019b477e-d82c-73a3-801c-5ce64e43f6ff
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 29031 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 29032 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 72512 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 72513 | capability.graph | complete | 1 / 3 | 1 week ago |
| 72514 | detector.run | complete | 1 / 3 | 1 week ago |
| 72515 | validation.fork | complete | 1 / 3 | 1 week ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: CALLDATASIZE 00000001: PUSH1 0x2c 00000003: JUMPI 00000004: CALLVALUE 00000005: RETURNDATASIZE 00000006: MSTORE 00000007: PUSH32 0x9e4ac34f21c619cefc926c8bd93b54bf5a39c7ab2127a895af1cc0691d7e3dff 00000028: MSIZE 00000029: RETURNDATASIZE 0000002a: LOG1 0000002b: STOP 0000002c: JUMPDEST 0000002d: CALLDATASIZE 0000002e: RETURNDATASIZE 0000002f: RETURNDATASIZE 00000030: CALLDATACOPY 00000031: RETURNDATASIZE 00000032: RETURNDATASIZE 00000033: RETURNDATASIZE 00000034: RETURNDATASIZE 00000035: PUSH2 0x0056 00000038: DUP1 00000039: PUSH1 0x62 0000003b: CALLDATASIZE 0000003c: CODECOPY 0000003d: CALLDATASIZE 0000003e: ADD 0000003f: RETURNDATASIZE 00000040: PUSH20 0xe11eabf19a49c389d3e8735c35f8f34f28bdcb22 00000055: GAS 00000056: DELEGATECALL 00000057: RETURNDATASIZE 00000058: RETURNDATASIZE 00000059: SWAP4 0000005a: DUP1 0000005b: RETURNDATACOPY 0000005c: PUSH1 0x60 0000005e: JUMPI 0000005f: REVERT 00000060: JUMPDEST 00000061: RETURN 00000062: UNKNOWN(0xC6) 00000063: UNKNOWN(0x21) 00000064: DUP9 00000065: UNKNOWN(0xBD) 00000066: UNKNOWN(0xB2) 00000067: UNKNOWN(0x4D) 00000068: UNKNOWN(0x26) 00000069: DUP6 0000006a: UNKNOWN(0xAE) 0000006b: UNKNOWN(0xD8) 0000006c: STATICCALL 0000006d: BLOBHASH 0000006e: CLZ 0000006f: CALLER 00000070: UNKNOWN(0xEF) 00000071: UNKNOWN(0xBA) 00000072: SELFBALANCE 00000073: UNKNOWN(0xDB) 00000074: PUSH4 0xc2000000 00000079: ADD 0000007a: UNKNOWN(0xBC) 0000007b: AND 0000007c: UNKNOWN(0xD6) 0000007d: PUSH21 0xec800000c62188bdb24d2685aed8fa491e33efba47 00000093: UNKNOWN(0xDB) 00000094: PUSH4 0xc2000000 00000099: STOP 0000009a: STOP 0000009b: STOP 0000009c: STOP 0000009d: STOP 0000009e: STOP 0000009f: STOP 000000a0: STOP 000000a1: STOP 000000a2: SWAP4 000000a3: UNKNOWN(0xD3) 000000a4: UNKNOWN(0xBD) 000000a5: TLOAD 000000a6: SWAP11 000000a7: UNKNOWN(0xB9) 000000a8: UNKNOWN(0xCD) 000000a9: LOG3 000000aa: UNKNOWN(0x21) 000000ab: UNKNOWN(0xF8) 000000ac: PUSH15
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewvalidation_json{
"sink": "DELEGATECALL",
"errors": 10,
"status": "unknown",
"attempts": 11,
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": null,
"matched_probe": null,
"target_varies": null,
"classification": "no_sink"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 86,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 1,
"untrusted_delegatecall_count": 1
}
|