019b477e-b6db-728c-ba1e-8859770c844c
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 23181 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 23182 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 66510 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 66511 | capability.graph | complete | 1 / 3 | 1 week ago |
| 66512 | detector.run | complete | 1 / 3 | 1 week ago |
| 66513 | validation.fork | complete | 1 / 3 | 1 week ago |
| 113522 | report.consolidate | complete | 1 / 6 | 1 week ago |
No slither job recorded yet.
OpenAI Codex v0.118.0 (research preview) -------- workdir: /tmp/codex-h0sfi__4 model: gpt-5.4 provider: openai approval: never sandbox: read-only reasoning effort: high reasoning summaries: none session id: 019d5c96-86f4-7443-9fbb-1f7a6de44c0d -------- user You are a security auditor. You ONLY have runtime bytecode + analysis artifacts. You MUST read `BYTECODE_BUNDLE.json` before concluding; it contains the bytecode summary, evidence bundle, callsites, storage slots, and detector findings. Special cases when reasoning from bytecode (be explicit about uncertainty): - Selector inference is best-effort; missing selectors are common. - Fallback/receive paths may be the only entrypoints. - CALL vs DELEGATECALL semantics differ; DELEGATECALL executes in caller storage. - Proxy patterns (EIP-1967, minimal proxies, beacon) change which storage is authoritative. - Storage slots are raw; mappings/arrays appear via keccak patterns, names are unknown. - Guard detection is heuristic; absence of guards does NOT mean unguarded. - Returndata checking is unknown unless explicitly shown in evidence. - Precompiles (0x1..0x9) and common ERC20 transfer selectors may appear; do not over-claim. Output MUST be valid JSON matching the provided schema. - If you find nothing meaningful: set no_findings=true and findings=[]. - Otherwise: set no_findings=false and include findings with severity/category/title. - Locations can be pc references like "pc:0x123" or selectors like "selector:0xa9059cbb". Focus on: reentrancy, access control, upgradeability/proxy issues, signature validation, accounting/invariant breaks, dangerous delegatecall, and untrusted external calls. Be conservative: if evidence is weak, mark severity low/medium and explain why. warning: Codex could not find system bubblewrap on PATH. Please install bubblewrap with your package manager. Codex will use the vendored bubblewrap in the meantime. ERROR: You've hit your usage limit. Visit https://chatgpt.com/codex/settings/usage to purchase more credits or try again at Apr 8th, 2026 9:11 AM. ERROR: You've hit your usage limit. Visit https://chatgpt.com/codex/settings/usage to purchase more credits or try again at Apr 8th, 2026 9:11 AM.
