019b477e-d03f-7242-b16d-f7134a510dba
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 27533 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 27534 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 108045 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 108046 | capability.graph | complete | 1 / 3 | 1 week ago |
| 108047 | detector.run | complete | 1 / 3 | 1 week ago |
| 108048 | validation.fork | complete | 1 / 3 | 1 week ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: CALLDATASIZE 00000006: ISZERO 00000007: PUSH2 0x00d7 0000000a: JUMPI 0000000b: PUSH4 0x66ffd663 00000010: PUSH1 0xe1 00000012: SHL 00000013: PUSH1 0x80 00000015: SWAP1 00000016: DUP2 00000017: MSTORE 00000018: PUSH1 0x00 0000001a: DUP1 0000001b: CALLDATALOAD 0000001c: PUSH1 0x01 0000001e: PUSH1 0x01 00000020: PUSH1 0xe0 00000022: SHL 00000023: SUB 00000024: NOT 00000025: AND 00000026: PUSH1 0x84 00000028: MSTORE 00000029: SWAP1 0000002a: PUSH1 0x20 0000002c: SWAP1 0000002d: PUSH1 0x24 0000002f: DUP2 00000030: PUSH32 0x0000000000000000000000009d781ec50967ce6bb4f0714d36b3a21b1d94596f 00000051: PUSH1 0x01 00000053: PUSH1 0x01 00000055: PUSH1 0xa0 00000057: SHL 00000058: SUB 00000059: AND 0000005a: GAS 0000005b: STATICCALL 0000005c: DUP1 0000005d: ISZERO 0000005e: PUSH2 0x00ca 00000061: JUMPI 00000062: DUP2 00000063: SWAP1 00000064: PUSH2 0x009e 00000067: JUMPI 00000068: JUMPDEST 00000069: DUP1 0000006a: EXTCODESIZE 0000006b: ISZERO 0000006c: PUSH2 0x008c 0000006f: JUMPI 00000070: DUP2 00000071: DUP1 00000072: SWAP2 00000073: CALLDATASIZE 00000074: DUP3 00000075: DUP1 00000076: CALLDATACOPY 00000077: DUP2 00000078: CALLDATASIZE 00000079: SWAP2 0000007a: GAS 0000007b: DELEGATECALL 0000007c: RETURNDATASIZE 0000007d: DUP3 0000007e: DUP1 0000007f: RETURNDATACOPY 00000080: ISZERO 00000081: PUSH2 0x0088 00000084: JUMPI 00000085: RETURNDATASIZE 00000086: SWAP1 00000087: RETURN 00000088: JUMPDEST 00000089: RETURNDATASIZE 0000008a: SWAP1 0000008b: REVERT 0000008c: JUMPDEST 0000008d: PUSH1 0x40 0000008f: MLOAD 00000090: PUSH4 0x21f27f0d 00000095: PUSH1 0xe2 00000097: SHL 00000098: DUP2 00000099: MSTORE 0000009a: PUSH1 0x04 0000009c: SWAP1 0000009d: REVERT 0000009e: JUMPDEST 0000009f: POP 000000a0: PUSH1 0x20 000000a2: RETURNDATASIZE 000000a3: DUP2 000000a4: GT 000000a5: PUSH2 0x00c3 000000a8: JUMPI 000000a9: JUMPDEST 000000aa: DUP1 000000ab: PUSH2 0x00b6 000000ae: PUSH2 0x00be 000000b1: SWAP3 000000b2: PUSH2 0x00d9 000000b5: JUMP 000000b6: JUMPDEST 000000b7: PUSH1 0x80 000000b9: ADD 000000ba: PUSH2 0x0112 000000bd: JUMP 000000be: JUMPDEST 000000bf: PUSH2 0x0068 000000c2: JUMP 000000c3: JUMPDEST 000000c4: POP 000000c5: RETURNDATASIZE 000000c6: PUSH2 0x00a9 000000c9: JUMP 000000ca: JUMPDEST 000000cb: POP 000000cc: PUSH1 0x40 000000ce: MLOAD 000000cf: SWAP1 000000d0: RETURNDATASIZE 000000d1: SWAP1 000000d2: DUP3 000000d3: RETURNDATACOPY 000000d4: RETURNDATASIZE 000000d5: SWAP1 000000d6: REVERT 000000d7: JUMPDEST 000000d8: STOP 000000d9: JUMPDEST 000000da: PUSH1 0x1f 000000dc: DUP1 000000dd: NOT 000000de: SWAP2 000000df: ADD 000000e0: AND 000000e1: PUSH1 0x80 000000e3: ADD 000000e4: PUSH1 0x80 000000e6: DUP2 000000e7: LT 000000e8: PUSH8 0xffffffffffffffff 000000f1: DUP3 000000f2: GT 000000f3: OR 000000f4: PUSH2 0x00fc 000000f7: JUMPI 000000f8: PUSH1 0x40 000000fa: MSTORE 000000fb: JUMP 000000fc: JUMPDEST 000000fd: PUSH4 0x4e487b71 00000102: PUSH1 0xe0 00000104: SHL 00000105: PUSH1 0x00 00000107: MSTORE 00000108: PUSH1 0x41 0000010a: PUSH1 0x04 0000010c: MSTORE 0000010d: PUSH1 0x24 0000010f: PUSH1 0x00 00000111: REVERT 00000112: JUMPDEST 00000113: PUSH1 0x20 00000115: SWAP1 00000116: PUSH1 0x7f 00000118: NOT 00000119: ADD 0000011a: SLT 0000011b: PUSH2 0x0134 0000011e: JUMPI 0000011f: PUSH1 0x80 00000121: MLOAD 00000122: PUSH1 0x01 00000124: PUSH1 0x01 00000126: PUSH1 0xa0 00000128: SHL 00000129: SUB 0000012a: DUP2 0000012b: AND 0000012c: DUP2 0000012d: SUB 0000012e: PUSH2 0x0134 00000131: JUMPI 00000132: SWAP1 00000133: JUMP 00000134: JUMPDEST 00000135: PUSH1 0x00 00000137: DUP1 00000138: REVERT 00000139: INVALID 0000013a: LOG2 0000013b: PUSH5 0x6970667358 00000141: UNKNOWN(0x22) 00000142: SLT 00000143: KECCAK256 00000144: INVALID 00000145: EXTCODEHASH 00000146: RETURN 00000147: PUSH28 0x3df014e8ea44af74353788e2a080c21ce7d0e374361efd919d154829 00000164: PUSH5 0x736f6c6343 0000016a: STOP 0000016b: ADDMOD 0000016c: SLT 0000016d: STOP 0000016e: CALLER
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewvalidation_json{
"sink": "DELEGATECALL",
"errors": 10,
"status": "unknown",
"attempts": 11,
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": null,
"matched_probe": null,
"target_varies": null,
"classification": "no_sink"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 123,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 1,
"untrusted_delegatecall_count": 1
}
|