019b477e-d3d3-72d3-a26f-71cc6d92e27e
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 28223 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 28224 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 71143 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 71144 | capability.graph | complete | 1 / 3 | 1 week ago |
| 71145 | detector.run | complete | 1 / 3 | 1 week ago |
| 71146 | validation.fork | complete | 1 / 3 | 1 week ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: PUSH1 0x04 00000007: CALLDATASIZE 00000008: LT 00000009: ISZERO 0000000a: PUSH1 0x49 0000000c: JUMPI 0000000d: JUMPDEST 0000000e: PUSH0 0000000f: CALLDATASIZE 00000010: DUP2 00000011: DUP1 00000012: CALLDATACOPY 00000013: DUP1 00000014: DUP1 00000015: CALLDATASIZE 00000016: DUP2 00000017: PUSH32 0x000000000000000000000000b676cfeeed5c7b739452a502f1eff9ab684a56da 00000038: GAS 00000039: DELEGATECALL 0000003a: RETURNDATASIZE 0000003b: DUP3 0000003c: DUP1 0000003d: RETURNDATACOPY 0000003e: ISZERO 0000003f: PUSH1 0x45 00000041: JUMPI 00000042: RETURNDATASIZE 00000043: SWAP1 00000044: RETURN 00000045: JUMPDEST 00000046: RETURNDATASIZE 00000047: SWAP1 00000048: REVERT 00000049: JUMPDEST 0000004a: PUSH0 0000004b: DUP1 0000004c: CALLDATALOAD 0000004d: PUSH1 0xe0 0000004f: SHR 00000050: PUSH4 0x56973ee5 00000055: EQ 00000056: PUSH1 0x5d 00000058: JUMPI 00000059: POP 0000005a: PUSH1 0x0d 0000005c: JUMP 0000005d: JUMPDEST 0000005e: CALLVALUE 0000005f: PUSH1 0x9f 00000061: JUMPI 00000062: DUP1 00000063: PUSH1 0x03 00000065: NOT 00000066: CALLDATASIZE 00000067: ADD 00000068: SLT 00000069: PUSH1 0x9f 0000006b: JUMPI 0000006c: PUSH32 0x000000000000000000000000b676cfeeed5c7b739452a502f1eff9ab684a56da 0000008d: PUSH1 0x01 0000008f: PUSH1 0x01 00000091: PUSH1 0xa0 00000093: SHL 00000094: SUB 00000095: AND 00000096: PUSH1 0x80 00000098: SWAP1 00000099: DUP2 0000009a: MSTORE 0000009b: PUSH1 0x20 0000009d: SWAP1 0000009e: RETURN 0000009f: JUMPDEST 000000a0: DUP1 000000a1: REVERT 000000a2: INVALID 000000a3: LOG2 000000a4: PUSH5 0x6970667358 000000aa: UNKNOWN(0x22) 000000ab: SLT 000000ac: KECCAK256 000000ad: MCOPY 000000ae: LOG0 000000af: SWAP12 000000b0: UNKNOWN(0xD3) 000000b1: LOG4 000000b2: UNKNOWN(0xE8) 000000b3: PUSH1 0xc2 000000b5: UNKNOWN(0x4F) 000000b6: UNKNOWN(0xC3) 000000b7: UNKNOWN(0xB9) 000000b8: PUSH23 0xd42dd00080f7d4f22863c3c0627037a80672527564736f 000000d0: PUSH13
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewtrace_id: 0x20108087dcad0b213c953a404a64dde52727cf65e16ea6ec541d4d09b6f95c09
validation_json{
"sink": "DELEGATECALL",
"errors": 0,
"status": "unknown",
"attempts": 12,
"trace_id": "0x20108087dcad0b213c953a404a64dde52727cf65e16ea6ec541d4d09b6f95c09",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": null,
"matched_probe": null,
"target_varies": null,
"classification": "no_sink"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x56973ee5",
"selector": "0x56973ee5",
"calldata_variants": [
"0x56973ee5",
"0x56973ee50000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 57,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 1,
"untrusted_delegatecall_count": 1
}
|