADD
000000b5: SWAP1
000000b6: RETURN
000000b7: JUMPDEST
000000b8: CALLVALUE
000000b9: DUP1
000000ba: ISZERO
000000bb: PUSH2 0x00c3
000000be: JUMPI
000000bf: PUSH1 0x00
000000c1: DUP1
000000c2: REVERT
000000c3: JUMPDEST
000000c4: POP
000000c5: PUSH2 0x009b
000000c8: PUSH2 0x0119
000000cb: JUMP
000000cc: JUMPDEST
000000cd: CALLVALUE
000000ce: DUP1
000000cf: ISZERO
000000d0: PUSH2 0x00d8
000000d3: JUMPI
000000d4: PUSH1 0x00
000000d6: DUP1
000000d7: REVERT
000000d8: JUMPDEST
000000d9: POP
000000da: PUSH2 0x00f6
000000dd: PUSH1 0x01
000000df: PUSH1 0xa0
000000e1: PUSH1 0x02
000000e3: EXP
000000e4: SUB
000000e5: PUSH1 0x04
000000e7: CALLDATALOAD
000000e8: DUP2
000000e9: AND
000000ea: SWAP1
000000eb: PUSH1 0x24
000000ed: CALLDATALOAD
000000ee: AND
000000ef: PUSH1 0x44
000000f1: CALLDATALOAD
000000f2: PUSH2 0x0128
000000f5: JUMP
000000f6: JUMPDEST
000000f7: PUSH1 0x40
000000f9: DUP1
000000fa: MLOAD
000000fb: SWAP2
000000fc: ISZERO
000000fd: ISZERO
000000fe: DUP3
000000ff: MSTORE
00000100: MLOAD
00000101: SWAP1
00000102: DUP2
00000103: SWAP1
00000104: SUB
00000105: PUSH1 0x20
00000107: ADD
00000108: SWAP1
00000109: RETURN
0000010a: JUMPDEST
0000010b: PUSH1 0x00
0000010d: SLOAD
0000010e: PUSH1 0x01
00000110: PUSH1 0xa0
00000112: PUSH1 0x02
00000114: EXP
00000115: SUB
00000116: AND
00000117: DUP2
00000118: JUMP
00000119: JUMPDEST
0000011a: PUSH1 0x01
0000011c: SLOAD
0000011d: PUSH1 0x01
0000011f: PUSH1 0xa0
00000121: PUSH1 0x02
00000123: EXP
00000124: SUB
00000125: AND
00000126: DUP2
00000127: JUMP
00000128: JUMPDEST
00000129: PUSH1 0x00
0000012b: DUP1
0000012c: SLOAD
0000012d: PUSH1 0x01
0000012f: PUSH1 0xa0
00000131: PUSH1 0x02
00000133: EXP
00000134: SUB
00000135: AND
00000136: CALLER
00000137: EQ
00000138: DUP1
00000139: PUSH2 0x014c
0000013c: JUMPI
0000013d: POP
0000013e: PUSH1 0x01
00000140: SLOAD
00000141: PUSH1 0x01
00000143: PUSH1 0xa0
00000145: PUSH1 0x02
00000147: EXP
00000148: SUB
00000149: AND
0000014a: CALLER
0000014b: EQ
0000014c: JUMPDEST
0000014d: ISZERO
0000014e: ISZERO
0000014f: PUSH2 0x01df
00000152: JUMPI
00000153: PUSH1 0x40
00000155: DUP1
00000156: MLOAD
00000157: PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
00000178: DUP2
00000179: MSTORE
0000017a: PUSH1 0x20
0000017c: PUSH1 0x04
0000017e: DUP3
0000017f: ADD
00000180: MSTORE
00000181: PUSH1 0x37
00000183: PUSH1 0x24
00000185: DUP3
00000186: ADD
00000187: MSTORE
00000188: PUSH32 0x5468652063616c6c6572206973206e6f7420616c6c6f77656420746f20616363
000001a9: PUSH1 0x44
000001ab: DUP3
000001ac: ADD
000001ad: MSTORE
000001ae: PUSH32 0x6573732074686973206465706f73697420686f6c646572000000000000000000
000001cf: PUSH1 0x64
000001d1: DUP3
000001d2: ADD
000001d3: MSTORE
000001d4: SWAP1
000001d5: MLOAD
000001d6: SWAP1
000001d7: DUP2
000001d8: SWAP1
000001d9: SUB
000001da: PUSH1 0x84
000001dc: ADD
000001dd: SWAP1
000001de: REVERT
000001df: JUMPDEST
000001e0: PUSH1 0x01
000001e2: PUSH1 0xa0
000001e4: PUSH1 0x02
