019b477e-d96a-73bf-9c40-bf9969d6b974
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 29261 | artifact.fetch | complete | 1 / 3 | 4 months ago |
| 29262 | tool.cast_disasm | complete | 1 / 3 | 4 months ago |
| 73048 | analysis.bundle | complete | 1 / 3 | 2 weeks ago |
| 73049 | capability.graph | complete | 1 / 3 | 2 weeks ago |
| 73050 | detector.run | complete | 1 / 3 | 2 weeks ago |
| 73051 | validation.fork | complete | 1 / 3 | 2 weeks ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc 00000026: SLOAD 00000027: PUSH1 0x00 00000029: SWAP1 0000002a: DUP2 0000002b: SWAP1 0000002c: PUSH1 0x01 0000002e: PUSH1 0x01 00000030: PUSH1 0xa0 00000032: SHL 00000033: SUB 00000034: AND 00000035: CALLDATASIZE 00000036: DUP3 00000037: DUP1 00000038: CALLDATACOPY 00000039: DUP2 0000003a: CALLDATASIZE 0000003b: SWAP2 0000003c: GAS 0000003d: DELEGATECALL 0000003e: RETURNDATASIZE 0000003f: PUSH1 0x00 00000041: DUP1 00000042: RETURNDATACOPY 00000043: ISZERO 00000044: PUSH1 0x4b 00000046: JUMPI 00000047: RETURNDATASIZE 00000048: PUSH1 0x00 0000004a: RETURN 0000004b: JUMPDEST 0000004c: RETURNDATASIZE 0000004d: PUSH1 0x00 0000004f: REVERT 00000050: INVALID 00000051: LOG2 00000052: PUSH5 0x6970667358 00000058: UNKNOWN(0x22) 00000059: SLT 0000005a: KECCAK256 0000005b: UNKNOWN(0x2B) 0000005c: DUP5 0000005d: UNKNOWN(0xEA) 0000005e: SWAP11 0000005f: DUP6 00000060: UNKNOWN(0xC7) 00000061: UNKNOWN(0xBD) 00000062: UNKNOWN(0x2D) 00000063: MSTORE8 00000064: EXTCODECOPY 00000065: UNKNOWN(0xAA) 00000066: UNKNOWN(0xD3) 00000067: UNKNOWN(0x21) 00000068: MSIZE 00000069: MSTORE 0000006a: UNKNOWN(0x4E) 0000006b: UNKNOWN(0xB3) 0000006c: ORIGIN 0000006d: EXTCODEHASH 0000006e: UNKNOWN(0xAB) 0000006f: PUSH10 0x882b0afcb7f41854f935 0000007a: PUSH16
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| high | upgradeability | detector | Untrusted DELEGATECALL target reachable | 55 | no | no |
viewtrace_id: 0x53f7c650a7ce4fe3f39326616fac75a331388303cfc76f1d42ab7d49be4377e2
call_targets:
0x59fbe4cc4ca974e98300f41ac661f7204f0c3fcd
target_varies:
no
classification:
constant_target
validation_json{
"sink": "DELEGATECALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x53f7c650a7ce4fe3f39326616fac75a331388303cfc76f1d42ab7d49be4377e2",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x59fbe4cc4ca974e98300f41ac661f7204f0c3fcd"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 61,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [
{
"pc": 108,
"type": "tx_origin_used"
}
],
"delegatecall_count": 1,
"untrusted_delegatecall_count": 1
}
|
| high | auth | detector | Authorization based on tx.origin | 70 | no | — |
viewvalidation_json{
"reason": "missing sink mapping",
"status": "no_sink"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"guards_detected": [
{
"pc": 108,
"type": "tx_origin_used"
}
]
}
|