019b477e-c0dc-735d-b8e9-351d65d19a97
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 24763 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 24764 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 102348 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 102349 | capability.graph | complete | 1 / 3 | 1 week ago |
| 102350 | detector.run | complete | 1 / 3 | 1 week ago |
| 102351 | validation.fork | complete | 1 / 3 | 1 week ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: PUSH1 0x04 00000007: CALLDATASIZE 00000008: LT 00000009: PUSH1 0x1f 0000000b: JUMPI 0000000c: PUSH1 0x00 0000000e: CALLDATALOAD 0000000f: PUSH1 0xe0 00000011: SHR 00000012: DUP1 00000013: PUSH4 0xd7dfa0dd 00000018: EQ 00000019: PUSH1 0x6b 0000001b: JUMPI 0000001c: PUSH1 0x25 0000001e: JUMP 0000001f: JUMPDEST 00000020: CALLDATASIZE 00000021: PUSH1 0x25 00000023: JUMPI 00000024: STOP 00000025: JUMPDEST 00000026: PUSH1 0x40 00000028: MLOAD 00000029: PUSH32 0x000000000000000000000000e002fd6b5dd259c9563149e2161230f3ce63bef0 0000004a: SWAP1 0000004b: CALLDATASIZE 0000004c: PUSH1 0x00 0000004e: DUP3 0000004f: CALLDATACOPY 00000050: PUSH1 0x00 00000052: DUP1 00000053: CALLDATASIZE 00000054: DUP4 00000055: DUP6 00000056: GAS 00000057: DELEGATECALL 00000058: RETURNDATASIZE 00000059: DUP1 0000005a: PUSH1 0x00 0000005c: DUP5 0000005d: RETURNDATACOPY 0000005e: DUP2 0000005f: DUP1 00000060: ISZERO 00000061: PUSH1 0x67 00000063: JUMPI 00000064: DUP2 00000065: DUP5 00000066: RETURN 00000067: JUMPDEST 00000068: DUP2 00000069: DUP5 0000006a: REVERT 0000006b: JUMPDEST 0000006c: CALLVALUE 0000006d: DUP1 0000006e: ISZERO 0000006f: PUSH1 0x76 00000071: JUMPI 00000072: PUSH1 0x00 00000074: DUP1 00000075: REVERT 00000076: JUMPDEST 00000077: POP 00000078: PUSH1 0x9d 0000007a: PUSH32 0x000000000000000000000000e002fd6b5dd259c9563149e2161230f3ce63bef0 0000009b: DUP2 0000009c: JUMP 0000009d: JUMPDEST 0000009e: PUSH1 0x40 000000a0: MLOAD 000000a1: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 000000b6: SWAP1 000000b7: SWAP2 000000b8: AND 000000b9: DUP2 000000ba: MSTORE 000000bb: PUSH1 0x20 000000bd: ADD 000000be: PUSH1 0x40 000000c0: MLOAD 000000c1: DUP1 000000c2: SWAP2 000000c3: SUB 000000c4: SWAP1 000000c5: RETURN 000000c6: INVALID 000000c7: LOG2 000000c8: PUSH5 0x6970667358 000000ce: UNKNOWN(0x22) 000000cf: SLT 000000d0: KECCAK256 000000d1: LOG3 000000d2: CALLDATALOAD 000000d3: UNKNOWN(0x0E) 000000d4: PUSH27 0xbb318cfd6c2f0227ef2ec856c01e215d98d5d2e5e2202e41a3c4de 000000f0: UNKNOWN(0xAF) 000000f1: PUSH5 0x736f6c6343 000000f7: STOP 000000f8: ADDMOD 000000f9: SDIV 000000fa: STOP 000000fb: CALLER
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewtrace_id: 0x1da5c6bd37bf020aa2120bb4829336277325fed4766334e00c0a457b5ce84bad
validation_json{
"sink": "DELEGATECALL",
"errors": 0,
"status": "unknown",
"attempts": 12,
"trace_id": "0x1da5c6bd37bf020aa2120bb4829336277325fed4766334e00c0a457b5ce84bad",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": null,
"matched_probe": null,
"target_varies": null,
"classification": "no_sink"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0xd7dfa0dd",
"selector": "0xd7dfa0dd",
"calldata_variants": [
"0xd7dfa0dd",
"0xd7dfa0dd0000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 87,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 1,
"untrusted_delegatecall_count": 1
}
|