{
"codex": {
"ran_at": "2026-04-05T07:41:04.035980+00:00",
"returncode": 1
},
"project": {
"mode": "bytecode",
"bytecode_length": 2330,
"bytecode_truncated": false,
"capability_graph_present": true,
"analysis_artifact_present": true
},
"summary": null,
"no_findings": null,
"schema_version": 1
}
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: PUSH1 0x04 00000007: CALLDATASIZE 00000008: LT 00000009: PUSH2 0x0029 0000000c: JUMPI 0000000d: PUSH1 0x00 0000000f: CALLDATALOAD 00000010: PUSH1 0xe0 00000012: SHR 00000013: DUP1 00000014: PUSH4 0xb726757a 00000019: EQ 0000001a: PUSH2 0x002b 0000001d: JUMPI 0000001e: DUP1 0000001f: PUSH4 0xfc0c546a 00000024: EQ 00000025: PUSH2 0x0040 00000028: JUMPI 00000029: JUMPDEST 0000002a: STOP 0000002b: JUMPDEST 0000002c: CALLVALUE 0000002d: DUP1 0000002e: ISZERO 0000002f: PUSH2 0x0037 00000032: JUMPI 00000033: PUSH1 0x00 00000035: DUP1 00000036: REVERT 00000037: JUMPDEST 00000038: POP 00000039: PUSH2 0x0029 0000003c: PUSH2 0x0071 0000003f: JUMP 00000040: JUMPDEST 00000041: CALLVALUE 00000042: DUP1 00000043: ISZERO 00000044: PUSH2 0x004c 00000047: JUMPI 00000048: PUSH1 0x00 0000004a: DUP1 0000004b: REVERT 0000004c: JUMPDEST 0000004d: POP 0000004e: PUSH2 0x0055 00000051: PUSH2 0x0332 00000054: JUMP 00000055: JUMPDEST 00000056: PUSH1 0x40 00000058: DUP1 00000059: MLOAD 0000005a: PUSH1 0x01 0000005c: PUSH1 0x01 0000005e: PUSH1 0xa0 00000060: SHL 00000061: SUB 00000062: SWAP1 00000063: SWAP3 00000064: AND 00000065: DUP3 00000066: MSTORE 00000067: MLOAD 00000068: SWAP1 00000069: DUP2 0000006a: SWAP1 0000006b: SUB 0000006c: PUSH1 0x20 0000006e: ADD 0000006f: SWAP1 00000070: RETURN 00000071: JUMPDEST 00000072: PUSH1 0x00 00000074: DUP1 00000075: SLOAD 00000076: PUSH1 0x40 00000078: DUP1 00000079: MLOAD 0000007a: PUSH1 0x01 0000007c: PUSH1 0xe0 0000007e: SHL 0000007f: PUSH4 0x70a08231 00000084: MUL 00000085: DUP2 00000086: MSTORE 00000087: CALLER 00000088: PUSH1 0x04 0000008a: DUP3 0000008b: ADD 0000008c: MSTORE 0000008d: SWAP1 0000008e: MLOAD 0000008f: PUSH1 0x01 00000091: PUSH1 0x01 00000093: PUSH1 0xa0 00000095: SHL 00000096: SUB 00000097: SWAP1 00000098: SWAP3 00000099: AND 0000009a: SWAP2 0000009b: PUSH4 0x70a08231 000000a0: SWAP2 000000a1: PUSH1 0x24 000000a3: DUP1 000000a4: DUP3 000000a5: ADD 000000a6: SWAP3 000000a7: PUSH1 0x20 000000a9: SWAP3 000000aa: SWAP1 000000ab: SWAP2 000000ac: SWAP1 000000ad: DUP3 000000ae: SWAP1 000000af: SUB 000000b0: ADD 000000b1: DUP2 000000b2: DUP7 000000b3: DUP1 000000b4: EXTCODESIZE 000000b5: ISZERO 000000b6: DUP1 000000b7: ISZERO 000000b8: PUSH2 0x00c0 000000bb: JUMPI 000000bc: PUSH1 0x00 000000be: DUP1 000000bf: REVERT 000000c0: JUMPDEST 000000c1: POP 000000c2: GAS 000000c3: