019b477e-bc12-72c4-9684-c7ba6fed5d48
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 24011 | artifact.fetch | complete | 1 / 3 | 4 months ago |
| 24012 | tool.cast_disasm | complete | 1 / 3 | 4 months ago |
| 67206 | analysis.bundle | complete | 1 / 3 | 2 weeks ago |
| 67207 | capability.graph | complete | 1 / 3 | 2 weeks ago |
| 67208 | detector.run | complete | 1 / 3 | 2 weeks ago |
| 67209 | validation.fork | complete | 1 / 3 | 2 weeks ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: CALLDATASIZE 00000001: ISZERO 00000002: ISZERO 00000003: PUSH2 0x0008 00000006: JUMPI 00000007: STOP 00000008: JUMPDEST 00000009: PUSH1 0x20 0000000b: PUSH2 0x0014 0000000e: DUP2 0000000f: CODESIZE 00000010: PUSH2 0x0109 00000013: JUMP 00000014: JUMPDEST 00000015: PUSH1 0x00 00000017: DUP3 00000018: DUP3 00000019: DUP3 0000001a: CODECOPY 0000001b: DUP1 0000001c: MLOAD 0000001d: SWAP2 0000001e: POP 0000001f: DUP1 00000020: SLOAD 00000021: PUSH1 0x04 00000023: DUP1 00000024: DUP4 00000025: DUP5 00000026: CALLDATACOPY 00000027: PUSH1 0x01 00000029: PUSH1 0xe0 0000002b: SHL 0000002c: DUP4 0000002d: MLOAD 0000002e: DIV 0000002f: PUSH4 0xc4627c5d 00000034: DUP2 00000035: EQ 00000036: PUSH2 0x0057 00000039: JUMPI 0000003a: PUSH4 0x776d1a01 0000003f: DUP2 00000040: EQ 00000041: PUSH2 0x00a6 00000044: JUMPI 00000045: PUSH4 0x1e77933e 0000004a: DUP2 0000004b: EQ 0000004c: PUSH2 0x00c0 0000004f: JUMPI 00000050: DUP4 00000051: DUP5 00000052: REVERT 00000053: PUSH2 0x00d5 00000056: JUMP 00000057: JUMPDEST 00000058: DUP5 00000059: CALLER 0000005a: EQ 0000005b: PUSH2 0x0069 0000005e: PUSH1 0x01 00000060: DUP3 00000061: DUP7 00000062: CALLER 00000063: EQ 00000064: OR 00000065: PUSH2 0x0131 00000068: JUMP 00000069: JUMPDEST 0000006a: CALLDATASIZE 0000006b: DUP4 0000006c: DUP7 0000006d: CALLDATACOPY 0000006e: PUSH2 0x007f 00000071: PUSH1 0x02 00000073: PUSH1 0x01 00000075: SLOAD 00000076: DUP8 00000077: MLOAD 00000078: EQ 00000079: DUP4 0000007a: OR 0000007b: PUSH2 0x0131 0000007e: JUMP 0000007f: JUMPDEST 00000080: POP 00000081: PUSH2 0x00a1 00000084: PUSH1 0x03 00000086: DUP6 00000087: DUP7 00000088: PUSH1 0x60 0000008a: MLOAD 0000008b: PUSH2 0x0096 0000008e: DUP12 0000008f: PUSH1 0x40 00000091: MLOAD 00000092: PUSH2 0x00e1 00000095: JUMP 00000096: JUMPDEST 00000097: DUP12 00000098: MLOAD 00000099: DUP11 0000009a: MLOAD 0000009b: GAS 0000009c: CALL 0000009d: PUSH2 0x0131 000000a0: JUMP 000000a1: JUMPDEST 000000a2: PUSH2 0x00d5 000000a5: JUMP 000000a6: JUMPDEST 000000a7: PUSH2 0x00b2 000000aa: DUP3 000000ab: DUP7 000000ac: CALLER 000000ad: EQ 000000ae: PUSH2 0x0131 000000b1: JUMP 000000b2: JUMPDEST 000000b3: DUP6 000000b4: DUP3 000000b5: DUP6 000000b6: CALLDATACOPY 000000b7: DUP4 000000b8: MLOAD 000000b9: PUSH1 0x01 000000bb: SSTORE 000000bc: PUSH2 0x00d5 000000bf: JUMP 000000c0: JUMPDEST 000000c1: PUSH2 0x00cc 000000c4: DUP3 000000c5: DUP7 000000c6: CALLER 000000c7: EQ 000000c8: PUSH2 0x0131 000000cb: JUMP 000000cc: JUMPDEST 000000cd: DUP6 000000ce: DUP3 000000cf: DUP6 000000d0: CALLDATACOPY 000000d1: DUP4 000000d2: MLOAD 000000d3: DUP5 000000d4: SSTORE 000000d5: JUMPDEST 000000d6: POP 000000d7: POP 000000d8: POP 000000d9: POP 000000da: POP 000000db: POP 000000dc: STOP 000000dd: PUSH2 0x0149 000000e0: JUMP 000000e1: JUMPDEST 000000e2: PUSH1 0x00 000000e4: DUP3 000000e5: DUP3 000000e6: ADD 000000e7: SWAP1 000000e8: POP 000000e9: PUSH1 0x01 000000eb: DUP3 000000ec: DUP3 000000ed: GT 000000ee: DUP4 000000ef: DUP4 000000f0: EQ 000000f1: OR 000000f2: LT 000000f3: ISZERO 000000f4: PUSH2 0x0102 000000f7: JUMPI 000000f8: PUSH1 0x00 000000fa: PUSH1 0x00 000000fc: MSTORE 000000fd: PUSH1 0x20 000000ff: PUSH1 0x00 00000101: REVERT 00000102: JUMPDEST 00000103: JUMPDEST 00000104: SWAP3 00000105: SWAP2 00000106: POP 00000107: POP 00000108: JUMP 00000109: JUMPDEST 0000010a: PUSH1 0x00 0000010c: DUP3 0000010d: DUP3 0000010e: SUB 0000010f: SWAP1 00000110: POP 00000111: PUSH1 0x01 00000113: DUP3 