000001e6: EXP
000001e7: SUB
000001e8: DUP5
000001e9: AND
000001ea: ISZERO
000001eb: ISZERO
000001ec: PUSH2 0x022f
000001ef: JUMPI
000001f0: PUSH1 0x40
000001f2: MLOAD
000001f3: PUSH1 0x01
000001f5: PUSH1 0xa0
000001f7: PUSH1 0x02
000001f9: EXP
000001fa: SUB
000001fb: DUP5
000001fc: AND
000001fd: SWAP1
000001fe: DUP4
000001ff: ISZERO
00000200: PUSH2 0x08fc
00000203: MUL
00000204: SWAP1
00000205: DUP5
00000206: SWAP1
00000207: PUSH1 0x00
00000209: DUP2
0000020a: DUP2
0000020b: DUP2
0000020c: DUP6
0000020d: DUP9
0000020e: DUP9
0000020f: CALL
00000210: SWAP4
00000211: POP
00000212: POP
00000213: POP
00000214: POP
00000215: ISZERO
00000216: DUP1
00000217: ISZERO
00000218: PUSH2 0x0225
0000021b: JUMPI
0000021c: RETURNDATASIZE
0000021d: PUSH1 0x00
0000021f: DUP1
00000220: RETURNDATACOPY
00000221: RETURNDATASIZE
00000222: PUSH1 0x00
00000224: REVERT
00000225: JUMPDEST
00000226: POP
00000227: PUSH1 0x01
00000229: SWAP1
0000022a: POP
0000022b: PUSH2 0x02da
0000022e: JUMP
0000022f: JUMPDEST
00000230: DUP4
00000231: PUSH1 0x01
00000233: PUSH1 0xa0
00000235: PUSH1 0x02
00000237: EXP
00000238: SUB
00000239: AND
0000023a: PUSH4 0xa9059cbb
0000023f: DUP5
00000240: DUP5
00000241: PUSH1 0x40
00000243: MLOAD
00000244: DUP4
00000245: PUSH4 0xffffffff
0000024a: AND
0000024b: PUSH29 0x0100000000000000000000000000000000000000000000000000000000
00000269: MUL
0000026a: DUP2
0000026b: MSTORE
0000026c: PUSH1 0x04
0000026e: ADD
0000026f: DUP1
00000270: DUP4
00000271: PUSH1 0x01
00000273: PUSH1 0xa0
00000275: PUSH1 0x02
00000277: EXP
00000278: SUB
00000279: AND
0000027a: PUSH1 0x01
0000027c: PUSH1 0xa0
0000027e: PUSH1 0x02
00000280: EXP
00000281: SUB
00000282: AND
00000283: DUP2
00000284: MSTORE
00000285: PUSH1 0x20
00000287: ADD
00000288: DUP3
00000289: DUP2
0000028a: MSTORE
0000028b: PUSH1 0x20
0000028d: ADD
0000028e: SWAP3
0000028f: POP
00000290: POP
00000291: POP
00000292: PUSH1 0x20
00000294: PUSH1 0x40
00000296: MLOAD
00000297: DUP1
00000298: DUP4
00000299: SUB
0000029a: DUP2
0000029b: PUSH1 0x00
0000029d: DUP8
0000029e: DUP1
0000029f: EXTCODESIZE
000002a0: ISZERO
000002a1: DUP1
000002a2: ISZERO
000002a3: PUSH2 0x02ab
000002a6: JUMPI
000002a7: PUSH1 0x00
000002a9: DUP1
000002aa: REVERT
000002ab: JUMPDEST
000002ac: POP
000002ad: GAS
000002ae: CALL
000002af: ISZERO
000002b0: DUP1
000002b1: ISZERO
000002b2: PUSH2 0x02bf
000002b5: JUMPI
000002b6: RETURNDATASIZE
000002b7: PUSH1 0x00
000002b9: DUP1
000002ba: RETURNDATACOPY
000002bb: RETURNDATASIZE
000002bc: PUSH1 0x00
000002be: REVERT
000002bf: JUMPDEST
000002c0: POP
000002c1: POP
000002c2: POP
000002c3: POP
000002c4: PUSH1 0x40
000002c6: MLOAD
000002c7: RETURNDATASIZE
000002c8: PUSH1 0x20
000002ca: DUP2
000002cb: LT
000002cc: ISZERO
000002cd: PUSH2 0x02d5
000002d0: JUMPI
000002d1: PUSH1 0x00
000002d3: DUP1
000002d4: REVERT
000002d5: JUMPDEST
000002d6: POP
000002d7: MLOAD
000002d8: SWAP1
000002d9: POP
000002da: JUMPDEST
000002db: SWAP4
000002dc: SWAP3
000002dd: POP