STATICCALL 000000c4: ISZERO 000000c5: DUP1 000000c6: ISZERO 000000c7: PUSH2 0x00d4 000000ca: JUMPI 000000cb: RETURNDATASIZE 000000cc: PUSH1 0x00 000000ce: DUP1 000000cf: RETURNDATACOPY 000000d0: RETURNDATASIZE 000000d1: PUSH1 0x00 000000d3: REVERT 000000d4: JUMPDEST 000000d5: POP 000000d6: POP 000000d7: POP 000000d8: POP 000000d9: PUSH1 0x40 000000db: MLOAD 000000dc: RETURNDATASIZE 000000dd: PUSH1 0x20 000000df: DUP2 000000e0: LT 000000e1: ISZERO 000000e2: PUSH2 0x00ea 000000e5: JUMPI 000000e6: PUSH1 0x00 000000e8: DUP1 000000e9: REVERT 000000ea: JUMPDEST 000000eb: POP 000000ec: MLOAD 000000ed: PUSH1 0x00 000000ef: SLOAD 000000f0: PUSH1 0x40 000000f2: DUP1 000000f3: MLOAD 000000f4: PUSH1 0x01 000000f6: PUSH1 0xe1 000000f8: SHL 000000f9: PUSH4 0x6eb1769f 000000fe: MUL 000000ff: DUP2 00000100: MSTORE 00000101: CALLER 00000102: PUSH1 0x04 00000104: DUP3 00000105: ADD 00000106: MSTORE 00000107: ADDRESS 00000108: PUSH1 0x24 0000010a: DUP3 0000010b: ADD 0000010c: MSTORE 0000010d: SWAP1 0000010e: MLOAD 0000010f: SWAP3 00000110: SWAP4 00000111: POP 00000112: DUP4 00000113: SWAP3 00000114: PUSH1 0x01 00000116: PUSH1 0x01 00000118: PUSH1 0xa0 0000011a: SHL 0000011b: SUB 0000011c: SWAP1 0000011d: SWAP3 0000011e: AND 0000011f: SWAP2 00000120: PUSH4 0xdd62ed3e 00000125: SWAP2 00000126: PUSH1 0x44 00000128: DUP1 00000129: DUP3 0000012a: ADD 0000012b: SWAP3 0000012c: PUSH1 0x20 0000012e: SWAP3 0000012f: SWAP1 00000130: SWAP2 00000131: SWAP1 00000132: DUP3 00000133: SWAP1 00000134: SUB 00000135: ADD 00000136: DUP2 00000137: DUP7 00000138: DUP1 00000139: EXTCODESIZE 0000013a: ISZERO 0000013b: DUP1 0000013c: ISZERO 0000013d: PUSH2 0x0145 00000140: JUMPI 00000141: PUSH1 0x00 00000143: DUP1 00000144: REVERT 00000145: JUMPDEST 00000146: POP 00000147: GAS 00000148: STATICCALL 00000149: ISZERO 0000014a: DUP1 0000014b: ISZERO 0000014c: PUSH2 0x0159 0000014f: JUMPI 00000150: RETURNDATASIZE 00000151: PUSH1 0x00 00000153: DUP1 00000154: RETURNDATACOPY 00000155: RETURNDATASIZE 00000156: PUSH1 0x00 00000158: REVERT 00000159: JUMPDEST 0000015a: POP 0000015b: POP 0000015c: POP 0000015d: POP 0000015e: PUSH1 0x40 00000160: MLOAD 00000161: RETURNDATASIZE 00000162: PUSH1 0x20 00000164: DUP2 00000165: LT 00000166: ISZERO 00000167: PUSH2 0x016f 0000016a: JUMPI 0000016b: PUSH1 0x00 0000016d: DUP1 0000016e: REVERT 0000016f: JUMPDEST 00000170: POP 00000171: MLOAD 00000172: LT 00000173: ISZERO 00000174: PUSH2 0x01b1 00000177: JUMPI 00000178: PUSH1 0x40 0000017a: MLOAD 0000017b: PUSH1 0x01 0000017d: PUSH1 0xe5 0000017f: SHL 00000180: PUSH3 0x461bcd 00000184: MUL 00000185: DUP2 00000186: MSTORE 00000187: PUSH1 0x04 00000189: ADD 0000018a: DUP1 0000018b: DUP1 0000018c: PUSH1 0x20 0000018e: ADD 0000018f: DUP3 00000190: DUP2 00000191: SUB 00000192: DUP3 00000193: MSTORE 00000194: PUSH1 0x2c 00000196: DUP2 00000197: MSTORE 00000198: PUSH1 0x20 0000019a: ADD 0000019b: DUP1 0000019c: PUSH2 0x0414 0000019f: PUSH1 0x2c 000001a1: SWAP2 000001a2: CODECOPY 000001a3: PUSH1 0x40 000001a5: ADD 000001a6: SWAP2 000001a7: POP 000001a8: POP 000001a9: PUSH1 0x40 000001ab: MLOAD 000001ac: DUP1 000001ad: SWAP2 000001ae: SUB 000001af: SWAP1 000001b0: REVERT 000001b1: JUMPDEST 000001b2: PUSH1 0x00 000001b4: DUP1 000001b5: PUSH1 0x00 000001b7: SWAP1 000001b8: SLOAD 000001b9: SWAP1 000001ba: PUSH2 0x0100 000001bd: EXP 000001be: SWAP1 000001bf: DIV 000001c0: PUSH1 0x01 000001c2: PUSH1 0x01 000001c4: PUSH1 0xa0 000001c6: SHL 000001c7: SUB 000001c8: AND 000001c9: PUSH1 0x01 000001cb: PUSH1 0x01 000001cd: PUSH1 0xa0 000001cf: SHL 000001d0: SUB 000001d1: AND 000001d2: PUSH4 0x18160ddd 000001d7: PUSH1 0x40 000001d9: MLOAD 000001da: DUP2 000001db: PUSH4 0xffffffff 000001e0: AND 000001e1: PUSH1 0xe0 000001e3: SHL 000001e4: DUP2 000001e5: MSTORE 000001e6: PUSH1 0x04 000001e8: ADD 000001e9: PUSH1 0x20 000001eb: PUSH1 0x40 000001ed: MLOAD 000001ee: DUP1 000001ef: DUP4 000001f0: SUB 000001f1: DUP2 000001f2: DUP7 000001f3: DUP1 000001f4: EXTCODESIZE 000001f5: ISZERO 000001f6: DUP1 000001f7: ISZERO 000001f8: PUSH2 0x0200 000001fb: JUMPI 000001fc: PUSH1 0x00 000001fe: DUP1 000001ff: REVERT 00000200: JUMPDEST 00000201: POP 00000202: GAS 00000203: STATICCALL 00000204: ISZERO 00000205: DUP1 00000206: ISZERO 00000207: PUSH2 0x0214 0000020a: JUMPI 0000020b: RETURNDATASIZE 0000020c: PUSH1 0x00 0000020e: DUP1 0000020f: RETURNDATACOPY 00000210: RETURNDATASIZE 00000211: PUSH1 0x00 00000213: REVERT 00000214: JUMPDEST 00000215: POP 00000216: POP 00000217: POP 00000218: POP 00000219: PUSH1 0x40 0000021b: MLOAD 0000021c: RETURNDATASIZE 0000021d: PUSH1 0x20 0000021f: DUP2 00000220: LT 00000221: ISZERO 00000222: PUSH2 0x022a 00000225: JUMPI 00000226: PUSH1 0x00 00000228: DUP1 00000229: REVERT 0000022a: JUMPDEST 0000022b: POP 0000022c: MLOAD 0000022d: PUSH1 0x00 0000022f: DUP1 00000230: SLOAD 00000231: PUSH1 0x40 00000233: DUP1 00000234: MLOAD 00000235: PUSH1 0x01 00000237: PUSH1 0xe4 00000239: SHL 0000023a: PUSH4 0x079cc679 0000023f: MUL 00000240: DUP2 00000241: MSTORE 00000242: CALLER 00000243: PUSH1 0x04 00000245: DUP3 00000246: ADD 00000247: MSTORE 00000248: PUSH1 0x24 0000024a: DUP2 0000024b: ADD 0000024c: DUP8 0000024d: SWAP1 0000024e: MSTORE 0000024f: SWAP1 00000250: MLOAD 00000251: SWAP4 00000252: SWAP5 00000253: POP 00000254: PUSH1 0x01 00000256: PUSH1 0x01 00000258: PUSH1 0xa0 0000025a: SHL 0000025b: SUB 0000025c: SWAP1 0000025d: SWAP2 0000025e: AND 0000025f: SWAP3 00000260: PUSH4 0x79cc6790 00000265: SWAP3 00000266: PUSH1 0x44 