TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

019b477e-d183-727a-aa07-eed3182bacf8

failed
Chain ID
1
Address
Block Number
Created
Mon, Dec 22, 2025 7:17 PM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
1
Validated
1
Source
Verified
Review Backing
Not yet
Best current signal
Untrusted DELEGATECALL target reachable
crit 1 high 0 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
27773 artifact.fetch complete 1 / 3 3 months ago
27774 tool.cast_disasm complete 1 / 3 3 months ago
71660 analysis.bundle complete 1 / 3 1 week ago
71661 capability.graph complete 1 / 3 1 week ago
71662 detector.run complete 1 / 3 1 week ago
71663 validation.fork complete 1 / 3 1 week ago
113550 report.consolidate complete 1 / 6 1 week ago
113551 tool.slither failed 2 / 2 1 week ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no
Implementation:
Verified Source: yes

Slither

tool.slither
Status
failed slither failed (exit 1): 'forge clean' running (wd: /tmp/slither-se6x0l57) 'forge config --json' running 'forge build --build-info --skip ./test/** ./script/** --force' running (wd: /tmp/slither-se6x0l57) 'forge' returned non-zero exit code 1 Error: Encountered invalid solc version in lib/openzeppelin-contracts/contracts/proxy/beacon/BeaconProxy.sol: No solc version exists that matches the version requirement: ^0.8.22 Traceback (most recent call last): File "/var/www/tripwire/.venv/bin/slither", line 10, in <module> sys.exit(main()) ~~~~^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/slither/__main__.py", line 776, in main main_impl(all_detector_classes=detectors, all_printer_classes=printers) ~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/slither/__main__.py", line 882, in main_impl ) = process_all(filename, args, detector_classes, printer_classes) ~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/slither/__main__.py", line 96, in process_all compilations = compile_all(target, **vars(args)) File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/crytic_compile.py", line 722, in compile_all compilations.append(CryticCompile(target, **kwargs)) ~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/crytic_compile.py", line 211, in __init__ self._compile(**kwargs) ~~~~~~~~~~~~~^^^^^^^^^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/crytic_compile.py", line 633, in _compile self._platform.compile(self, **kwargs) ~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/platform/foundry.py", line 102, in compile hardhat_like_parsing( ~~~~~~~~~~~~~~~~~~~~^ crytic_compile, str(self._target), build_directory, str(self._project_root) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ) ^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/platform/hardhat.py", line 52, in hardhat_like_parsing raise InvalidCompilation(txt) crytic_compile.platform.exceptions.InvalidCompilation: Compilation failed. Can you run build command? /tmp/slither-se6x0l57/out/build-info is not a directory.
Attempts
2 / 2
Findings
0
Solc
View stderr
Traceback (most recent call last):
  File "/var/www/tripwire/worker/worker.py", line 198, in main
    payload = dispatch_job(job_type, job_id, job_meta, run_data, config, laravel_client)
  File "/var/www/tripwire/worker/worker.py", line 114, in dispatch_job
    return slither_run.run(job_id, job_meta, run_data, config, log, laravel_client)
           ~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/var/www/tripwire/worker/jobs/slither_run.py", line 1084, in run
    stdout_text, stderr_text, result_json = _run_slither(
                                            ~~~~~~~~~~~~^
        workspace,
        ^^^^^^^^^^
    ...<4 lines>...
        target_path=target_path,
        ^^^^^^^^^^^^^^^^^^^^^^^^
    )
    ^
  File "/var/www/tripwire/worker/jobs/slither_run.py", line 958, in _run_slither
    raise RuntimeError(f"slither failed (exit {result.returncode}): {stderr_text or stdout_text}")
RuntimeError: slither failed (exit 1): 'forge clean' running (wd: /tmp/slither-se6x0l57)
'forge config --json' running
'forge build --build-info --skip ./test/** ./script/** --force' running (wd: /tmp/slither-se6x0l57)
'forge' returned non-zero exit code 1
Error: Encountered invalid solc version in lib/openzeppelin-contracts/contracts/proxy/beacon/BeaconProxy.sol: No solc version exists that matches the version requirement: ^0.8.22
Traceback (most recent call last):
  File "/var/www/tripwire/.venv/bin/slither", line 10, in <module>
    sys.exit(main())
             ~~~~^^
  File "/var/www/tripwire/.venv/lib/python3.13/site-packages/slither/__main__.py", line 776, in main
    main_impl(all_detector_classes=detectors, all_printer_classes=printers)
    ~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/var/www/tripwire/.venv/lib/python3.13/site-packages/slither/__main__.py", line 882, in main_impl
    ) = process_all(filename, args, detector_classes, printer_classes)
        ~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/var/www/tripwire/.venv/lib/python3.13/site-packages/slither/__main__.py", line 96, in process_all
    compilations = compile_all(target, **vars(args))
  File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/crytic_compile.py", line 722, in compile_all
    compilations.append(CryticCompile(target, **kwargs))
                        ~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^
  File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/crytic_compile.py", line 211, in __init__
    self._compile(**kwargs)
    ~~~~~~~~~~~~~^^^^^^^^^^
  File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/crytic_compile.py", line 633, in _compile
    self._platform.compile(self, **kwargs)
    ~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^
  File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/platform/foundry.py", line 102, in compile
    hardhat_like_parsing(
    ~~~~~~~~~~~~~~~~~~~~^
        crytic_compile, str(self._target), build_directory, str(self._project_root)
        ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
    )
    ^
  File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/platform/hardhat.py", line 52, in hardhat_like_parsing
    raise InvalidCompilation(txt)
crytic_compile.platform.exceptions.InvalidCompilation: Compilation failed. Can you run build command?
/tmp/slither-se6x0l57/out/build-info is not a directory.

