019b477e-dbc0-73fd-8796-ba2604a7c5f2
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 29685 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 29686 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 108285 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 108286 | capability.graph | complete | 1 / 3 | 1 week ago |
| 108287 | detector.run | complete | 1 / 3 | 1 week ago |
| 108288 | validation.fork | complete | 1 / 3 | 1 week ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: CALLDATASIZE 00000006: PUSH2 0x0053 00000009: JUMPI 0000000a: CALLVALUE 0000000b: ISZERO 0000000c: PUSH2 0x0051 0000000f: JUMPI 00000010: CALLER 00000011: PUSH1 0x01 00000013: PUSH1 0x01 00000015: PUSH1 0xa0 00000017: SHL 00000018: SUB 00000019: AND 0000001a: PUSH32 0xe1fffcc4923d04b559f4d29a8bfc6cda04eb5b0d3c460751c2402c5c5cc9109c 0000003b: CALLVALUE 0000003c: PUSH1 0x40 0000003e: MLOAD 0000003f: PUSH2 0x0048 00000042: SWAP2 00000043: SWAP1 00000044: PUSH2 0x014b 00000047: JUMP 00000048: JUMPDEST 00000049: PUSH1 0x40 0000004b: MLOAD 0000004c: DUP1 0000004d: SWAP2 0000004e: SUB 0000004f: SWAP1 00000050: LOG2 00000051: JUMPDEST 00000052: STOP 00000053: JUMPDEST 00000054: CALLVALUE 00000055: DUP1 00000056: ISZERO 00000057: PUSH2 0x005f 0000005a: JUMPI 0000005b: PUSH1 0x00 0000005d: DUP1 0000005e: REVERT 0000005f: JUMPDEST 00000060: POP 00000061: PUSH1 0x00 00000063: PUSH32 0x000000000000000000000000657975f60cd55b81e0c029dd0572d5e678b3a9cf 00000084: PUSH1 0x01 00000086: PUSH1 0x01 00000088: PUSH1 0xa0 0000008a: SHL 0000008b: SUB 0000008c: AND 0000008d: PUSH4 0x34c5c27e 00000092: PUSH1 0x40 00000094: MLOAD 00000095: DUP2 00000096: PUSH4 0xffffffff 0000009b: AND 0000009c: PUSH1 0xe0 0000009e: SHL 0000009f: DUP2 000000a0: MSTORE 000000a1: PUSH1 0x04 000000a3: ADD 000000a4: PUSH1 0x20 000000a6: PUSH1 0x40 000000a8: MLOAD 000000a9: DUP1 000000aa: DUP4 000000ab: SUB 000000ac: DUP2 000000ad: DUP7 000000ae: DUP1 000000af: EXTCODESIZE 000000b0: ISZERO 000000b1: DUP1 000000b2: ISZERO 000000b3: PUSH2 0x00bb 000000b6: JUMPI 000000b7: PUSH1 0x00 000000b9: DUP1 000000ba: REVERT 000000bb: JUMPDEST 000000bc: POP 000000bd: GAS 000000be: STATICCALL 000000bf: ISZERO 000000c0: DUP1 000000c1: ISZERO 000000c2: PUSH2 0x00cf 000000c5: JUMPI 000000c6: RETURNDATASIZE 000000c7: PUSH1 0x00 000000c9: DUP1 000000ca: RETURNDATACOPY 000000cb: RETURNDATASIZE 000000cc: PUSH1 0x00 000000ce: REVERT 000000cf: JUMPDEST 000000d0: POP 000000d1: POP 000000d2: POP 000000d3: POP 000000d4: PUSH1 0x40 000000d6: MLOAD 000000d7: RETURNDATASIZE 000000d8: PUSH1 0x1f 000000da: NOT 000000db: PUSH1 0x1f 000000dd: DUP3 000000de: ADD 000000df: AND 000000e0: DUP3 000000e1: ADD 