019b477e-db43-7144-bc22-f1a37c7ac110
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 29607 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 29608 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 108405 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 108406 | capability.graph | complete | 1 / 3 | 1 week ago |
| 108407 | detector.run | complete | 1 / 3 | 1 week ago |
| 108408 | validation.fork | complete | 1 / 3 | 1 week ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: PUSH1 0x0a 00000007: PUSH1 0x0c 00000009: JUMP 0000000a: JUMPDEST 0000000b: STOP 0000000c: JUMPDEST 0000000d: PUSH1 0x18 0000000f: PUSH1 0x14 00000011: PUSH1 0x1a 00000013: JUMP 00000014: JUMPDEST 00000015: PUSH1 0x5e 00000017: JUMP 00000018: JUMPDEST 00000019: JUMP 0000001a: JUMPDEST 0000001b: PUSH1 0x00 0000001d: PUSH1 0x59 0000001f: PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc 00000040: SLOAD 00000041: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000056: AND 00000057: SWAP1 00000058: JUMP 00000059: JUMPDEST 0000005a: SWAP1 0000005b: POP 0000005c: SWAP1 0000005d: JUMP 0000005e: JUMPDEST 0000005f: CALLDATASIZE 00000060: PUSH1 0x00 00000062: DUP1 00000063: CALLDATACOPY 00000064: PUSH1 0x00 00000066: DUP1 00000067: CALLDATASIZE 00000068: PUSH1 0x00 0000006a: DUP5 0000006b: GAS 0000006c: DELEGATECALL 0000006d: RETURNDATASIZE 0000006e: PUSH1 0x00 00000070: DUP1 00000071: RETURNDATACOPY 00000072: DUP1 00000073: DUP1 00000074: ISZERO 00000075: PUSH1 0x7c 00000077: JUMPI 00000078: RETURNDATASIZE 00000079: PUSH1 0x00 0000007b: RETURN 0000007c: JUMPDEST 0000007d: RETURNDATASIZE 0000007e: PUSH1 0x00 00000080: REVERT 00000081: INVALID 00000082: LOG2 00000083: PUSH5 0x6970667358 00000089: UNKNOWN(0x22) 0000008a: SLT 0000008b: KECCAK256 0000008c: BLOBBASEFEE 0000008d: EXTCODESIZE 0000008e: UNKNOWN(0x0C) 0000008f: UNKNOWN(0xE8) 00000090: UNKNOWN(0x4C) 00000091: SLOAD 00000092: UNKNOWN(0x4C) 00000093: UNKNOWN(0x25) 00000094: SUB 00000095: UNKNOWN(0x2E) 00000096: DUP13 00000097: UNKNOWN(0x29) 00000098: UNKNOWN(0xC3) 00000099: PUSH0 0000009a: CLZ 0000009b: MULMOD 0000009c: UNKNOWN(0xAD) 0000009d: EXTCODEHASH 0000009e: UNKNOWN(0xDC) 0000009f: UNKNOWN(0xC3) 000000a0: UNKNOWN(0xD6) 000000a1: UNKNOWN(0xAA) 000000a2: UNKNOWN(0xDF) 000000a3: CALLDATASIZE 000000a4: UNKNOWN(0xB4) 000000a5: UNKNOWN(0x4D) 000000a6: CALLDATALOAD 000000a7: UNKNOWN(0xF6) 000000a8: UNKNOWN(0xE9) 000000a9: GASLIMIT 000000aa: SUB 000000ab: UNKNOWN(0x0E) 000000ac: PUSH5 0x736f6c6343 000000b2: STOP 000000b3: ADDMOD 000000b4: SHL 000000b5: STOP 000000b6: CALLER
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewtrace_id: 0x364759f2d5cc12bd4e7d409f508ff095588e9bd286d6dbae5315a59c90cfe828
call_targets:
0x75bd654fb213e9d8a9c2a0652bb95d777cddef2f
target_varies:
no
classification:
constant_target
validation_json{
"sink": "DELEGATECALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x364759f2d5cc12bd4e7d409f508ff095588e9bd286d6dbae5315a59c90cfe828",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x75bd654fb213e9d8a9c2a0652bb95d777cddef2f"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 108,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 1,
"untrusted_delegatecall_count": 1
}
|