019b477e-b9bc-72a1-86ef-0d7e10a62551
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 23635 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 23636 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 90413 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 90414 | capability.graph | complete | 1 / 3 | 1 week ago |
| 90415 | detector.run | complete | 1 / 3 | 1 week ago |
| 90416 | validation.fork | complete | 1 / 3 | 1 week ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: CALLDATASIZE 00000006: PUSH2 0x000b 00000009: JUMPI 0000000a: STOP 0000000b: JUMPDEST 0000000c: PUSH1 0x40 0000000e: DUP1 0000000f: MLOAD 00000010: PUSH4 0x43ee5907 00000015: PUSH1 0xe1 00000017: SHL 00000018: DUP2 00000019: MSTORE 0000001a: SWAP1 0000001b: MLOAD 0000001c: PUSH32 0x0000000000000000000000005ed3c9089ed0355bc77cf439dc2ed28c4054c8c4 0000003d: SWAP2 0000003e: PUSH32 0x000000000000000000000000dac17f958d2ee523a2206206994597c13d831ec7 0000005f: SWAP2 00000060: PUSH32 0x0000000000000000000000000000000000000000000000000000000000000000 00000081: SWAP2 00000082: PUSH32 0x0000000000000000000000000b342c51d1592c41068d5d4b4da4a68c0a04d5a4 000000a3: SWAP2 000000a4: PUSH32 0x000000000000000000005af3107a40000000000000000001000000e8d4a51000 000000c5: SWAP2 000000c6: PUSH1 0x00 000000c8: SWAP2 000000c9: PUSH1 0x01 000000cb: PUSH1 0x01 000000cd: PUSH1 0xa0 000000cf: SHL 000000d0: SUB 000000d1: DUP9 000000d2: AND 000000d3: SWAP2 000000d4: PUSH4 0x87dcb20e 000000d9: SWAP2 000000da: PUSH1 0x04 000000dc: DUP1 000000dd: DUP4 000000de: ADD 000000df: SWAP3 000000e0: PUSH1 0x20 000000e2: SWAP3 000000e3: SWAP2 000000e4: SWAP1 000000e5: DUP3 000000e6: SWAP1 000000e7: SUB 000000e8: ADD 000000e9: DUP2 000000ea: DUP8 000000eb: DUP8 000000ec: DUP1 000000ed: EXTCODESIZE 000000ee: ISZERO 000000ef: DUP1 000000f0: ISZERO 000000f1: PUSH2 0x00f9 000000f4: JUMPI 000000f5: PUSH1 0x00 000000f7: DUP1 000000f8: REVERT 000000f9: JUMPDEST 000000fa: POP 000000fb: GAS 000000fc: CALL 000000fd: ISZERO 000000fe: DUP1 000000ff: ISZERO 00000100: PUSH2 0x010d 00000103: JUMPI 00000104: RETURNDATASIZE 00000105: PUSH1 0x00 00000107: DUP1 00000108: RETURNDATACOPY 00000109: RETURNDATASIZE 0000010a: PUSH1 0x00 0000010c: REVERT 0000010d: JUMPDEST 0000010e: POP 0000010f: POP 00000110: POP 00000111: POP 00000112: PUSH1 0x40 00000114: MLOAD 00000115: RETURNDATASIZE 00000116: PUSH1 0x20 00000118: DUP2 00000119: LT 0000011a: ISZERO 0000011b: PUSH2 0x0123 0000011e: JUMPI 0000011f: PUSH1 0x00 00000121: DUP1 00000122: REVERT 00000123: JUMPDEST 00000124: POP 00000125: MLOAD 00000126: PUSH1 0x40 00000128: MLOAD 00000129: SWAP1 0000012a: SWAP2 0000012b: POP 0000012c: CALLDATASIZE 0000012d: DUP1 0000012e: PUSH1 0x00 00000130: DUP4 00000131: CALLDATACOPY 00000132: DUP2 00000133: DUP2 00000134: ADD 00000135: DUP9 00000136: DUP2 00000137: MSTORE 00000138: PUSH1 0x20 0000013a: DUP2 0000013b: ADD 0000013c: DUP9 0000013d: SWAP1 0000013e: MSTORE 0000013f: PUSH1 0x40 00000141: DUP2 00000142: ADD 00000143: DUP8 00000144: SWAP1 00000145: MSTORE 00000146: PUSH1 0x60 00000148: DUP2 00000149: ADD 0000014a: DUP7 0000014b: SWAP1 0000014c: MSTORE 0000014d: PUSH1 0x80 0000014f: ADD 00000150: DUP5 00000151: SWAP1 00000152: MSTORE 00000153: PUSH1 0xa0 00000155: ADD 00000156: PUSH1 0x00 00000158: DUP1 00000159: DUP3 0000015a: DUP5 0000015b: DUP7 0000015c: GAS 0000015d: DELEGATECALL 0000015e: RETURNDATASIZE 0000015f: SWAP2 00000160: POP 00000161: DUP2 00000162: PUSH1 0x00 00000164: DUP5 00000165: RETURNDATACOPY 00000166: DUP1 00000167: DUP1 00000168: ISZERO 00000169: PUSH2 0x0170 0000016c: JUMPI 0000016d: DUP3 0000016e: DUP5 0000016f: RETURN 00000170: JUMPDEST 00000171: DUP3 00000172: DUP5 00000173: REVERT 00000174: INVALID 00000175: LOG2 00000176: PUSH5 0x6970667358 0000017c: UNKNOWN(0x22) 0000017d: SLT 0000017e: KECCAK256 0000017f: SWAP10 00000180: UNKNOWN(0xC4) 00000181: PUSH19 0xe7c795c5c12331e89d9d4e3a7734fdfa1b8329 00000195: UNKNOWN(0xFB) 00000196: JUMP 00000197: SIGNEXTEND 00000198: UNKNOWN(0x4E) 00000199: UNKNOWN(0xCB) 0000019a: UNKNOWN(0xEC) 0000019b: UNKNOWN(0xBF) 0000019c: PUSH31
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewvalidation_json{
"sink": "DELEGATECALL",
"errors": 10,
"status": "unknown",
"attempts": 11,
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": null,
"matched_probe": null,
"target_varies": null,
"classification": "no_sink"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 349,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 1,
"untrusted_delegatecall_count": 1
}
|
| high | other | detector | Untrusted CALL target/value reachable | 60 | no | no |
viewtrace_id: 0x8029c509525527ade022c2f794bbc259dd904c9b0c59369fdf448979a2080894
call_targets:
0xd5c97daa0bff751e4282bbc5ac8d008738881224
target_varies:
no
classification:
constant_target
validation_json{
"sink": "CALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x8029c509525527ade022c2f794bbc259dd904c9b0c59369fdf448979a2080894",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0xd5c97daa0bff751e4282bbc5ac8d008738881224"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 252,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"call_count": 1,
"guards_detected": [],
"untrusted_call_count": 1
}
|
| high | other | detector | ETH value transfer possible | 55 | no | no |
viewtrace_id: 0x8029c509525527ade022c2f794bbc259dd904c9b0c59369fdf448979a2080894
call_targets:
0xd5c97daa0bff751e4282bbc5ac8d008738881224
target_varies:
no
classification:
constant_target
validation_json{
"sink": "CALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x8029c509525527ade022c2f794bbc259dd904c9b0c59369fdf448979a2080894",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0xd5c97daa0bff751e4282bbc5ac8d008738881224"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 252,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"eth_value_calls": 1,
"guards_detected": []
}
|