019b477e-db3c-7188-8e7e-547962ad7a31
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 29603 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 29604 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 108413 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 108414 | capability.graph | complete | 1 / 3 | 1 week ago |
| 108415 | detector.run | complete | 1 / 3 | 1 week ago |
| 108416 | validation.fork | complete | 1 / 3 | 1 week ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: PUSH1 0x0a 00000007: PUSH1 0x0c 00000009: JUMP 0000000a: JUMPDEST 0000000b: STOP 0000000c: JUMPDEST 0000000d: PUSH1 0x18 0000000f: PUSH1 0x14 00000011: PUSH1 0x1a 00000013: JUMP 00000014: JUMPDEST 00000015: PUSH1 0x51 00000017: JUMP 00000018: JUMPDEST 00000019: JUMP 0000001a: JUMPDEST 0000001b: PUSH1 0x00 0000001d: PUSH1 0x4c 0000001f: PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc 00000040: SLOAD 00000041: PUSH1 0x01 00000043: PUSH1 0x01 00000045: PUSH1 0xa0 00000047: SHL 00000048: SUB 00000049: AND 0000004a: SWAP1 0000004b: JUMP 0000004c: JUMPDEST 0000004d: SWAP1 0000004e: POP 0000004f: SWAP1 00000050: JUMP 00000051: JUMPDEST 00000052: CALLDATASIZE 00000053: PUSH1 0x00 00000055: DUP1 00000056: CALLDATACOPY 00000057: PUSH1 0x00 00000059: DUP1 0000005a: CALLDATASIZE 0000005b: PUSH1 0x00 0000005d: DUP5 0000005e: GAS 0000005f: DELEGATECALL 00000060: RETURNDATASIZE 00000061: PUSH1 0x00 00000063: DUP1 00000064: RETURNDATACOPY 00000065: DUP1 00000066: DUP1 00000067: ISZERO 00000068: PUSH1 0x6f 0000006a: JUMPI 0000006b: RETURNDATASIZE 0000006c: PUSH1 0x00 0000006e: RETURN 0000006f: JUMPDEST 00000070: RETURNDATASIZE 00000071: PUSH1 0x00 00000073: REVERT 00000074: INVALID 00000075: LOG2 00000076: PUSH5 0x6970667358 0000007c: UNKNOWN(0x22) 0000007d: SLT 0000007e: KECCAK256 0000007f: MLOAD 00000080: UNKNOWN(0xDA) 00000081: JUMPDEST 00000082: MLOAD 00000083: CALLCODE 00000084: UNKNOWN(0xE4) 00000085: EXTCODECOPY 00000086: UNKNOWN(0xD9) 00000087: JUMP 00000088: UNKNOWN(0xE2) 00000089: UNKNOWN(0xB3) 0000008a: UNKNOWN(0xE1) 0000008b: DUP14 0000008c: ADDRESS 0000008d: UNKNOWN(0x26) 0000008e: TIMESTAMP 0000008f: UNKNOWN(0xBB) 00000090: CALLDATACOPY 00000091: BYTE 00000092: PUSH19 0xf196cc4a9776ab84ef5e725a64736f6c634300 000000a6: ADDMOD 000000a7: SAR 000000a8: STOP 000000a9: CALLER
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewtrace_id: 0x58d98da8b1e13cf8d21919c09ed8f2ca075e41116f4dc157bb71dc803d782270
call_targets:
0x0aafdb87208ac29409292583c52c73ff6b8426f1
target_varies:
no
classification:
constant_target
validation_json{
"sink": "DELEGATECALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x58d98da8b1e13cf8d21919c09ed8f2ca075e41116f4dc157bb71dc803d782270",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x0aafdb87208ac29409292583c52c73ff6b8426f1"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 95,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 1,
"untrusted_delegatecall_count": 1
}
|
| high | other | detector | Untrusted CALL target/value reachable | 60 | no | no |
viewtrace_id: 0x58d98da8b1e13cf8d21919c09ed8f2ca075e41116f4dc157bb71dc803d782270
call_targets:
0x63253e3352c0cae9f6ee64e61ed461ae23f9c8b6
target_varies:
no
classification:
constant_target
validation_json{
"sink": "CALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x58d98da8b1e13cf8d21919c09ed8f2ca075e41116f4dc157bb71dc803d782270",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x63253e3352c0cae9f6ee64e61ed461ae23f9c8b6"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 131,
"opcode": "CALLCODE",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"call_count": 1,
"guards_detected": [],
"untrusted_call_count": 1
}
|
| high | other | detector | ETH value transfer possible | 55 | no | no |
viewtrace_id: 0x58d98da8b1e13cf8d21919c09ed8f2ca075e41116f4dc157bb71dc803d782270
call_targets:
0x63253e3352c0cae9f6ee64e61ed461ae23f9c8b6
target_varies:
no
classification:
constant_target
validation_json{
"sink": "CALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x58d98da8b1e13cf8d21919c09ed8f2ca075e41116f4dc157bb71dc803d782270",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x63253e3352c0cae9f6ee64e61ed461ae23f9c8b6"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 131,
"opcode": "CALLCODE",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"eth_value_calls": 1,
"guards_detected": []
}
|