TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

019b477e-dc3d-702c-aa70-85c6dfdf6e3b

complete
Chain ID
1
Address
Block Number
Created
Mon, Dec 22, 2025 7:17 PM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
0
Validated
0
Source
Bytecode only
Review Backing
Not yet
Best current signal
Untrusted CALL target/value reachable
crit 0 high 0 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
29763 artifact.fetch complete 1 / 3 4 months ago
29764 tool.cast_disasm complete 1 / 3 4 months ago
72648 analysis.bundle complete 1 / 3 3 weeks ago
72649 capability.graph complete 1 / 3 3 weeks ago
72650 detector.run complete 1 / 3 3 weeks ago
72651 validation.fork complete 1 / 3 3 weeks ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no
Implementation:
Verified Source: no

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate

No codex job recorded yet.

Opcode Heuristics

tool.cast_disasm
Delegatecall
0
Selfdestruct
0
CREATE2
0
CALL-family (heavy)
1
EXT*/BALANCE
0
Total opcodes
582
Flags
No heuristic flags raised.
View cast disassembly output
00000000: PUSH1 0x80
00000002: PUSH1 0x40
00000004: MSTORE
00000005: PUSH1 0x04
00000007: CALLDATASIZE
00000008: LT
00000009: PUSH2 0x0037
0000000c: JUMPI
0000000d: PUSH0
0000000e: CALLDATALOAD
0000000f: PUSH1 0xe0
00000011: SHR
00000012: DUP1
00000013: PUSH4 0x566690ec
00000018: EQ
00000019: PUSH2 0x0040
0000001c: JUMPI
0000001d: DUP1
0000001e: PUSH4 0x8da5cb5b
00000023: EQ
00000024: PUSH2 0x0068
00000027: JUMPI
00000028: DUP1
00000029: PUSH4 0xebe29d74
0000002e: EQ
0000002f: PUSH2 0x0092
00000032: JUMPI
00000033: PUSH2 0x003e
00000036: JUMP
00000037: JUMPDEST
00000038: CALLDATASIZE
00000039: PUSH2 0x003e
0000003c: JUMPI
0000003d: STOP
0000003e: JUMPDEST
0000003f: STOP
00000040: JUMPDEST
00000041: CALLVALUE
00000042: DUP1
00000043: ISZERO
00000044: PUSH2 0x004b
00000047: JUMPI
00000048: PUSH0
00000049: DUP1
0000004a: REVERT
0000004b: JUMPDEST
0000004c: POP
0000004d: PUSH2 0x0066
00000050: PUSH1 0x04
00000052: DUP1
00000053: CALLDATASIZE
00000054: SUB
00000055: DUP2
00000056: ADD
00000057: SWAP1
00000058: PUSH2 0x0061
0000005b: SWAP2
0000005c: SWAP1
0000005d: PUSH2 0x0241
00000060: JUMP
00000061: JUMPDEST
00000062: PUSH2 0x00bc
00000065: JUMP
00000066: JUMPDEST
00000067: STOP
00000068: JUMPDEST
00000069: CALLVALUE
0000006a: DUP1
0000006b: ISZERO
0000006c: PUSH2 0x0073
0000006f: JUMPI
00000070: PUSH0
00000071: DUP1
00000072: REVERT
00000073: JUMPDEST
00000074: POP
00000075: PUSH2 0x007c
00000078: PUSH2 0x01ba
0000007b: JUMP
0000007c: JUMPDEST
0000007d: PUSH1 0x40
0000007f: MLOAD
00000080: PUSH2 0x0089
00000083: SWAP2
00000084: SWAP1
00000085: PUSH2 0x028c
00000088: JUMP
00000089: JUMPDEST
0000008a: PUSH1 0x40
0000008c: MLOAD
0000008d: DUP1
0000008e: SWAP2
0000008f: SUB
00000090: SWAP1
00000091: RETURN
00000092: JUMPDEST
00000093: CALLVALUE
00000094: DUP1
00000095: ISZERO
00000096: PUSH2 0x009d
00000099: JUMPI
0000009a: PUSH0
0000009b: DUP1
0000009c: REVERT
0000009d: JUMPDEST
0000009e: POP
0000009f: PUSH2 0x00a6
000000a2: PUSH2 0x01dd
000000a5: JUMP
000000a6: JUMPDEST
000000a7: PUSH1 0x40
000000a9: MLOAD
000000aa: PUSH2 0x00b3
000000ad: SWAP2
000000ae: SWAP1
000000af: PUSH2 0x02bd
000000b2: JUMP
000000b3: JUMPDEST
000000b4: PUSH1 0x40
