TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

019b477e-ba2f-73bb-a881-6e61c022e59b

complete
Chain ID
1
Address
Block Number
Created
Mon, Dec 22, 2025 7:17 PM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
0
Validated
0
Source
Bytecode only
Review Backing
Not yet
Best current signal
Untrusted CALL target/value reachable
crit 0 high 0 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
23701 artifact.fetch complete 1 / 3 3 months ago
23702 tool.cast_disasm complete 1 / 3 3 months ago
90261 analysis.bundle complete 1 / 3 2 weeks ago
90262 capability.graph complete 1 / 3 2 weeks ago
90263 detector.run complete 1 / 3 2 weeks ago
90264 validation.fork complete 1 / 3 2 weeks ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no
Implementation:
Verified Source: no

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate

No codex job recorded yet.

Opcode Heuristics

tool.cast_disasm
Delegatecall
0
Selfdestruct
0
CREATE2
0
CALL-family (heavy)
1
EXT*/BALANCE
0
Total opcodes
624
Flags
No heuristic flags raised.
View cast disassembly output
00000000: PUSH1 0x80
00000002: PUSH1 0x40
00000004: MSTORE
00000005: PUSH1 0x04
00000007: CALLDATASIZE
00000008: LT
00000009: PUSH2 0x0043
0000000c: JUMPI
0000000d: PUSH1 0x00
0000000f: CALLDATALOAD
00000010: PUSH1 0xe0
00000012: SHR
00000013: DUP1
00000014: PUSH4 0x0ce5ae99
00000019: EQ
0000001a: PUSH2 0x0046
0000001d: JUMPI
0000001e: DUP1
0000001f: PUSH4 0xa1113810
00000024: EQ
00000025: PUSH2 0x005d
00000028: JUMPI
00000029: DUP1
0000002a: PUSH4 0xa8924985
0000002f: EQ
00000030: PUSH2 0x00ae
00000033: JUMPI
00000034: DUP1
00000035: PUSH4 0xc6dbdf61
0000003a: EQ
0000003b: PUSH2 0x00e9
0000003e: JUMPI
0000003f: PUSH2 0x0044
00000042: JUMP
00000043: JUMPDEST
00000044: JUMPDEST
00000045: STOP
00000046: JUMPDEST
00000047: CALLVALUE
00000048: DUP1
00000049: ISZERO
0000004a: PUSH2 0x0052
0000004d: JUMPI
0000004e: PUSH1 0x00
00000050: DUP1
00000051: REVERT
00000052: JUMPDEST
00000053: POP
00000054: PUSH2 0x005b
00000057: PUSH2 0x012a
0000005a: JUMP
0000005b: JUMPDEST
0000005c: STOP
0000005d: JUMPDEST
0000005e: CALLVALUE
0000005f: DUP1
00000060: ISZERO
00000061: PUSH2 0x0069
00000064: JUMPI
00000065: PUSH1 0x00
00000067: DUP1
00000068: REVERT
00000069: JUMPDEST
0000006a: POP
0000006b: PUSH2 0x00ac
0000006e: PUSH1 0x04
00000070: DUP1
00000071: CALLDATASIZE
00000072: SUB
00000073: PUSH1 0x20
00000075: DUP2
00000076: LT
00000077: ISZERO
00000078: PUSH2 0x0080
0000007b: JUMPI
0000007c: PUSH1 0x00
0000007e: DUP1
0000007f: REVERT
00000080: JUMPDEST
00000081: DUP2
00000082: ADD
00000083: SWAP1
00000084: DUP1
00000085: DUP1
00000086: CALLDATALOAD
00000087: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000009c: AND
0000009d: SWAP1
0000009e: PUSH1 0x20
000000a0: ADD
000000a1: SWAP1
000000a2: SWAP3
000000a3: SWAP2
000000a4: SWAP1
000000a5: POP
000000a6: POP
000000a7: POP
000000a8: PUSH2 0x0276
000000ab: JUMP
000000ac: JUMPDEST
000000ad: STOP
000000ae: JUMPDEST
000000af: CALLVALUE
000000b0: DUP1
000000b1: ISZERO
000000b2: PUSH2 0x00ba
000000b5: JUMPI
000000b6: PUSH1 0x00
000000b8: DUP1
000000b9: REVERT
000000ba: JUMPDEST
000000bb: POP
000000bc: PUSH2 0x00e7
000000bf: PUSH1 0x04
000000c1: DUP1
000000c2: CALLDATASIZE
000000c3: SUB