00000268: DUP1 00000269: DUP5 0000026a: ADD 0000026b: SWAP4 0000026c: SWAP2 0000026d: SWAP3 0000026e: SWAP2 0000026f: DUP3 00000270: SWAP1 00000271: SUB 00000272: ADD 00000273: DUP2 00000274: DUP4 00000275: DUP8 00000276: DUP1 00000277: EXTCODESIZE 00000278: ISZERO 00000279: DUP1 0000027a: ISZERO 0000027b: PUSH2 0x0283 0000027e: JUMPI 0000027f: PUSH1 0x00 00000281: DUP1 00000282: REVERT 00000283: JUMPDEST 00000284: POP 00000285: GAS 00000286: CALL 00000287: ISZERO 00000288: DUP1 00000289: ISZERO 0000028a: PUSH2 0x0297 0000028d: JUMPI 0000028e: RETURNDATASIZE 0000028f: PUSH1 0x00 00000291: DUP1 00000292: RETURNDATACOPY 00000293: RETURNDATASIZE 00000294: PUSH1 0x00 00000296: REVERT 00000297: JUMPDEST 00000298: POP 00000299: PUSH1 0x00 0000029b: SWAP3 0000029c: POP 0000029d: PUSH2 0x02c1 000002a0: SWAP2 000002a1: POP 000002a2: DUP4 000002a3: SWAP1 000002a4: POP 000002a5: PUSH2 0x02b5 000002a8: ADDRESS 000002a9: BALANCE 000002aa: DUP7 000002ab: PUSH4 0xffffffff 000002b0: PUSH2 0x0341 000002b3: AND 000002b4: JUMP 000002b5: JUMPDEST 000002b6: SWAP1 000002b7: PUSH4 0xffffffff 000002bc: PUSH2 0x03a6 000002bf: AND 000002c0: JUMP 000002c1: JUMPDEST 000002c2: PUSH1 0x40 000002c4: MLOAD 000002c5: SWAP1 000002c6: SWAP2 000002c7: POP 000002c8: CALLER 000002c9: SWAP1 000002ca: DUP3 000002cb: ISZERO 000002cc: PUSH2 0x08fc 000002cf: MUL 000002d0: SWAP1 000002d1: DUP4 000002d2: SWAP1 000002d3: PUSH1 0x00 000002d5: DUP2 000002d6: DUP2 000002d7: DUP2 000002d8: DUP6 000002d9: DUP9 000002da: DUP9 000002db: CALL 000002dc: SWAP4 000002dd: POP 000002de: POP 000002df: POP 000002e0: POP 000002e1: ISZERO 000002e2: DUP1 000002e3: ISZERO 000002e4: PUSH2 0x02f1 000002e7: JUMPI 000002e8: RETURNDATASIZE 000002e9: PUSH1 0x00 000002eb: DUP1 000002ec: RETURNDATACOPY 000002ed: RETURNDATASIZE 000002ee: PUSH1 0x00 000002f0: REVERT 000002f1: JUMPDEST 000002f2: POP 000002f3: PUSH1 0x40 000002f5: DUP1 000002f6: MLOAD 000002f7: CALLER 000002f8: DUP2 000002f9: MSTORE 000002fa: PUSH1 0x20 000002fc: DUP2 000002fd: ADD 000002fe: DUP6 000002ff: SWAP1 00000300: MSTORE 00000301: DUP2 00000302: MLOAD 00000303: PUSH32 0x0f4b0b9c670ba5132e0c5923d20f1ffc94d93341419ae4f226ff1f08963da3da 00000324: SWAP3 00000325: SWAP2 00000326: DUP2 00000327: SWAP1 00000328: SUB 00000329: SWAP1 0000032a: SWAP2 0000032b: ADD 0000032c: SWAP1 0000032d: LOG1 0000032e: POP 0000032f: POP 00000330: POP 00000331: JUMP 00000332: JUMPDEST 00000333: PUSH1 0x00 00000335: SLOAD 00000336: PUSH1 0x01 00000338: PUSH1 0x01 0000033a: PUSH1 0xa0 0000033c: SHL 0000033d: SUB 0000033e: AND 0000033f: DUP2 00000340: JUMP 00000341: JUMPDEST 00000342: PUSH1 0x00 00000344: DUP3 00000345: PUSH2 0x0350 00000348: JUMPI 00000349: POP 0000034a: PUSH1 0x00 0000034c: PUSH2 