000000b6: MLOAD
000000b7: DUP1
000000b8: SWAP2
000000b9: SUB
000000ba: SWAP1
000000bb: RETURN
000000bc: JUMPDEST
000000bd: PUSH0
000000be: DUP1
000000bf: SLOAD
000000c0: SWAP1
000000c1: PUSH2 0x0100
000000c4: EXP
000000c5: SWAP1
000000c6: DIV
000000c7: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000000dc: AND
000000dd: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000000f2: AND
000000f3: CALLER
000000f4: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000109: AND
0000010a: EQ
0000010b: PUSH2 0x0112
0000010e: JUMPI
0000010f: PUSH0
00000110: DUP1
00000111: REVERT
00000112: JUMPDEST
00000113: PUSH3 0x093a80
00000117: PUSH1 0x01
00000119: SLOAD
0000011a: TIMESTAMP
0000011b: PUSH2 0x0124
0000011e: SWAP2
0000011f: SWAP1
00000120: PUSH2 0x0303
00000123: JUMP
00000124: JUMPDEST
00000125: GT
00000126: PUSH2 0x0164
00000129: JUMPI
0000012a: PUSH1 0x40
0000012c: MLOAD
0000012d: PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
0000014e: DUP2
0000014f: MSTORE
00000150: PUSH1 0x04
00000152: ADD
00000153: PUSH2 0x015b
00000156: SWAP1
00000157: PUSH2 0x0390
0000015a: JUMP
0000015b: JUMPDEST
0000015c: PUSH1 0x40
0000015e: MLOAD
0000015f: DUP1
00000160: SWAP2
00000161: SUB
00000162: SWAP1
00000163: REVERT
00000164: JUMPDEST
00000165: TIMESTAMP
00000166: PUSH1 0x01
00000168: DUP2
00000169: SWAP1
0000016a: SSTORE
0000016b: POP
0000016c: DUP1
0000016d: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000182: AND
00000183: PUSH2 0x08fc
00000186: PUSH8 0x02c68af0bb140000
0000018f: SWAP1
00000190: DUP2
00000191: ISZERO
00000192: MUL
00000193: SWAP1
00000194: PUSH1 0x40
00000196: MLOAD
00000197: PUSH0
00000198: PUSH1 0x40
0000019a: MLOAD
0000019b: DUP1
0000019c: DUP4
0000019d: SUB
0000019e: DUP2
0000019f: DUP6
000001a0: DUP9
000001a1: DUP9
000001a2: CALL
000001a3: SWAP4
000001a4: POP
000001a5: POP
000001a6: POP
000001a7: POP
000001a8: ISZERO
000001a9: DUP1
000001aa: ISZERO
000001ab: PUSH2 0x01b6
000001ae: JUMPI
000001af: RETURNDATASIZE
000001b0: PUSH0
000001b1: DUP1
000001b2: RETURNDATACOPY
000001b3: RETURNDATASIZE
000001b4: PUSH0
000001b5: REVERT
000001b6: JUMPDEST
000001b7: POP
000001b8: POP
000001b9: JUMP
000001ba: JUMPDEST
000001bb: PUSH0
000001bc: DUP1
000001bd: SLOAD
000001be: SWAP1
000001bf: PUSH2 0x0100
000001c2: EXP
000001c3: SWAP1
000001c4: DIV
000001c5: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000001da: AND
000001db: DUP2
000001dc: JUMP
000001dd: JUMPDEST
000001de: PUSH1 0x01
000001e0: SLOAD
000001e1: DUP2
000001e2: JUMP
000001e3: JUMPDEST
000001e4: PUSH0
000001e5: DUP1
000001e6: REVERT
000001e7: JUMPDEST
000001e8: PUSH0
000001e9: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000001fe: DUP3
000001ff: AND
00000200: SWAP1
00000201: POP
00000202: SWAP2
00000203: SWAP1
00000204: POP
00000205: JUMP
00000206: JUMPDEST
00000207: PUSH0
00000208: PUSH2 0x0210
0000020b: DUP3
0000020c: PUSH2 0x01e7
0000020f: JUMP
00000210: JUMPDEST
00000211: SWAP1
00000212: POP
00000213: SWAP2
00000214: SWAP1
00000215: POP
00000216: JUMP
00000217: JUMPDEST
00000218: PUSH2 0x0220
0000021b: DUP2
0000021c: PUSH2 0x0206
0000021f: JUMP
00000220: JUMPDEST
00000221: DUP2
00000222: EQ
00000223: PUSH2 0x022a
00000226: JUMPI
00000227: PUSH0
00000228: DUP1
00000229: REVERT