000000c4: PUSH1 0x20
000000c6: DUP2
000000c7: LT
000000c8: ISZERO
000000c9: PUSH2 0x00d1
000000cc: JUMPI
000000cd: PUSH1 0x00
000000cf: DUP1
000000d0: REVERT
000000d1: JUMPDEST
000000d2: DUP2
000000d3: ADD
000000d4: SWAP1
000000d5: DUP1
000000d6: DUP1
000000d7: CALLDATALOAD
000000d8: SWAP1
000000d9: PUSH1 0x20
000000db: ADD
000000dc: SWAP1
000000dd: SWAP3
000000de: SWAP2
000000df: SWAP1
000000e0: POP
000000e1: POP
000000e2: POP
000000e3: PUSH2 0x0403
000000e6: JUMP
000000e7: JUMPDEST
000000e8: STOP
000000e9: JUMPDEST
000000ea: CALLVALUE
000000eb: DUP1
000000ec: ISZERO
000000ed: PUSH2 0x00f5
000000f0: JUMPI
000000f1: PUSH1 0x00
000000f3: DUP1
000000f4: REVERT
000000f5: JUMPDEST
000000f6: POP
000000f7: PUSH2 0x00fe
000000fa: PUSH2 0x0523
000000fd: JUMP
000000fe: JUMPDEST
000000ff: PUSH1 0x40
00000101: MLOAD
00000102: DUP1
00000103: DUP3
00000104: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000119: AND
0000011a: DUP2
0000011b: MSTORE
0000011c: PUSH1 0x20
0000011e: ADD
0000011f: SWAP2
00000120: POP
00000121: POP
00000122: PUSH1 0x40
00000124: MLOAD
00000125: DUP1
00000126: SWAP2
00000127: SUB
00000128: SWAP1
00000129: RETURN
0000012a: JUMPDEST
0000012b: CALLER
0000012c: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000141: AND
00000142: PUSH1 0x01
00000144: PUSH1 0x00
00000146: SWAP1
00000147: SLOAD
00000148: SWAP1
00000149: PUSH2 0x0100
0000014c: EXP
0000014d: SWAP1
0000014e: DIV
0000014f: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000164: AND
00000165: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000017a: AND
0000017b: EQ
0000017c: PUSH2 0x01d0
0000017f: JUMPI
00000180: PUSH1 0x40
00000182: MLOAD
00000183: PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
000001a4: DUP2
000001a5: MSTORE
000001a6: PUSH1 0x04
000001a8: ADD
000001a9: DUP1
000001aa: DUP1
000001ab: PUSH1 0x20
000001ad: ADD
000001ae: DUP3
000001af: DUP2
000001b0: SUB
000001b1: DUP3
000001b2: MSTORE
000001b3: PUSH1 0x2b
000001b5: DUP2
000001b6: MSTORE
000001b7: PUSH1 0x20
000001b9: ADD
000001ba: DUP1
000001bb: PUSH2 0x0597
000001be: PUSH1 0x2b
000001c0: SWAP2
000001c1: CODECOPY
000001c2: PUSH1 0x40
000001c4: ADD
000001c5: SWAP2
000001c6: POP
000001c7: POP
000001c8: PUSH1 0x40
000001ca: MLOAD
000001cb: DUP1
000001cc: SWAP2
000001cd: SUB
000001ce: SWAP1
000001cf: REVERT
000001d0: JUMPDEST
000001d1: PUSH1 0x01
000001d3: PUSH1 0x00
000001d5: SWAP1
000001d6: SLOAD
000001d7: SWAP1
000001d8: PUSH2 0x0100
000001db: EXP
000001dc: SWAP1
000001dd: DIV
000001de: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000001f3: AND
000001f4: PUSH1 0x00
000001f6: DUP1
000001f7: PUSH2 0x0100
000001fa: EXP
000001fb: DUP2
000001fc: SLOAD
000001fd: DUP2
000001fe: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000213: MUL
00000214: NOT
00000215: AND
00000216: SWAP1
00000217: DUP4
00000218: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000022d: AND
0000022e: MUL
0000022f: OR
00000230: SWAP1
00000231: SSTORE
00000232: POP
00000233: PUSH1 0x00
00000235: PUSH1 0x01
00000237: PUSH1 0x00
00000239: PUSH2 0x0100
0000023c: EXP
0000023d: DUP2
0000023e: SLOAD
0000023f: DUP2
00000240: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000255: MUL
00000256: NOT
00000257: AND
00000258: SWAP1
