019b477e-d91d-7214-83bb-f5f38e925078
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 29197 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 29198 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 72924 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 72925 | capability.graph | complete | 1 / 3 | 1 week ago |
| 72926 | detector.run | complete | 1 / 3 | 1 week ago |
| 72927 | validation.fork | complete | 1 / 3 | 1 week ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: CALLDATASIZE 00000006: PUSH1 0x10 00000008: JUMPI 00000009: PUSH1 0x0e 0000000b: PUSH1 0x13 0000000d: JUMP 0000000e: JUMPDEST 0000000f: STOP 00000010: JUMPDEST 00000011: PUSH1 0x0e 00000013: JUMPDEST 00000014: PUSH1 0x1f 00000016: PUSH1 0x1b 00000018: PUSH1 0x21 0000001a: JUMP 0000001b: JUMPDEST 0000001c: PUSH1 0x65 0000001e: JUMP 0000001f: JUMPDEST 00000020: JUMP 00000021: JUMPDEST 00000022: PUSH1 0x00 00000024: PUSH1 0x60 00000026: PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc 00000047: SLOAD 00000048: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 0000005d: AND 0000005e: SWAP1 0000005f: JUMP 00000060: JUMPDEST 00000061: SWAP1 00000062: POP 00000063: SWAP1 00000064: JUMP 00000065: JUMPDEST 00000066: CALLDATASIZE 00000067: PUSH1 0x00 00000069: DUP1 0000006a: CALLDATACOPY 0000006b: PUSH1 0x00 0000006d: DUP1 0000006e: CALLDATASIZE 0000006f: PUSH1 0x00 00000071: DUP5 00000072: GAS 00000073: DELEGATECALL 00000074: RETURNDATASIZE 00000075: PUSH1 0x00 00000077: DUP1 00000078: RETURNDATACOPY 00000079: DUP1 0000007a: DUP1 0000007b: ISZERO 0000007c: PUSH1 0x83 0000007e: JUMPI 0000007f: RETURNDATASIZE 00000080: PUSH1 0x00 00000082: RETURN 00000083: JUMPDEST 00000084: RETURNDATASIZE 00000085: PUSH1 0x00 00000087: REVERT 00000088: INVALID 00000089: LOG2 0000008a: PUSH5 0x6970667358 00000090: UNKNOWN(0x22) 00000091: SLT 00000092: KECCAK256 00000093: PUSH13 0x5927fc1385c34883f2af965e6f 000000a1: SAR 000000a2: UNKNOWN(0xAE) 000000a3: SWAP14 000000a4: UNKNOWN(0xB3) 000000a5: UNKNOWN(0xC4) 000000a6: PUSH0 000000a7: PUSH1 0x38 000000a9: UNKNOWN(0xED) 000000aa: UNKNOWN(0xCC) 000000ab: UNKNOWN(0xB8) 000000ac: STOP 000000ad: SSTORE 000000ae: UNKNOWN(0xD3) 000000af: UNKNOWN(0xEF) 000000b0: UNKNOWN(0xCE) 000000b1: ADDRESS 000000b2: DELEGATECALL 000000b3: PUSH5 0x736f6c6343 000000b9: STOP 000000ba: ADDMOD 000000bb: XOR 000000bc: STOP 000000bd: CALLER
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewtrace_id: 0xc5bd7326d6a99d783e13cdba7e494ef5609c39617b41da62a8fef6a77c4c5c65
call_targets:
0x408de8d339f40086c5643ee4778e0f872ab5e423
target_varies:
no
classification:
constant_target
validation_json{
"sink": "DELEGATECALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0xc5bd7326d6a99d783e13cdba7e494ef5609c39617b41da62a8fef6a77c4c5c65",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x408de8d339f40086c5643ee4778e0f872ab5e423"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 115,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
},
{
"pc": 178,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 2,
"untrusted_delegatecall_count": 2
}
|