TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

019b477e-cc46-72af-aa19-4aebbb1bd97d

complete
Chain ID
1
Address
Block Number
Created
Mon, Dec 22, 2025 7:17 PM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
0
Validated
0
Source
Bytecode only
Review Backing
Not yet
Best current signal
Untrusted DELEGATECALL target reachable
crit 0 high 0 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
26841 artifact.fetch complete 1 / 3 3 months ago
26842 tool.cast_disasm complete 1 / 3 3 months ago
113139 analysis.bundle complete 1 / 3 1 week ago
113140 capability.graph complete 1 / 3 1 week ago
113141 detector.run complete 1 / 3 1 week ago
113142 validation.fork complete 1 / 3 1 week ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no
Implementation:
Verified Source: no

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate

No codex job recorded yet.

Opcode Heuristics

tool.cast_disasm
Delegatecall
2
Selfdestruct
0
CREATE2
0
CALL-family (heavy)
0
EXT*/BALANCE
2
Total opcodes
464
Flags
delegatecall_present
View cast disassembly output
00000000: PUSH1 0x80
00000002: PUSH1 0x40
00000004: MSTORE
00000005: PUSH1 0x04
00000007: CALLDATASIZE
00000008: LT
00000009: PUSH2 0x0022
0000000c: JUMPI
0000000d: PUSH1 0x00
0000000f: CALLDATALOAD
00000010: PUSH1 0xe0
00000012: SHR
00000013: DUP1
00000014: PUSH4 0x5c60da1b
00000019: EQ
0000001a: PUSH2 0x0039
0000001d: JUMPI
0000001e: PUSH2 0x0031
00000021: JUMP
00000022: JUMPDEST
00000023: CALLDATASIZE
00000024: PUSH2 0x0031
00000027: JUMPI
00000028: PUSH2 0x002f
0000002b: PUSH2 0x006a
0000002e: JUMP
0000002f: JUMPDEST
00000030: STOP
00000031: JUMPDEST
00000032: PUSH2 0x002f
00000035: PUSH2 0x006a
00000038: JUMP
00000039: JUMPDEST
0000003a: CALLVALUE
0000003b: DUP1
0000003c: ISZERO
0000003d: PUSH2 0x0045
00000040: JUMPI
00000041: PUSH1 0x00
00000043: DUP1
00000044: REVERT
00000045: JUMPDEST
00000046: POP
00000047: PUSH2 0x004e
0000004a: PUSH2 0x00a5
0000004d: JUMP
0000004e: JUMPDEST
0000004f: PUSH1 0x40
00000051: MLOAD
00000052: PUSH1 0x01
00000054: PUSH1 0x01
00000056: PUSH1 0xa0
00000058: SHL
00000059: SUB
0000005a: SWAP1
0000005b: SWAP2
0000005c: AND
0000005d: DUP2
0000005e: MSTORE
0000005f: PUSH1 0x20
00000061: ADD
00000062: PUSH1 0x40
00000064: MLOAD
00000065: DUP1
00000066: SWAP2
00000067: SUB
00000068: SWAP1
00000069: RETURN
0000006a: JUMPDEST
0000006b: PUSH2 0x00a3
0000006e: PUSH2 0x009e
00000071: PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
00000092: SLOAD
00000093: PUSH1 0x01
00000095: PUSH1 0x01
00000097: PUSH1 0xa0
00000099: SHL
0000009a: SUB
0000009b: AND
0000009c: SWAP1
0000009d: JUMP
0000009e: JUMPDEST
0000009f: PUSH2 0x0112
000000a2: JUMP
000000a3: JUMPDEST
000000a4: JUMP
000000a5: JUMPDEST
000000a6: PUSH1 0x00