00000259: DUP4
0000025a: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000026f: AND
00000270: MUL
00000271: OR
00000272: SWAP1
00000273: SSTORE
00000274: POP
00000275: JUMP
00000276: JUMPDEST
00000277: CALLER
00000278: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000028d: AND
0000028e: PUSH1 0x00
00000290: DUP1
00000291: SLOAD
00000292: SWAP1
00000293: PUSH2 0x0100
00000296: EXP
00000297: SWAP1
00000298: DIV
00000299: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000002ae: AND
000002af: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000002c4: AND
000002c5: EQ
000002c6: PUSH2 0x031a
000002c9: JUMPI
000002ca: PUSH1 0x40
000002cc: MLOAD
000002cd: PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
000002ee: DUP2
000002ef: MSTORE
000002f0: PUSH1 0x04
000002f2: ADD
000002f3: DUP1
000002f4: DUP1
000002f5: PUSH1 0x20
000002f7: ADD
000002f8: DUP3
000002f9: DUP2
000002fa: SUB
000002fb: DUP3
000002fc: MSTORE
000002fd: PUSH1 0x21
000002ff: DUP2
00000300: MSTORE
00000301: PUSH1 0x20
00000303: ADD
00000304: DUP1
00000305: PUSH2 0x0576
00000308: PUSH1 0x21
0000030a: SWAP2
0000030b: CODECOPY
0000030c: PUSH1 0x40
0000030e: ADD
0000030f: SWAP2
00000310: POP
00000311: POP
00000312: PUSH1 0x40
00000314: MLOAD
00000315: DUP1
00000316: SWAP2
00000317: SUB
00000318: SWAP1
00000319: REVERT
0000031a: JUMPDEST
0000031b: DUP1
0000031c: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000331: AND
00000332: PUSH1 0x00
00000334: DUP1
00000335: SLOAD
00000336: SWAP1
00000337: PUSH2 0x0100
0000033a: EXP
0000033b: SWAP1
0000033c: DIV
0000033d: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000352: AND
00000353: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000368: AND
00000369: EQ
0000036a: ISZERO
0000036b: PUSH2 0x03bf
0000036e: JUMPI
0000036f: PUSH1 0x40
00000371: MLOAD
00000372: PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
00000393: DUP2
00000394: MSTORE
00000395: PUSH1 0x04
00000397: ADD
00000398: DUP1
00000399: DUP1
0000039a: PUSH1 0x20
0000039c: ADD
0000039d: DUP3
0000039e: DUP2
0000039f: SUB
000003a0: DUP3
000003a1: MSTORE
000003a2: PUSH1 0x29
000003a4: DUP2
000003a5: MSTORE
000003a6: PUSH1 0x20
000003a8: ADD
000003a9: DUP1
000003aa: PUSH2 0x054d
000003ad: PUSH1 0x29
000003af: SWAP2
000003b0: CODECOPY
000003b1: PUSH1 0x40
000003b3: ADD
000003b4: SWAP2
000003b5: POP
000003b6: POP
000003b7: PUSH1 0x40
000003b9: MLOAD
000003ba: DUP1
000003bb: SWAP2
000003bc: SUB
000003bd: SWAP1
000003be: REVERT
000003bf: JUMPDEST
000003c0: DUP1
000003c1: PUSH1 0x01
000003c3: PUSH1 0x00
000003c5: PUSH2 0x0100
000003c8: EXP
000003c9: DUP2
000003ca: SLOAD
000003cb: DUP2
000003cc: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000003e1: MUL
000003e2: NOT
000003e3: AND
000003e4: SWAP1
000003e5: DUP4
000003e6: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000003fb: AND
000003fc: MUL
000003fd: OR
000003fe: SWAP1
000003ff: SSTORE
00000400: POP
00000401: POP
00000402: JUMP
00000403: JUMPDEST
00000404: CALLER
00000405: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000041a: AND
0000041b: PUSH1 0x00
0000041d: DUP1
0000041e: SLOAD
0000041f: SWAP1
00000420: PUSH2 0x0100
00000423: EXP
00000424: SWAP1
00000425: DIV
