019b477e-da1d-7074-9fae-c845355701b4
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 29417 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 29418 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 108173 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 108174 | capability.graph | complete | 1 / 3 | 1 week ago |
| 108175 | detector.run | complete | 1 / 3 | 1 week ago |
| 108176 | validation.fork | complete | 1 / 3 | 1 week ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 0000001a: PUSH1 0x00 0000001c: SLOAD 0000001d: AND 0000001e: PUSH32 0xa619486e00000000000000000000000000000000000000000000000000000000 0000003f: PUSH1 0x00 00000041: CALLDATALOAD 00000042: SUB 00000043: PUSH1 0x4f 00000045: JUMPI 00000046: DUP1 00000047: PUSH1 0x00 00000049: MSTORE 0000004a: PUSH1 0x20 0000004c: PUSH1 0x00 0000004e: RETURN 0000004f: JUMPDEST 00000050: CALLDATASIZE 00000051: PUSH1 0x00 00000053: DUP1 00000054: CALLDATACOPY 00000055: PUSH1 0x00 00000057: DUP1 00000058: CALLDATASIZE 00000059: PUSH1 0x00 0000005b: DUP5 0000005c: GAS 0000005d: DELEGATECALL 0000005e: RETURNDATASIZE 0000005f: PUSH1 0x00 00000061: DUP1 00000062: RETURNDATACOPY 00000063: PUSH1 0x00 00000065: DUP2 00000066: SUB 00000067: PUSH1 0x6e 00000069: JUMPI 0000006a: RETURNDATASIZE 0000006b: PUSH1 0x00 0000006d: REVERT 0000006e: JUMPDEST 0000006f: RETURNDATASIZE 00000070: PUSH1 0x00 00000072: RETURN 00000073: INVALID 00000074: LOG2 00000075: PUSH5 0x6970667358 0000007b: UNKNOWN(0x22) 0000007c: SLT 0000007d: KECCAK256 0000007e: UNKNOWN(0xE3) 0000007f: UNKNOWN(0xDC) 00000080: UNKNOWN(0xCE) 00000081: UNKNOWN(0x0C) 00000082: SWAP7 00000083: PUSH18 0x08a4f32bfc0ed20c923c1f2849ec587295bc 00000096: UNKNOWN(0xCF) 00000097: UNKNOWN(0x27) 00000098: DUP3 00000099: UNKNOWN(0xDA) 0000009a: UNKNOWN(0xD8) 0000009b: UNKNOWN(0xFB) 0000009c: SWAP14 0000009d: UNKNOWN(0xC9) 0000009e: PUSH5 0x736f6c6343 000000a4: STOP 000000a5: ADDMOD 000000a6: GT 000000a7: STOP 000000a8: CALLER
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewtrace_id: 0x39cb4788e211e198e1315591dda27eb228899de0f8d115f240d50f76c5718c0f
call_targets:
0x3f99439d9e9bbc961cf3a25ed53309c8c42e14da
target_varies:
no
classification:
constant_target
validation_json{
"sink": "DELEGATECALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x39cb4788e211e198e1315591dda27eb228899de0f8d115f240d50f76c5718c0f",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x3f99439d9e9bbc961cf3a25ed53309c8c42e14da"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 93,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 1,
"untrusted_delegatecall_count": 1
}
|