0x03a0 0000034f: JUMP 00000350: JUMPDEST 00000351: DUP3 00000352: DUP3 00000353: MUL 00000354: DUP3 00000355: DUP5 00000356: DUP3 00000357: DUP2 00000358: PUSH2 0x035d 0000035b: JUMPI 0000035c: INVALID 0000035d: JUMPDEST 0000035e: DIV 0000035f: EQ 00000360: PUSH2 0x039d 00000363: JUMPI 00000364: PUSH1 0x40 00000366: MLOAD 00000367: PUSH1 0x01 00000369: PUSH1 0xe5 0000036b: SHL 0000036c: PUSH3 0x461bcd 00000370: MUL 00000371: DUP2 00000372: MSTORE 00000373: PUSH1 0x04 00000375: ADD 00000376: DUP1 00000377: DUP1 00000378: PUSH1 0x20 0000037a: ADD 0000037b: DUP3 0000037c: DUP2 0000037d: SUB 0000037e: DUP3 0000037f: MSTORE 00000380: PUSH1 0x21 00000382: DUP2 00000383: MSTORE 00000384: PUSH1 0x20 00000386: ADD 00000387: DUP1 00000388: PUSH2 0x0440 0000038b: PUSH1 0x21 0000038d: SWAP2 0000038e: CODECOPY 0000038f: PUSH1 0x40 00000391: ADD 00000392: SWAP2 00000393: POP 00000394: POP 00000395: PUSH1 0x40 00000397: MLOAD 00000398: DUP1 00000399: SWAP2 0000039a: SUB 0000039b: SWAP1 0000039c: REVERT 0000039d: JUMPDEST 0000039e: SWAP1 0000039f: POP 000003a0: JUMPDEST 000003a1: SWAP3 000003a2: SWAP2 000003a3: POP 000003a4: POP 000003a5: JUMP 000003a6: JUMPDEST 000003a7: PUSH1 0x00 000003a9: DUP1 000003aa: DUP3 000003ab: GT 000003ac: PUSH2 0x03ff 000003af: JUMPI 000003b0: PUSH1 0x40 000003b2: DUP1 000003b3: MLOAD 000003b4: PUSH1 0x01 000003b6: PUSH1 0xe5 000003b8: SHL 000003b9: PUSH3 0x461bcd 000003bd: MUL 000003be: DUP2 000003bf: MSTORE 000003c0: PUSH1 0x20 000003c2: PUSH1 0x04 000003c4: DUP3 000003c5: ADD 000003c6: MSTORE 000003c7: PUSH1 0x1a 000003c9: PUSH1 0x24 000003cb: DUP3 000003cc: ADD 000003cd: MSTORE 000003ce: PUSH32 0x536166654d6174683a206469766973696f6e206279207a65726f000000000000 000003ef: PUSH1 0x44 000003f1: DUP3 000003f2: ADD 000003f3: MSTORE 000003f4: SWAP1 000003f5: MLOAD 000003f6: SWAP1 000003f7: DUP2 000003f8: SWAP1 000003f9: SUB 000003fa: PUSH1 0x64 000003fc: ADD 000003fd: SWAP1 000003fe: REVERT 000003ff: JUMPDEST 00000400: PUSH1 0x00 00000402: DUP3 00000403: DUP5 00000404: DUP2 00000405: PUSH2 0x040a 00000408: JUMPI 00000409: INVALID 0000040a: JUMPDEST 0000040b: DIV 0000040c: SWAP5 0000040d: SWAP4 0000040e: POP 0000040f: POP 00000410: POP 00000411: POP 00000412: JUMP 00000413: INVALID 00000414: NUMBER 00000415: PUSH16 0x6e7472616374206973206e6f7420616c 00000426: PUSH13 0x6f77656420746f206275726e20 00000434: PUSH22 0x7365727320746f6b656e73536166654d6174683a206d 0000044b: PUSH22 0x6c7469706c69636174696f6e206f766572666c6f77a1 00000462: PUSH6 0x627a7a723058 00000469: KECCAK256 0000046a: SWAP5 0000046b: ADDMOD 0000046c: UNKNOWN(0x0F) 0000046d: SDIV 0000046e: DUP16 0000046f: MLOAD 00000470: UNKNOWN(0xD4) 00000471: UNKNOWN(0xBE) 00000472: LOG2 00000473: RETURNDATACOPY 00000474: PUSH24