00000426: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000043b: AND
0000043c: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000451: AND
00000452: EQ
00000453: PUSH2 0x04a7
00000456: JUMPI
00000457: PUSH1 0x40
00000459: MLOAD
0000045a: PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
0000047b: DUP2
0000047c: MSTORE
0000047d: PUSH1 0x04
0000047f: ADD
00000480: DUP1
00000481: DUP1
00000482: PUSH1 0x20
00000484: ADD
00000485: DUP3
00000486: DUP2
00000487: SUB
00000488: DUP3
00000489: MSTORE
0000048a: PUSH1 0x21
0000048c: DUP2
0000048d: MSTORE
0000048e: PUSH1 0x20
00000490: ADD
00000491: DUP1
00000492: PUSH2 0x0576
00000495: PUSH1 0x21
00000497: SWAP2
00000498: CODECOPY
00000499: PUSH1 0x40
0000049b: ADD
0000049c: SWAP2
0000049d: POP
0000049e: POP
0000049f: PUSH1 0x40
000004a1: MLOAD
000004a2: DUP1
000004a3: SWAP2
000004a4: SUB
000004a5: SWAP1
000004a6: REVERT
000004a7: JUMPDEST
000004a8: PUSH1 0x00
000004aa: CALLER
000004ab: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000004c0: AND
000004c1: DUP3
000004c2: PUSH2 0x08fc
000004c5: SWAP1
000004c6: PUSH1 0x40
000004c8: MLOAD
000004c9: DUP1
000004ca: PUSH1 0x00
000004cc: ADD
000004cd: SWAP1
000004ce: POP
000004cf: PUSH1 0x00
000004d1: PUSH1 0x40
000004d3: MLOAD
000004d4: DUP1
000004d5: DUP4
000004d6: SUB
000004d7: DUP2
000004d8: DUP6
000004d9: DUP9
000004da: DUP9
000004db: CALL
000004dc: SWAP4
000004dd: POP
000004de: POP
000004df: POP
000004e0: POP
000004e1: RETURNDATASIZE
000004e2: DUP1
000004e3: PUSH1 0x00
000004e5: DUP2
000004e6: EQ
000004e7: PUSH2 0x050c
000004ea: JUMPI
000004eb: PUSH1 0x40
000004ed: MLOAD
000004ee: SWAP2
000004ef: POP
000004f0: PUSH1 0x1f
000004f2: NOT
000004f3: PUSH1 0x3f
000004f5: RETURNDATASIZE
000004f6: ADD
000004f7: AND
000004f8: DUP3
000004f9: ADD
000004fa: PUSH1 0x40
000004fc: MSTORE
000004fd: RETURNDATASIZE
000004fe: DUP3
000004ff: MSTORE
00000500: RETURNDATASIZE
00000501: PUSH1 0x00
00000503: PUSH1 0x20
00000505: DUP5
00000506: ADD
00000507: RETURNDATACOPY
00000508: PUSH2 0x0511
0000050b: JUMP
0000050c: JUMPDEST
0000050d: PUSH1 0x60
0000050f: SWAP2
00000510: POP
00000511: JUMPDEST
00000512: POP
00000513: POP
00000514: SWAP1
00000515: POP
00000516: DUP1
00000517: PUSH2 0x051f
0000051a: JUMPI
0000051b: PUSH1 0x00
0000051d: DUP1
0000051e: REVERT
0000051f: JUMPDEST
00000520: POP
00000521: POP
00000522: JUMP
00000523: JUMPDEST
00000524: PUSH1 0x00
00000526: DUP1
00000527: PUSH1 0x00
00000529: SWAP1
0000052a: SLOAD
0000052b: SWAP1
0000052c: PUSH2 0x0100
0000052f: EXP
00000530: SWAP1
00000531: DIV
00000532: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000547: AND
00000548: SWAP1
00000549: POP
0000054a: SWAP1
0000054b: JUMP
0000054c: INVALID
0000054d: PUSH26 0x6f752063616e2774206d616b6520796f757273656c6620707269
00000568: PUSH14 0x6172792063616e64696461746563
00000577: PUSH2 0x6c6c
0000057a: PUSH6 0x72206973206e
00000581: PUSH16 0x7420746865207072696d617279206163
00000592: PUSH4 0x6f756e74
00000597: PUSH4 0x616c6c65
0000059c: PUSH19 0x206973206e6f7420746865207072696d617279
000005b0: KECCAK256
000005b1: PUSH4 0x616e6469
000005b6: PUSH5 0x6174652061
000005bc: PUSH4 0x636f756e
000005c1: PUSH21 0xa26469706673582212207721ade907a479f6061c6b
000005d7: UNKNOWN(0xAE)
000005d8: SWAP5
000005d9: UNKNOWN(0xC6)