000000a8: PUSH2 0x00d8
000000ab: PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
000000cc: SLOAD
000000cd: PUSH1 0x01
000000cf: PUSH1 0x01
000000d1: PUSH1 0xa0
000000d3: SHL
000000d4: SUB
000000d5: AND
000000d6: SWAP1
000000d7: JUMP
000000d8: JUMPDEST
000000d9: SWAP1
000000da: POP
000000db: SWAP1
000000dc: JUMP
000000dd: JUMPDEST
000000de: PUSH1 0x60
000000e0: PUSH2 0x0102
000000e3: DUP4
000000e4: DUP4
000000e5: PUSH1 0x40
000000e7: MLOAD
000000e8: DUP1
000000e9: PUSH1 0x60
000000eb: ADD
000000ec: PUSH1 0x40
000000ee: MSTORE
000000ef: DUP1
000000f0: PUSH1 0x27
000000f2: DUP2
000000f3: MSTORE
000000f4: PUSH1 0x20
000000f6: ADD
000000f7: PUSH2 0x02c8
000000fa: PUSH1 0x27
000000fc: SWAP2
000000fd: CODECOPY
000000fe: PUSH2 0x0136
00000101: JUMP
00000102: JUMPDEST
00000103: SWAP4
00000104: SWAP3
00000105: POP
00000106: POP
00000107: POP
00000108: JUMP
00000109: JUMPDEST
0000010a: EXTCODESIZE
0000010b: ISZERO
0000010c: ISZERO
0000010d: SWAP1
0000010e: JUMP
0000010f: JUMPDEST
00000110: SWAP1
00000111: JUMP
00000112: JUMPDEST
00000113: CALLDATASIZE
00000114: PUSH1 0x00
00000116: DUP1
00000117: CALLDATACOPY
00000118: PUSH1 0x00
0000011a: DUP1
0000011b: CALLDATASIZE
0000011c: PUSH1 0x00
0000011e: DUP5
0000011f: GAS
00000120: DELEGATECALL
00000121: RETURNDATASIZE
00000122: PUSH1 0x00
00000124: DUP1
00000125: RETURNDATACOPY
00000126: DUP1
00000127: DUP1
00000128: ISZERO
00000129: PUSH2 0x0131
0000012c: JUMPI
0000012d: RETURNDATASIZE
0000012e: PUSH1 0x00
00000130: RETURN
00000131: JUMPDEST
00000132: RETURNDATASIZE
00000133: PUSH1 0x00
00000135: REVERT
00000136: JUMPDEST
00000137: PUSH1 0x60
00000139: DUP4
0000013a: EXTCODESIZE
0000013b: PUSH2 0x019a
0000013e: JUMPI
0000013f: PUSH1 0x40
00000141: MLOAD
00000142: PUSH3 0x461bcd
00000146: PUSH1 0xe5
00000148: SHL
00000149: DUP2
0000014a: MSTORE
0000014b: PUSH1 0x20
0000014d: PUSH1 0x04
0000014f: DUP3
00000150: ADD
00000151: MSTORE
00000152: PUSH1 0x26
00000154: PUSH1 0x24
00000156: DUP3
00000157: ADD
00000158: MSTORE
00000159: PUSH32 0x416464726573733a2064656c65676174652063616c6c20746f206e6f6e2d636f
0000017a: PUSH1 0x44
0000017c: DUP3
0000017d: ADD
0000017e: MSTORE
0000017f: PUSH6 0x1b9d1c9858dd
00000186: PUSH1 0xd2
00000188: SHL
00000189: PUSH1 0x64
0000018b: DUP3
0000018c: ADD
0000018d: MSTORE
0000018e: PUSH1 0x84
00000190: ADD
00000191: JUMPDEST
00000192: PUSH1 0x40
00000194: MLOAD
00000195: DUP1
00000196: SWAP2
00000197: SUB
00000198: SWAP1
00000199: REVERT
0000019a: JUMPDEST
0000019b: PUSH1 0x00
0000019d: DUP1
0000019e: DUP6
0000019f: PUSH1 0x01
000001a1: PUSH1 0x01
000001a3: PUSH1 0xa0
000001a5: SHL
000001a6: SUB
000001a7: AND
000001a8: DUP6
000001a9: PUSH1 0x40
000001ab: MLOAD
000001ac: PUSH2 0x01b5
000001af: SWAP2
000001b0: SWAP1