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| high | other | detector | Untrusted CALL target/value reachable | 60 | yes | yes |
viewtrace_id: 0xac1c436b67f80193fd47ec682a1deb67844612bd4dcb52288b5a248012fbaa65
call_targets:
0x0000000000000000000000000000000000000001, 0x188244b65383c524882244cdc413afb209ee81b1, 0x521871fe28ab18d7564611e3021e139f37452a43
target_varies:
yes
classification:
target_varies
validation_json{
"sink": "CALL",
"errors": 0,
"status": "confirmed",
"attempts": 1,
"trace_id": "0xac1c436b67f80193fd47ec682a1deb67844612bd4dcb52288b5a248012fbaa65",
"confirmed": true,
"trace_mode": "callTracer",
"call_targets": [
"0x0000000000000000000000000000000000000001",
"0x188244b65383c524882244cdc413afb209ee81b1",
"0x521871fe28ab18d7564611e3021e139f37452a43"
],
"matched_probe": null,
"target_varies": true,
"classification": "target_varies"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0xb726757a",
"selector": "0xb726757a",
"calldata_variants": [
"0xb726757a",
"0xb726757a0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0xfc0c546a",
"selector": "0xfc0c546a",
"calldata_variants": [
"0xfc0c546a",
"0xfc0c546a0000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 646,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
},
{
"pc": 731,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"call_count": 2,
"guards_detected": [],
"untrusted_call_count": 2
}
|
| high | other | detector | ETH value transfer possible | 55 | yes | yes |
viewtrace_id: 0xac1c436b67f80193fd47ec682a1deb67844612bd4dcb52288b5a248012fbaa65
call_targets:
0x0000000000000000000000000000000000000001, 0x188244b65383c524882244cdc413afb209ee81b1, 0x521871fe28ab18d7564611e3021e139f37452a43
target_varies:
yes
classification:
target_varies
validation_json{
"sink": "CALL",
"errors": 0,
"status": "confirmed",
"attempts": 1,
"trace_id": "0xac1c436b67f80193fd47ec682a1deb67844612bd4dcb52288b5a248012fbaa65",
"confirmed": true,
"trace_mode": "callTracer",
"call_targets": [
"0x0000000000000000000000000000000000000001",
"0x188244b65383c524882244cdc413afb209ee81b1",
"0x521871fe28ab18d7564611e3021e139f37452a43"
],
"matched_probe": null,
"target_varies": true,
"classification": "target_varies"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0xb726757a",
"selector": "0xb726757a",
"calldata_variants": [
"0xb726757a",
"0xb726757a0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0xfc0c546a",
"selector": "0xfc0c546a",
"calldata_variants": [
"0xfc0c546a",
"0xfc0c546a0000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 646,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
},
{
"pc": 731,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"eth_value_calls": 2,
"guards_detected": []
}
|