Codex

report.consolidate
Job Status
complete
Attempts
1 / 6
Findings
0
No findings?
View stderr
OpenAI Codex v0.118.0 (research preview)
--------
workdir: /tmp/codex-x5cpmr3d
model: gpt-5.4
provider: openai
approval: never
sandbox: read-only
reasoning effort: high
reasoning summaries: none
session id: 019d5c97-4a9e-7e90-91a2-ed2a2d427dcc
--------
user
You are a security auditor. Audit this Solidity codebase for exploitable vulnerabilities.
Focus on: reentrancy, access control, upgradeability/proxy issues, signature validation, oracle manipulation,
accounting/invariant breaks, external call patterns, unchecked return values, and dangerous delegatecall.

Scope rules:
- You MUST fully read `AUDIT_BUNDLE.txt` before concluding. It contains the complete contents of all first-party Solidity sources in this workspace.
- Treat `lib/` and `@openzeppelin/` as third-party dependencies; skip them unless there is a concrete misuse angle in first-party code.
- If there are only dependency files and no first-party sources, set no_findings=true and explain in summary.

Output MUST be valid JSON matching the provided schema.
- If you find nothing meaningful: set no_findings=true and findings=[].
- Otherwise: set no_findings=false and include findings with severity/category/title and file/line locations when possible.

Output constraints (IMPORTANT):
- severity MUST be exactly one of: info, low, medium, high, critical (lowercase).
- category MUST be exactly one of: access_control, reentrancy, math, oracle, upgradeability, auth, other.
Keep summary short and concrete.
warning: Codex could not find system bubblewrap on PATH. Please install bubblewrap with your package manager. Codex will use the vendored bubblewrap in the meantime.
ERROR: You've hit your usage limit. Visit https://chatgpt.com/codex/settings/usage to purchase more credits or try again at Apr 8th, 2026 9:11 AM.
ERROR: You've hit your usage limit. Visit https://chatgpt.com/codex/settings/usage to purchase more credits or try again at Apr 8th, 2026 9:11 AM.
Metadata
{
    "codex": {
        "ran_at": "2026-04-05T07:41:53.808246+00:00",
        "returncode": 1
    },
    "project": {
        "mode": "source",
        "file_count": 13,
        "import_count": 16,
        "first_party_contracts_count": 1
    },
    "summary": null,
    "no_findings": null,
    "schema_version": 1
}

