019b477e-d854-7150-bf8d-122805b4aacc
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 29057 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 29058 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 72564 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 72565 | capability.graph | complete | 1 / 3 | 1 week ago |
| 72566 | detector.run | complete | 1 / 3 | 1 week ago |
| 72567 | validation.fork | complete | 1 / 3 | 1 week ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: CALLDATASIZE 00000006: PUSH1 0x10 00000008: JUMPI 00000009: PUSH1 0x0e 0000000b: PUSH1 0x13 0000000d: JUMP 0000000e: JUMPDEST 0000000f: STOP 00000010: JUMPDEST 00000011: PUSH1 0x0e 00000013: JUMPDEST 00000014: PUSH1 0x1f 00000016: PUSH1 0x1b 00000018: PUSH1 0x21 0000001a: JUMP 0000001b: JUMPDEST 0000001c: PUSH1 0x57 0000001e: JUMP 0000001f: JUMPDEST 00000020: JUMP 00000021: JUMPDEST 00000022: PUSH0 00000023: PUSH1 0x52 00000025: PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc 00000046: SLOAD 00000047: PUSH1 0x01 00000049: PUSH1 0x01 0000004b: PUSH1 0xa0 0000004d: SHL 0000004e: SUB 0000004f: AND 00000050: SWAP1 00000051: JUMP 00000052: JUMPDEST 00000053: SWAP1 00000054: POP 00000055: SWAP1 00000056: JUMP 00000057: JUMPDEST 00000058: CALLDATASIZE 00000059: PUSH0 0000005a: DUP1 0000005b: CALLDATACOPY 0000005c: PUSH0 0000005d: DUP1 0000005e: CALLDATASIZE 0000005f: PUSH0 00000060: DUP5 00000061: GAS 00000062: DELEGATECALL 00000063: RETURNDATASIZE 00000064: PUSH0 00000065: DUP1 00000066: RETURNDATACOPY 00000067: DUP1 00000068: DUP1 00000069: ISZERO 0000006a: PUSH1 0x70 0000006c: JUMPI 0000006d: RETURNDATASIZE 0000006e: PUSH0 0000006f: RETURN 00000070: JUMPDEST 00000071: RETURNDATASIZE 00000072: PUSH0 00000073: REVERT 00000074: INVALID 00000075: LOG2 00000076: PUSH5 0x6970667358 0000007c: UNKNOWN(0x22) 0000007d: SLT 0000007e: KECCAK256 0000007f: PUSH25 0x94074ad92d13c6bead8982160f4e7708d5edd669b17edd1058 00000099: UNKNOWN(0x23) 0000009a: STATICCALL 0000009b: UNKNOWN(0xE8) 0000009c: CALLDATASIZE 0000009d: SWAP5 0000009e: UNKNOWN(0xDC) 0000009f: PUSH5 0x736f6c6343 000000a5: STOP 000000a6: ADDMOD 000000a7: EQ 000000a8: STOP 000000a9: CALLER
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewtrace_id: 0xf6cd6cb73d11a7e5db6400ce1a04fe33be6716675bda9beb2581ccb5cde4debc
call_targets:
0xf8b89f77a392fd55a08935928711b44c50d214b1
target_varies:
no
classification:
constant_target
validation_json{
"sink": "DELEGATECALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0xf6cd6cb73d11a7e5db6400ce1a04fe33be6716675bda9beb2581ccb5cde4debc",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0xf8b89f77a392fd55a08935928711b44c50d214b1"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 98,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 1,
"untrusted_delegatecall_count": 1
}
|