0000022a: JUMPDEST
0000022b: POP
0000022c: JUMP
0000022d: JUMPDEST
0000022e: PUSH0
0000022f: DUP2
00000230: CALLDATALOAD
00000231: SWAP1
00000232: POP
00000233: PUSH2 0x023b
00000236: DUP2
00000237: PUSH2 0x0217
0000023a: JUMP
0000023b: JUMPDEST
0000023c: SWAP3
0000023d: SWAP2
0000023e: POP
0000023f: POP
00000240: JUMP
00000241: JUMPDEST
00000242: PUSH0
00000243: PUSH1 0x20
00000245: DUP3
00000246: DUP5
00000247: SUB
00000248: SLT
00000249: ISZERO
0000024a: PUSH2 0x0256
0000024d: JUMPI
0000024e: PUSH2 0x0255
00000251: PUSH2 0x01e3
00000254: JUMP
00000255: JUMPDEST
00000256: JUMPDEST
00000257: PUSH0
00000258: PUSH2 0x0263
0000025b: DUP5
0000025c: DUP3
0000025d: DUP6
0000025e: ADD
0000025f: PUSH2 0x022d
00000262: JUMP
00000263: JUMPDEST
00000264: SWAP2
00000265: POP
00000266: POP
00000267: SWAP3
00000268: SWAP2
00000269: POP
0000026a: POP
0000026b: JUMP
0000026c: JUMPDEST
0000026d: PUSH0
0000026e: PUSH2 0x0276
00000271: DUP3
00000272: PUSH2 0x01e7
00000275: JUMP
00000276: JUMPDEST
00000277: SWAP1
00000278: POP
00000279: SWAP2
0000027a: SWAP1
0000027b: POP
0000027c: JUMP
0000027d: JUMPDEST
0000027e: PUSH2 0x0286
00000281: DUP2
00000282: PUSH2 0x026c
00000285: JUMP
00000286: JUMPDEST
00000287: DUP3
00000288: MSTORE
00000289: POP
0000028a: POP
0000028b: JUMP
0000028c: JUMPDEST
0000028d: PUSH0
0000028e: PUSH1 0x20
00000290: DUP3
00000291: ADD
00000292: SWAP1
00000293: POP
00000294: PUSH2 0x029f
00000297: PUSH0
00000298: DUP4
00000299: ADD
0000029a: DUP5
0000029b: PUSH2 0x027d
0000029e: JUMP
0000029f: JUMPDEST
000002a0: SWAP3
000002a1: SWAP2
000002a2: POP
000002a3: POP
000002a4: JUMP
000002a5: JUMPDEST
000002a6: PUSH0
000002a7: DUP2
000002a8: SWAP1
000002a9: POP
000002aa: SWAP2
000002ab: SWAP1
000002ac: POP
000002ad: JUMP
000002ae: JUMPDEST
000002af: PUSH2 0x02b7
000002b2: DUP2
000002b3: PUSH2 0x02a5
000002b6: JUMP
000002b7: JUMPDEST
000002b8: DUP3
000002b9: MSTORE
000002ba: POP
000002bb: POP
000002bc: JUMP
000002bd: JUMPDEST
000002be: PUSH0
000002bf: PUSH1 0x20
000002c1: DUP3
000002c2: ADD
000002c3: SWAP1
000002c4: POP
000002c5: PUSH2 0x02d0
000002c8: PUSH0
000002c9: DUP4
000002ca: ADD
000002cb: DUP5
000002cc: PUSH2 0x02ae
000002cf: JUMP
000002d0: JUMPDEST
000002d1: SWAP3
000002d2: SWAP2
000002d3: POP
000002d4: POP
000002d5: JUMP
000002d6: JUMPDEST
000002d7: PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
000002f8: PUSH0
000002f9: MSTORE
000002fa: PUSH1 0x11
000002fc: PUSH1 0x04
000002fe: MSTORE
000002ff: PUSH1 0x24
00000301: PUSH0
00000302: REVERT
00000303: JUMPDEST
00000304: PUSH0
00000305: PUSH2 0x030d
00000308: DUP3
00000309: PUSH2 0x02a5
0000030c: JUMP
0000030d: JUMPDEST
0000030e: SWAP2
0000030f: POP
00000310: PUSH2 0x0318
00000313: DUP4
00000314: PUSH2 0x02a5
00000317: JUMP
00000318: JUMPDEST
00000319: SWAP3
0000031a: POP
0000031b: DUP3
0000031c: DUP3
0000031d: SUB
0000031e: SWAP1
0000031f: POP
00000320: DUP2
00000321: DUP2
00000322: GT
00000323: ISZERO
00000324: PUSH2 0x0330
00000327: JUMPI
00000328: PUSH2 0x032f
0000032b: PUSH2 0x02d6
0000032e: JUMP
0000032f: JUMPDEST
00000330: JUMPDEST
00000331: SWAP3
00000332: SWAP2
00000333: POP
00000334: POP
00000335: JUMP
00000336: JUMPDEST
00000337: PUSH0
00000338: DUP3
00000339: DUP3
0000033a: MSTORE
0000033b: PUSH1 0x20