000001b1: PUSH2 0x0248
000001b4: JUMP
000001b5: JUMPDEST
000001b6: PUSH1 0x00
000001b8: PUSH1 0x40
000001ba: MLOAD
000001bb: DUP1
000001bc: DUP4
000001bd: SUB
000001be: DUP2
000001bf: DUP6
000001c0: GAS
000001c1: DELEGATECALL
000001c2: SWAP2
000001c3: POP
000001c4: POP
000001c5: RETURNDATASIZE
000001c6: DUP1
000001c7: PUSH1 0x00
000001c9: DUP2
000001ca: EQ
000001cb: PUSH2 0x01f0
000001ce: JUMPI
000001cf: PUSH1 0x40
000001d1: MLOAD
000001d2: SWAP2
000001d3: POP
000001d4: PUSH1 0x1f
000001d6: NOT
000001d7: PUSH1 0x3f
000001d9: RETURNDATASIZE
000001da: ADD
000001db: AND
000001dc: DUP3
000001dd: ADD
000001de: PUSH1 0x40
000001e0: MSTORE
000001e1: RETURNDATASIZE
000001e2: DUP3
000001e3: MSTORE
000001e4: RETURNDATASIZE
000001e5: PUSH1 0x00
000001e7: PUSH1 0x20
000001e9: DUP5
000001ea: ADD
000001eb: RETURNDATACOPY
000001ec: PUSH2 0x01f5
000001ef: JUMP
000001f0: JUMPDEST
000001f1: PUSH1 0x60
000001f3: SWAP2
000001f4: POP
000001f5: JUMPDEST
000001f6: POP
000001f7: SWAP2
000001f8: POP
000001f9: SWAP2
000001fa: POP
000001fb: PUSH2 0x0205
000001fe: DUP3
000001ff: DUP3
00000200: DUP7
00000201: PUSH2 0x020f
00000204: JUMP
00000205: JUMPDEST
00000206: SWAP7
00000207: SWAP6
00000208: POP
00000209: POP
0000020a: POP
0000020b: POP
0000020c: POP
0000020d: POP
0000020e: JUMP
0000020f: JUMPDEST
00000210: PUSH1 0x60
00000212: DUP4
00000213: ISZERO
00000214: PUSH2 0x021e
00000217: JUMPI
00000218: POP
00000219: DUP2
0000021a: PUSH2 0x0102
0000021d: JUMP
0000021e: JUMPDEST
0000021f: DUP3
00000220: MLOAD
00000221: ISZERO
00000222: PUSH2 0x022e
00000225: JUMPI
00000226: DUP3
00000227: MLOAD
00000228: DUP1
00000229: DUP5
0000022a: PUSH1 0x20
0000022c: ADD
0000022d: REVERT
0000022e: JUMPDEST
0000022f: DUP2
00000230: PUSH1 0x40
00000232: MLOAD
00000233: PUSH3 0x461bcd
00000237: PUSH1 0xe5
00000239: SHL
0000023a: DUP2
0000023b: MSTORE
0000023c: PUSH1 0x04
0000023e: ADD
0000023f: PUSH2 0x0191
00000242: SWAP2
00000243: SWAP1
00000244: PUSH2 0x0264
00000247: JUMP
00000248: JUMPDEST
00000249: PUSH1 0x00
0000024b: DUP3
0000024c: MLOAD
0000024d: PUSH2 0x025a
00000250: DUP2
00000251: DUP5
00000252: PUSH1 0x20
00000254: DUP8
00000255: ADD
00000256: PUSH2 0x0297
00000259: JUMP
0000025a: JUMPDEST
0000025b: SWAP2
0000025c: SWAP1
0000025d: SWAP2
0000025e: ADD
0000025f: SWAP3
00000260: SWAP2
00000261: POP
00000262: POP
00000263: JUMP
00000264: JUMPDEST
00000265: PUSH1 0x00
00000267: PUSH1 0x20
00000269: DUP3
0000026a: MSTORE
0000026b: DUP3
0000026c: MLOAD
0000026d: DUP1
0000026e: PUSH1 0x20
00000270: DUP5
00000271: ADD
00000272: MSTORE
00000273: PUSH2 0x0283
00000276: DUP2
00000277: PUSH1 0x40
00000279: DUP6
0000027a: ADD
0000027b: PUSH1 0x20
0000027d: DUP8
0000027e: ADD
0000027f: PUSH2 0x0297
00000282: JUMP
00000283: JUMPDEST