000002de: POP
000002df: POP
000002e0: JUMP
000002e1: STOP
000002e2: LOG1
000002e3: PUSH6 0x627a7a723058
000002ea: KECCAK256
000002eb: UNKNOWN(0x0C)
000002ec: UNKNOWN(0xEB)
000002ed: SMOD
000002ee: UNKNOWN(0xB8)
000002ef: CALLDATASIZE
000002f0: UNKNOWN(0xCB)
000002f1: SWAP8
000002f2: ADD
000002f3: CALLDATASIZE
000002f4: PUSH5 0xfffadefbe0
000002fa: UNKNOWN(0x24)
000002fb: PUSH18

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
high other detector Untrusted CALL target/value reachable 60 no no
view
trace_id: 0x0a10be0b7e350b4e52a55185ac7b7fc4d2153c6421aa8ec50df2d422e91503bf
call_targets: 0xe38ec8e623a69c9b6076f75b6a3254b2d4330f40
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0x0a10be0b7e350b4e52a55185ac7b7fc4d2153c6421aa8ec50df2d422e91503bf",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0xe38ec8e623a69c9b6076f75b6a3254b2d4330f40"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x69076788",
            "selector": "0x69076788",
            "calldata_variants": [
                "0x69076788",
                "0x690767880000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xbbe233fa",
            "selector": "0xbbe233fa",
            "calldata_variants": [
                "0xbbe233fa",
                "0xbbe233fa0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xd9caed12",
            "selector": "0xd9caed12",
            "calldata_variants": [
                "0xd9caed12",
                "0xd9caed120000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 527,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 686,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "call_count": 2,
    "guards_detected": [],
    "untrusted_call_count": 2
}
high other detector ETH value transfer possible 55 no no
view
trace_id: 0x0a10be0b7e350b4e52a55185ac7b7fc4d2153c6421aa8ec50df2d422e91503bf
call_targets: 0xe38ec8e623a69c9b6076f75b6a3254b2d4330f40
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0x0a10be0b7e350b4e52a55185ac7b7fc4d2153c6421aa8ec50df2d422e91503bf",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0xe38ec8e623a69c9b6076f75b6a3254b2d4330f40"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x69076788",
            "selector": "0x69076788",
            "calldata_variants": [
                "0x69076788",
                "0x690767880000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xbbe233fa",
            "selector": "0xbbe233fa",
            "calldata_variants": [
                "0xbbe233fa",
                "0xbbe233fa0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xd9caed12",
            "selector": "0xd9caed12",
            "calldata_variants": [
                "0xd9caed12",
                "0xd9caed120000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 527,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 686,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "eth_value_calls": 2,
    "guards_detected": []
}