Opcode Heuristics

tool.cast_disasm
Delegatecall
2
Selfdestruct
0
CREATE2
0
CALL-family (heavy)
0
EXT*/BALANCE
2
Total opcodes
402
Flags
delegatecall_present
View cast disassembly output
00000000: PUSH1 0x80
00000002: PUSH1 0x40
00000004: MSTORE
00000005: CALLDATASIZE
00000006: PUSH2 0x0013
00000009: JUMPI
0000000a: PUSH2 0x0011
0000000d: PUSH2 0x0017
00000010: JUMP
00000011: JUMPDEST
00000012: STOP
00000013: JUMPDEST
00000014: PUSH2 0x0011
00000017: JUMPDEST
00000018: PUSH2 0x0027
0000001b: PUSH2 0x0022
0000001e: PUSH2 0x005e
00000021: JUMP
00000022: JUMPDEST
00000023: PUSH2 0x0096
00000026: JUMP
00000027: JUMPDEST
00000028: JUMP
00000029: JUMPDEST
0000002a: PUSH1 0x60
0000002c: PUSH2 0x004e
0000002f: DUP4
00000030: DUP4
00000031: PUSH1 0x40
00000033: MLOAD
00000034: DUP1
00000035: PUSH1 0x60
00000037: ADD
00000038: PUSH1 0x40
0000003a: MSTORE
0000003b: DUP1
0000003c: PUSH1 0x27
0000003e: DUP2
0000003f: MSTORE
00000040: PUSH1 0x20
00000042: ADD
00000043: PUSH2 0x024c
00000046: PUSH1 0x27
00000048: SWAP2
00000049: CODECOPY
0000004a: PUSH2 0x00ba
0000004d: JUMP
0000004e: JUMPDEST
0000004f: SWAP4
00000050: SWAP3
00000051: POP
00000052: POP
00000053: POP
00000054: JUMP
00000055: JUMPDEST
00000056: EXTCODESIZE
00000057: ISZERO
00000058: ISZERO
00000059: SWAP1
0000005a: JUMP
0000005b: JUMPDEST
0000005c: SWAP1
0000005d: JUMP
0000005e: JUMPDEST
0000005f: PUSH1 0x00
00000061: PUSH2 0x0091
00000064: PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc
00000085: SLOAD
00000086: PUSH1 0x01
00000088: PUSH1 0x01
0000008a: PUSH1 0xa0
0000008c: SHL
0000008d: SUB
0000008e: AND
0000008f: SWAP1
00000090: JUMP
00000091: JUMPDEST
00000092: SWAP1
00000093: POP
00000094: SWAP1
00000095: JUMP
00000096: JUMPDEST
00000097: CALLDATASIZE
00000098: PUSH1 0x00
0000009a: DUP1
0000009b: CALLDATACOPY
0000009c: PUSH1 0x00
0000009e: DUP1
0000009f: CALLDATASIZE
000000a0: PUSH1 0x00
000000a2: DUP5
000000a3: GAS
000000a4: DELEGATECALL
000000a5: RETURNDATASIZE
000000a6: PUSH1 0x00
000000a8: DUP1
000000a9: RETURNDATACOPY
000000aa: DUP1
000000ab: DUP1
000000ac: ISZERO
000000ad: PUSH2 0x00b5
000000b0: JUMPI
000000b1: RETURNDATASIZE
000000b2: PUSH1 0x00
000000b4: RETURN
000000b5: JUMPDEST
000000b6: RETURNDATASIZE
000000b7: PUSH1 0x00
000000b9: REVERT
000000ba: JUMPDEST
000000bb: PUSH1 0x60
000000bd: DUP4
000000be: EXTCODESIZE
000000bf: PUSH2 0x011e
000000c2: JUMPI
000000c3: PUSH1 0x40
000000c5: MLOAD
000000c6: PUSH3 0x461bcd
000000ca: PUSH1 0xe5
000000cc: SHL
000000cd: DUP2
000000ce: MSTORE
000000cf: PUSH1 0x20
000000d1: PUSH1 0x04
000000d3: DUP3
000000d4: ADD
000000d5: MSTORE
000000d6: PUSH1 0x26
000000d8: PUSH1 0x24
000000da: DUP3
000000db: ADD
000000dc: MSTORE
000000dd: PUSH32 0x416464726573733a2064656c65676174652063616c6c20746f206e6f6e2d636f
000000fe: PUSH1 0x44
00000100: DUP3
00000101: ADD
00000102: MSTORE
00000103: PUSH6 0x1b9d1c9858dd
0000010a: PUSH1 0xd2
0000010c: SHL
0000010d: PUSH1 0x64
0000010f: DUP3
00000110: ADD
00000111: MSTORE
00000112: PUSH1 0x84
00000114: ADD
00000115: JUMPDEST
00000116: PUSH1 0x40
00000118: MLOAD
00000119: DUP1
0000011a: SWAP2
0000011b: SUB
0000011c: SWAP1
0000011d: REVERT
0000011e: JUMPDEST
0000011f: PUSH1 0x00
00000121: DUP1
00000122: DUP6
00000123: PUSH1 0x01
00000125: PUSH1 0x01
00000127: PUSH1 0xa0
00000129: SHL
0000012a: SUB
0000012b: AND
0000012c: DUP6
0000012d: PUSH1 0x40
0000012f: MLOAD
00000130: PUSH2 0x0139
00000133: SWAP2
00000134: SWAP1
00000135: PUSH2 0x01fc
00000138: JUMP
00000139: JUMPDEST
0000013a: PUSH1 0x00
0000013c: PUSH1 0x40
0000013e: MLOAD
0000013f: DUP1
00000140: DUP4
00000141: SUB
00000142: DUP2
00000143: DUP6
00000144: GAS
00000145: DELEGATECALL
00000146: SWAP2
00000147: POP
00000148: POP
00000149: RETURNDATASIZE
0000014a: DUP1
0000014b: PUSH1 0x00
0000014d: DUP2
0000014e: EQ
0000014f: PUSH2 0x0174