00000284: PUSH1 0x1f
00000286: ADD
00000287: PUSH1 0x1f
00000289: NOT
0000028a: AND
0000028b: SWAP2
0000028c: SWAP1
0000028d: SWAP2
0000028e: ADD
0000028f: PUSH1 0x40
00000291: ADD
00000292: SWAP3
00000293: SWAP2
00000294: POP
00000295: POP
00000296: JUMP
00000297: JUMPDEST
00000298: PUSH1 0x00
0000029a: JUMPDEST
0000029b: DUP4
0000029c: DUP2
0000029d: LT
0000029e: ISZERO
0000029f: PUSH2 0x02b2
000002a2: JUMPI
000002a3: DUP2
000002a4: DUP2
000002a5: ADD
000002a6: MLOAD
000002a7: DUP4
000002a8: DUP3
000002a9: ADD
000002aa: MSTORE
000002ab: PUSH1 0x20
000002ad: ADD
000002ae: PUSH2 0x029a
000002b1: JUMP
000002b2: JUMPDEST
000002b3: DUP4
000002b4: DUP2
000002b5: GT
000002b6: ISZERO
000002b7: PUSH2 0x02c1
000002ba: JUMPI
000002bb: PUSH1 0x00
000002bd: DUP5
000002be: DUP5
000002bf: ADD
000002c0: MSTORE
000002c1: JUMPDEST
000002c2: POP
000002c3: POP
000002c4: POP
000002c5: POP
000002c6: JUMP
000002c7: INVALID
000002c8: COINBASE
000002c9: PUSH5 0x6472657373
000002cf: GASPRICE
000002d0: KECCAK256
000002d1: PUSH13 0x6f772d6c6576656c2064656c65
000002df: PUSH8 0x6174652063616c6c
000002e8: KECCAK256
000002e9: PUSH7 0x61696c6564a264
000002f1: PUSH10 0x7066735822122005332d
000002fc: UNKNOWN(0xB2)
000002fd: DIV
000002fe: SIGNEXTEND
000002ff: UNKNOWN(0xA7)
00000300: PUSH28 0xcdbbddb8f12c16be6e9aee20edaba1466801313cdb9c812e64736f6c
0000031d: PUSH4 0x43000802
00000322: STOP
00000323: CALLER

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
critical upgradeability detector Untrusted DELEGATECALL target reachable 70 no no
view
trace_id: 0x2822ade88fecc0565ded5ad76cccfc905e1230330c76c04a6ff7f9d7594a76a2
validation_json
{
    "sink": "DELEGATECALL",
    "errors": 0,
    "status": "unknown",
    "attempts": 12,
    "trace_id": "0x2822ade88fecc0565ded5ad76cccfc905e1230330c76c04a6ff7f9d7594a76a2",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": null,
    "matched_probe": null,
    "target_varies": null,
    "classification": "no_sink"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x5c60da1b",
            "selector": "0x5c60da1b",
            "calldata_variants": [
                "0x5c60da1b",
                "0x5c60da1b0000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 288,
            "opcode": "DELEGATECALL",
            "returndata_checked": null,
            "value_expression_category": "n/a",
            "target_expression_category": "computed"
        },
        {
            "pc": 449,
            "opcode": "DELEGATECALL",
            "returndata_checked": null,
            "value_expression_category": "n/a",
            "target_expression_category": "computed"
        }
    ],
    "guards_detected": [],
    "delegatecall_count": 2,
    "untrusted_delegatecall_count": 2
}