019b477e-c4e2-7390-8b59-3022f395a867
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 25487 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 25488 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 91145 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 91146 | capability.graph | complete | 1 / 3 | 1 week ago |
| 91147 | detector.run | complete | 1 / 3 | 1 week ago |
| 91148 | validation.fork | complete | 1 / 3 | 1 week ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: PUSH32 0xc5f16f0fcc639fa48a6947836d9850f504798523bf8c9a3a87d5876cf622bcf7 00000026: SLOAD 00000027: CALLDATASIZE 00000028: PUSH1 0x00 0000002a: DUP1 0000002b: CALLDATACOPY 0000002c: PUSH1 0x00 0000002e: DUP1 0000002f: CALLDATASIZE 00000030: PUSH1 0x00 00000032: DUP5 00000033: GAS 00000034: DELEGATECALL 00000035: RETURNDATASIZE 00000036: PUSH1 0x00 00000038: DUP1 00000039: RETURNDATACOPY 0000003a: DUP1 0000003b: PUSH1 0x00 0000003d: DUP2 0000003e: EQ 0000003f: PUSH1 0x46 00000041: JUMPI 00000042: RETURNDATASIZE 00000043: PUSH1 0x00 00000045: RETURN 00000046: JUMPDEST 00000047: RETURNDATASIZE 00000048: PUSH1 0x00 0000004a: REVERT 0000004b: INVALID 0000004c: LOG2 0000004d: PUSH5 0x6970667358 00000053: UNKNOWN(0x22) 00000054: SLT 00000055: KECCAK256 00000056: UNKNOWN(0xC4) 00000057: PC 00000058: UNKNOWN(0x21) 00000059: SWAP10 0000005a: UNKNOWN(0x2A) 0000005b: UNKNOWN(0xCF) 0000005c: BLOBHASH 0000005d: UNKNOWN(0xBB) 0000005e: MSTORE8 0000005f: SWAP13 00000060: DUP4 00000061: UNKNOWN(0xBA) 00000062: UNKNOWN(0xDA) 00000063: XOR 00000064: GASLIMIT 00000065: SWAP3 00000066: UNKNOWN(0xB1) 00000067: PUSH2 0x433b 0000006a: BYTE 0000006b: PUSH27
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewtrace_id: 0xddc69afee00dc92c4119250dcf75ad2affb54526da9f96c3fbbf331e738d9ca4
call_targets:
0x534a9af1400693cc522dff0fb2304095856fe747
target_varies:
no
classification:
constant_target
validation_json{
"sink": "DELEGATECALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0xddc69afee00dc92c4119250dcf75ad2affb54526da9f96c3fbbf331e738d9ca4",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x534a9af1400693cc522dff0fb2304095856fe747"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 52,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 1,
"untrusted_delegatecall_count": 1
}
|