00000152: JUMPI
00000153: PUSH1 0x40
00000155: MLOAD
00000156: SWAP2
00000157: POP
00000158: PUSH1 0x1f
0000015a: NOT
0000015b: PUSH1 0x3f
0000015d: RETURNDATASIZE
0000015e: ADD
0000015f: AND
00000160: DUP3
00000161: ADD
00000162: PUSH1 0x40
00000164: MSTORE
00000165: RETURNDATASIZE
00000166: DUP3
00000167: MSTORE
00000168: RETURNDATASIZE
00000169: PUSH1 0x00
0000016b: PUSH1 0x20
0000016d: DUP5
0000016e: ADD
0000016f: RETURNDATACOPY
00000170: PUSH2 0x0179
00000173: JUMP
00000174: JUMPDEST
00000175: PUSH1 0x60
00000177: SWAP2
00000178: POP
00000179: JUMPDEST
0000017a: POP
0000017b: SWAP2
0000017c: POP
0000017d: SWAP2
0000017e: POP
0000017f: PUSH2 0x0189
00000182: DUP3
00000183: DUP3
00000184: DUP7
00000185: PUSH2 0x0193
00000188: JUMP
00000189: JUMPDEST
0000018a: SWAP7
0000018b: SWAP6
0000018c: POP
0000018d: POP
0000018e: POP
0000018f: POP
00000190: POP
00000191: POP
00000192: JUMP
00000193: JUMPDEST
00000194: PUSH1 0x60
00000196: DUP4
00000197: ISZERO
00000198: PUSH2 0x01a2
0000019b: JUMPI
0000019c: POP
0000019d: DUP2
0000019e: PUSH2 0x004e
000001a1: JUMP
000001a2: JUMPDEST
000001a3: DUP3
000001a4: MLOAD
000001a5: ISZERO
000001a6: PUSH2 0x01b2
000001a9: JUMPI
000001aa: DUP3
000001ab: MLOAD
000001ac: DUP1
000001ad: DUP5
000001ae: PUSH1 0x20
000001b0: ADD
000001b1: REVERT
000001b2: JUMPDEST
000001b3: DUP2
000001b4: PUSH1 0x40
000001b6: MLOAD
000001b7: PUSH3 0x461bcd
000001bb: PUSH1 0xe5
000001bd: SHL
000001be: DUP2
000001bf: MSTORE
000001c0: PUSH1 0x04
000001c2: ADD
000001c3: PUSH2 0x0115
000001c6: SWAP2
000001c7: SWAP1
000001c8: PUSH2 0x0218
000001cb: JUMP
000001cc: JUMPDEST
000001cd: PUSH1 0x00
000001cf: JUMPDEST
000001d0: DUP4
000001d1: DUP2
000001d2: LT
000001d3: ISZERO
000001d4: PUSH2 0x01e7
000001d7: JUMPI
000001d8: DUP2
000001d9: DUP2
000001da: ADD
000001db: MLOAD
000001dc: DUP4
000001dd: DUP3
000001de: ADD
000001df: MSTORE
000001e0: PUSH1 0x20
000001e2: ADD
000001e3: PUSH2 0x01cf
000001e6: JUMP
000001e7: JUMPDEST
000001e8: DUP4
000001e9: DUP2
000001ea: GT
000001eb: ISZERO
000001ec: PUSH2 0x01f6
000001ef: JUMPI
000001f0: PUSH1 0x00
000001f2: DUP5
000001f3: DUP5
000001f4: ADD
000001f5: MSTORE
000001f6: JUMPDEST
000001f7: POP
000001f8: POP
000001f9: POP
000001fa: POP
000001fb: JUMP
000001fc: JUMPDEST
000001fd: PUSH1 0x00
000001ff: DUP3
00000200: MLOAD
00000201: PUSH2 0x020e
00000204: DUP2
00000205: DUP5
00000206: PUSH1 0x20
00000208: DUP8
00000209: ADD
0000020a: PUSH2 0x01cc
0000020d: JUMP
0000020e: JUMPDEST
0000020f: SWAP2
00000210: SWAP1
00000211: SWAP2
00000212: ADD
00000213: SWAP3
00000214: SWAP2
00000215: POP
00000216: POP
00000217: JUMP
00000218: JUMPDEST
00000219: PUSH1 0x20
0000021b: DUP2
0000021c: MSTORE
0000021d: PUSH1 0x00
0000021f: DUP3
00000220: MLOAD
00000221: DUP1
00000222: PUSH1 0x20
00000224: DUP5
00000225: ADD
00000226: MSTORE
00000227: PUSH2 0x0237
0000022a: DUP2
0000022b: PUSH1 0x40
0000022d: DUP6
0000022e: ADD
0000022f: PUSH1 0x20
00000231: DUP8
00000232: ADD
00000233: PUSH2 0x01cc
00000236: JUMP
00000237: JUMPDEST
00000238: PUSH1 0x1f
0000023a: ADD
0000023b: PUSH1 0x1f
0000023d: NOT
0000023e: AND
0000023f: SWAP2
00000240: SWAP1
00000241: SWAP2
00000242: ADD
00000243: PUSH1 0x40
00000245: ADD
00000246: SWAP3
00000247: SWAP2
00000248: POP
00000249: POP
0000024a: JUMP
0000024b: INVALID
0000024c: COINBASE
0000024d: PUSH5 0x6472657373
00000253: GASPRICE
00000254: KECCAK256
00000255: PUSH13 0x6f772d6c6576656c2064656c65
00000263: PUSH8 0x6174652063616c6c
0000026c: KECCAK256
0000026d: PUSH7 0x61696c6564a264
00000275: PUSH10 0x7066735822122041f64d
00000280: UNKNOWN(0x2F)
00000281: UNKNOWN(0xF9)
00000282: ADDMOD
00000283: UNKNOWN(0xC9)
00000284: SWAP9
00000285: CODECOPY
00000286: UNKNOWN(0x23)
00000287: ADD
00000288: PUSH31 0xd36c949dd92697a1f359295e2ea2f809da86127664736f6c63430008090033