00000114: DUP3 00000115: LT 00000116: DUP4 00000117: DUP4 00000118: EQ 00000119: OR 0000011a: LT 0000011b: ISZERO 0000011c: PUSH2 0x012a 0000011f: JUMPI 00000120: PUSH1 0x00 00000122: PUSH1 0x00 00000124: MSTORE 00000125: PUSH1 0x20 00000127: PUSH1 0x00 00000129: REVERT 0000012a: JUMPDEST 0000012b: JUMPDEST 0000012c: SWAP3 0000012d: SWAP2 0000012e: POP 0000012f: POP 00000130: JUMP 00000131: JUMPDEST 00000132: PUSH1 0x01 00000134: DUP2 00000135: LT 00000136: ISZERO 00000137: PUSH2 0x0144 0000013a: JUMPI 0000013b: DUP2 0000013c: PUSH1 0x00 0000013e: MSTORE 0000013f: PUSH1 0x20 00000141: PUSH1 0x00 00000143: REVERT 00000144: JUMPDEST 00000145: JUMPDEST 00000146: POP 00000147: POP 00000148: JUMP 00000149: JUMPDEST 0000014a: STOP 0000014b: STOP 0000014c: STOP 0000014d: STOP 0000014e: STOP 0000014f: STOP 00000150: STOP 00000151: STOP 00000152: STOP 00000153: STOP 00000154: STOP 00000155: STOP 00000156: UNKNOWN(0x0E) 00000157: UNKNOWN(0xA6) 00000158: UNKNOWN(0xB5) 00000159: UNKNOWN(0xED) 0000015a: UNKNOWN(0xC8) 0000015b: SWAP1 0000015c: TLOAD 0000015d: DUP6 0000015e: MLOAD 0000015f: UNKNOWN(0x4B) 00000160: CALLDATASIZE 00000161: PUSH23 0x703f1bfe6ec260ad0000000000000000000000003e947a 00000179: UNKNOWN(0x27) 0000017a: BYTE 0000017b: CALLDATACOPY 0000017c: UNKNOWN(0xAE) 0000017d: PUSH28
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| medium | other | detector | Untrusted CALL target/value reachable | 45 | no | no |
viewtrace_id: 0xf14a4108349e4083cddf9228e98e2351840267854322990c7037cd89a4276368
call_targets:
0xb02b12bf1f2337d2e45554aec474e4e25bdf8c76
target_varies:
no
classification:
constant_target
validation_json{
"sink": "CALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0xf14a4108349e4083cddf9228e98e2351840267854322990c7037cd89a4276368",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0xb02b12bf1f2337d2e45554aec474e4e25bdf8c76"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0xc4627c5d",
"selector": "0xc4627c5d",
"calldata_variants": [
"0xc4627c5d",
"0xc4627c5d0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x776d1a01",
"selector": "0x776d1a01",
"calldata_variants": [
"0x776d1a01",
"0x776d1a010000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x1e77933e",
"selector": "0x1e77933e",
"calldata_variants": [
"0x1e77933e",
"0x1e77933e0000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 156,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"call_count": 1,
"guards_detected": [
{
"pc": 99,
"type": "msg_sender_eq_const",
"value": 1
},
{
"pc": 173,
"type": "msg_sender_eq_const",
"value": 178
},
{
"pc": 199,
"type": "msg_sender_eq_const",
"value": 204
}
],
"untrusted_call_count": 1
}
|
| medium | other | detector | ETH value transfer possible | 40 | no | no |
viewtrace_id: 0xf14a4108349e4083cddf9228e98e2351840267854322990c7037cd89a4276368
call_targets:
0xb02b12bf1f2337d2e45554aec474e4e25bdf8c76
target_varies:
no
classification:
constant_target
validation_json{
"sink": "CALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0xf14a4108349e4083cddf9228e98e2351840267854322990c7037cd89a4276368",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0xb02b12bf1f2337d2e45554aec474e4e25bdf8c76"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0xc4627c5d",
"selector": "0xc4627c5d",
"calldata_variants": [
"0xc4627c5d",
"0xc4627c5d0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x776d1a01",
"selector": "0x776d1a01",
"calldata_variants": [
"0x776d1a01",
"0x776d1a010000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x1e77933e",
"selector": "0x1e77933e",
"calldata_variants": [
"0x1e77933e",
"0x1e77933e0000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 156,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"eth_value_calls": 1,
"guards_detected": [
{
"pc": 99,
"type": "msg_sender_eq_const",
"value": 1
},
{
"pc": 173,
"type": "msg_sender_eq_const",
"value": 178
},
{
"pc": 199,
"type": "msg_sender_eq_const",
"value": 204
}
]
}
|