000005da: SWAP14
000005db: ISZERO
000005dc: UNKNOWN(0xC9)
000005dd: SWAP5
000005de: UNKNOWN(0xDC)
000005df: UNKNOWN(0xC7)
000005e0: UNKNOWN(0xD4)
000005e1: SWAP1
000005e2: PUSH6 0x609dc6986697
000005e9: UNKNOWN(0xC0)
000005ea: UNKNOWN(0xB8)
000005eb: UNKNOWN(0x28)
000005ec: PUSH5 0x736f6c6343
000005f2: STOP
000005f3: MOD
000005f4: UNKNOWN(0x0C)
000005f5: STOP
000005f6: CALLER

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
high other detector Untrusted CALL target/value reachable 60 no no
view
trace_id: 0xe3b64c60873a461a321caa2afcc3ad7ce9dafa6b4a0ddd9296543f38819784cb
call_targets: 0x8aae129c2b176f1f3909f763b80998439ca11485
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0xe3b64c60873a461a321caa2afcc3ad7ce9dafa6b4a0ddd9296543f38819784cb",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x8aae129c2b176f1f3909f763b80998439ca11485"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x0ce5ae99",
            "selector": "0x0ce5ae99",
            "calldata_variants": [
                "0x0ce5ae99",
                "0x0ce5ae990000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xa1113810",
            "selector": "0xa1113810",
            "calldata_variants": [
                "0xa1113810",
                "0xa11138100000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xa8924985",
            "selector": "0xa8924985",
            "calldata_variants": [
                "0xa8924985",
                "0xa89249850000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xc6dbdf61",
            "selector": "0xc6dbdf61",
            "calldata_variants": [
                "0xc6dbdf61",
                "0xc6dbdf610000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 1243,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "call_count": 1,
    "guards_detected": [],
    "untrusted_call_count": 1
}
high other detector ETH value transfer possible 55 no no
view
trace_id: 0xe3b64c60873a461a321caa2afcc3ad7ce9dafa6b4a0ddd9296543f38819784cb
call_targets: 0x8aae129c2b176f1f3909f763b80998439ca11485
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0xe3b64c60873a461a321caa2afcc3ad7ce9dafa6b4a0ddd9296543f38819784cb",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x8aae129c2b176f1f3909f763b80998439ca11485"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x0ce5ae99",
            "selector": "0x0ce5ae99",
            "calldata_variants": [
                "0x0ce5ae99",
                "0x0ce5ae990000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xa1113810",
            "selector": "0xa1113810",
            "calldata_variants": [
                "0xa1113810",
                "0xa11138100000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xa8924985",
            "selector": "0xa8924985",
            "calldata_variants": [
                "0xa8924985",
                "0xa89249850000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xc6dbdf61",
            "selector": "0xc6dbdf61",
            "calldata_variants": [
                "0xc6dbdf61",
                "0xc6dbdf610000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 1243,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "eth_value_calls": 1,
    "guards_detected": []
}