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
critical upgradeability detector Untrusted DELEGATECALL target reachable 70 yes yes
view
trace_id: 0xdb4fe012af34f221af8115e697a51ee411f13834a1c9ac3d15c7b685bfbb4fa9
call_targets: 0x0bfa59f9fbe9565c240cd64311c86e90e59a4838, 0x2d6cdade756ce8eec74c2037bb88323f8d6638ea
target_varies: yes
classification: target_varies
validation_json
{
    "sink": "DELEGATECALL",
    "errors": 0,
    "status": "confirmed",
    "attempts": 1,
    "trace_id": "0xdb4fe012af34f221af8115e697a51ee411f13834a1c9ac3d15c7b685bfbb4fa9",
    "confirmed": true,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x0bfa59f9fbe9565c240cd64311c86e90e59a4838",
        "0x2d6cdade756ce8eec74c2037bb88323f8d6638ea"
    ],
    "matched_probe": null,
    "target_varies": true,
    "classification": "target_varies"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x",
            "selector": "fallback",
            "calldata_variants": [
                "0x"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 164,
            "opcode": "DELEGATECALL",
            "returndata_checked": null,
            "value_expression_category": "n/a",
            "target_expression_category": "computed"
        },
        {
            "pc": 325,
            "opcode": "DELEGATECALL",
            "returndata_checked": null,
            "value_expression_category": "n/a",
            "target_expression_category": "computed"
        }
    ],
    "guards_detected": [],
    "delegatecall_count": 2,
    "untrusted_delegatecall_count": 2
}