000000e2: DUP1 000000e3: PUSH1 0x40 000000e5: MSTORE 000000e6: POP 000000e7: DUP2 000000e8: ADD 000000e9: SWAP1 000000ea: PUSH2 0x00f3 000000ed: SWAP2 000000ee: SWAP1 000000ef: PUSH2 0x011d 000000f2: JUMP 000000f3: JUMPDEST 000000f4: SWAP1 000000f5: POP 000000f6: PUSH1 0x40 000000f8: MLOAD 000000f9: CALLDATASIZE 000000fa: DUP1 000000fb: PUSH1 0x00 000000fd: DUP4 000000fe: CALLDATACOPY 000000ff: PUSH1 0x00 00000101: DUP1 00000102: DUP3 00000103: DUP5 00000104: DUP7 00000105: GAS 00000106: DELEGATECALL 00000107: RETURNDATASIZE 00000108: SWAP2 00000109: POP 0000010a: DUP2 0000010b: PUSH1 0x00 0000010d: DUP5 0000010e: RETURNDATACOPY 0000010f: DUP1 00000110: DUP1 00000111: ISZERO 00000112: PUSH2 0x0119 00000115: JUMPI 00000116: DUP3 00000117: DUP5 00000118: RETURN 00000119: JUMPDEST 0000011a: DUP3 0000011b: DUP5 0000011c: REVERT 0000011d: JUMPDEST 0000011e: PUSH1 0x00 00000120: PUSH1 0x20 00000122: DUP3 00000123: DUP5 00000124: SUB 00000125: SLT 00000126: ISZERO 00000127: PUSH2 0x012e 0000012a: JUMPI 0000012b: DUP1 0000012c: DUP2 0000012d: REVERT 0000012e: JUMPDEST 0000012f: DUP2 00000130: MLOAD 00000131: PUSH1 0x01 00000133: PUSH1 0x01 00000135: PUSH1 0xa0 00000137: SHL 00000138: SUB 00000139: DUP2 0000013a: AND 0000013b: DUP2 0000013c: EQ 0000013d: PUSH2 0x0144 00000140: JUMPI 00000141: DUP2 00000142: DUP3 00000143: REVERT 00000144: JUMPDEST 00000145: SWAP4 00000146: SWAP3 00000147: POP 00000148: POP 00000149: POP 0000014a: JUMP 0000014b: JUMPDEST 0000014c: SWAP1 0000014d: DUP2 0000014e: MSTORE 0000014f: PUSH1 0x20 00000151: ADD 00000152: SWAP1 00000153: JUMP 00000154: INVALID 00000155: LOG2 00000156: PUSH5 0x6970667358 0000015c: UNKNOWN(0x22) 0000015d: SLT 0000015e: KECCAK256 0000015f: STATICCALL 00000160: RETURNDATACOPY 00000161: SHR 00000162: SWAP11 00000163: BASEFEE 00000164: PUSH3 0x74819c 00000168: MSIZE 00000169: CALLDATALOAD 0000016a: UNKNOWN(0xCE) 0000016b: UNKNOWN(0x0D) 0000016c: ADDRESS 0000016d: SWAP13 0000016e: SWAP7 0000016f: CLZ 00000170: UNKNOWN(0xEC) 00000171: UNKNOWN(0x1F) 00000172: PUSH0 00000173: REVERT 00000174: PC 00000175: MCOPY 00000176: UNKNOWN(0xB6) 00000177: PUSH13 0xbd1141ed03540164736f6c6343 00000185: STOP 00000186: ADDMOD 00000187: STOP 00000188: STOP 00000189: CALLER
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewvalidation_json{
"sink": "DELEGATECALL",
"errors": 10,
"status": "unknown",
"attempts": 11,
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": null,
"matched_probe": null,
"target_varies": null,
"classification": "no_sink"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 262,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 1,
"untrusted_delegatecall_count": 1
}
|