019b477e-d0f4-70ab-9a88-10a9922277c8
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 27673 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 27674 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 92249 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 92250 | capability.graph | complete | 1 / 3 | 1 week ago |
| 92251 | detector.run | complete | 1 / 3 | 1 week ago |
| 92252 | validation.fork | complete | 1 / 3 | 1 week ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: PUSH1 0x04 00000007: CALLDATASIZE 00000008: LT 00000009: ISZERO 0000000a: PUSH1 0x4a 0000000c: JUMPI 0000000d: JUMPDEST 0000000e: PUSH1 0x00 00000010: CALLDATASIZE 00000011: DUP2 00000012: DUP1 00000013: CALLDATACOPY 00000014: DUP1 00000015: DUP1 00000016: CALLDATASIZE 00000017: DUP2 00000018: PUSH32 0x000000000000000000000000b676cfeeed5c7b739452a502f1eff9ab684a56da 00000039: GAS 0000003a: DELEGATECALL 0000003b: RETURNDATASIZE 0000003c: DUP3 0000003d: DUP1 0000003e: RETURNDATACOPY 0000003f: ISZERO 00000040: PUSH1 0x46 00000042: JUMPI 00000043: RETURNDATASIZE 00000044: SWAP1 00000045: RETURN 00000046: JUMPDEST 00000047: RETURNDATASIZE 00000048: SWAP1 00000049: REVERT 0000004a: JUMPDEST 0000004b: PUSH1 0x00 0000004d: DUP1 0000004e: CALLDATALOAD 0000004f: PUSH1 0xe0 00000051: SHR 00000052: PUSH4 0x56973ee5 00000057: EQ 00000058: PUSH1 0x5f 0000005a: JUMPI 0000005b: POP 0000005c: PUSH1 0x0d 0000005e: JUMP 0000005f: JUMPDEST 00000060: CALLVALUE 00000061: PUSH1 0xa1 00000063: JUMPI 00000064: DUP1 00000065: PUSH1 0x03 00000067: NOT 00000068: CALLDATASIZE 00000069: ADD 0000006a: SLT 0000006b: PUSH1 0xa1 0000006d: JUMPI 0000006e: PUSH32 0x000000000000000000000000b676cfeeed5c7b739452a502f1eff9ab684a56da 0000008f: PUSH1 0x01 00000091: PUSH1 0x01 00000093: PUSH1 0xa0 00000095: SHL 00000096: SUB 00000097: AND 00000098: PUSH1 0x80 0000009a: SWAP1 0000009b: DUP2 0000009c: MSTORE 0000009d: PUSH1 0x20 0000009f: SWAP1 000000a0: RETURN 000000a1: JUMPDEST 000000a2: DUP1 000000a3: REVERT 000000a4: INVALID 000000a5: LOG2 000000a6: PUSH5 0x6970667358 000000ac: UNKNOWN(0x22) 000000ad: SLT 000000ae: KECCAK256 000000af: PUSH18 0xfb9b5f96e8d1bb39716cafe53eda307c9565 000000c2: SWAP2 000000c3: UNKNOWN(0x22) 000000c4: UNKNOWN(0xE6) 000000c5: CALLER 000000c6: UNKNOWN(0x28) 000000c7: UNKNOWN(0xB4) 000000c8: UNKNOWN(0xB2) 000000c9: BYTE 000000ca: KECCAK256 000000cb: LOG3 000000cc: MULMOD 000000cd: DIFFICULTY 000000ce: LOG0 000000cf: PUSH5 0x736f6c6343 000000d5: STOP 000000d6: ADDMOD 000000d7: EQ 000000d8: STOP 000000d9: CALLER
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewtrace_id: 0x4e789f1c820fa6aa5d41211e73120e0389d1c747a94220fa960c1eacdbe3c13e
validation_json{
"sink": "DELEGATECALL",
"errors": 0,
"status": "unknown",
"attempts": 12,
"trace_id": "0x4e789f1c820fa6aa5d41211e73120e0389d1c747a94220fa960c1eacdbe3c13e",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": null,
"matched_probe": null,
"target_varies": null,
"classification": "no_sink"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x56973ee5",
"selector": "0x56973ee5",
"calldata_variants": [
"0x56973ee5",
"0x56973ee50000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 58,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 1,
"untrusted_delegatecall_count": 1
}
|