0000033d: DUP3
0000033e: ADD
0000033f: SWAP1
00000340: POP
00000341: SWAP3
00000342: SWAP2
00000343: POP
00000344: POP
00000345: JUMP
00000346: JUMPDEST
00000347: PUSH32 0x3764617973000000000000000000000000000000000000000000000000000000
00000368: PUSH0
00000369: DUP3
0000036a: ADD
0000036b: MSTORE
0000036c: POP
0000036d: JUMP
0000036e: JUMPDEST
0000036f: PUSH0
00000370: PUSH2 0x037a
00000373: PUSH1 0x05
00000375: DUP4
00000376: PUSH2 0x0336
00000379: JUMP
0000037a: JUMPDEST
0000037b: SWAP2
0000037c: POP
0000037d: PUSH2 0x0385
00000380: DUP3
00000381: PUSH2 0x0346
00000384: JUMP
00000385: JUMPDEST
00000386: PUSH1 0x20
00000388: DUP3
00000389: ADD
0000038a: SWAP1
0000038b: POP
0000038c: SWAP2
0000038d: SWAP1
0000038e: POP
0000038f: JUMP
00000390: JUMPDEST
00000391: PUSH0
00000392: PUSH1 0x20
00000394: DUP3
00000395: ADD
00000396: SWAP1
00000397: POP
00000398: DUP2
00000399: DUP2
0000039a: SUB
0000039b: PUSH0
0000039c: DUP4
0000039d: ADD
0000039e: MSTORE
0000039f: PUSH2 0x03a7
000003a2: DUP2
000003a3: PUSH2 0x036e
000003a6: JUMP
000003a7: JUMPDEST
000003a8: SWAP1
000003a9: POP
000003aa: SWAP2
000003ab: SWAP1
000003ac: POP
000003ad: JUMP
000003ae: INVALID
000003af: LOG2
000003b0: PUSH5 0x6970667358
000003b6: UNKNOWN(0x22)
000003b7: SLT
000003b8: KECCAK256
000003b9: CALLDATALOAD
000003ba: MSIZE
000003bb: LOG3
000003bc: UNKNOWN(0x22)
000003bd: PUSH6 0x06723bd0b83e
000003c4: UNKNOWN(0xB8)
000003c5: UNKNOWN(0xB5)
000003c6: UNKNOWN(0xD9)
000003c7: UNKNOWN(0xC9)
000003c8: SWAP1
000003c9: UNKNOWN(0xE5)
000003ca: UNKNOWN(0x27)
000003cb: DUP8
000003cc: MUL
000003cd: LOG4
000003ce: DUP12
000003cf: CHAINID
000003d0: BLOCKHASH
000003d1: BASEFEE
000003d2: UNKNOWN(0xF6)
000003d3: UNKNOWN(0xED)
000003d4: UNKNOWN(0xD7)
000003d5: UNKNOWN(0xE9)
000003d6: UNKNOWN(0x4D)
000003d7: SHL
000003d8: UNKNOWN(0xB4)
000003d9: PUSH5 0x736f6c6343
000003df: STOP
000003e0: ADDMOD
000003e1: ISZERO
000003e2: STOP
000003e3: CALLER

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
medium other detector Untrusted CALL target/value reachable 45 no no
view
trace_id: 0x40c6d142ec8ab597a3347f409ca503d97f9a27e97c88d6e9409c63ce74af4e98
call_targets: 0xa962ae3fc666cd1a8c3dcc2d8813a7b2b58ee0af
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0x40c6d142ec8ab597a3347f409ca503d97f9a27e97c88d6e9409c63ce74af4e98",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0xa962ae3fc666cd1a8c3dcc2d8813a7b2b58ee0af"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x566690ec",
            "selector": "0x566690ec",
            "calldata_variants": [
                "0x566690ec",
                "0x566690ec0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x8da5cb5b",
            "selector": "0x8da5cb5b",
            "calldata_variants": [
                "0x8da5cb5b",
                "0x8da5cb5b0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xebe29d74",
            "selector": "0xebe29d74",
            "calldata_variants": [
                "0xebe29d74",
                "0xebe29d740000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 418,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "call_count": 1,
    "guards_detected": [
        {
            "pc": 243,
            "type": "msg_sender_eq_const",
            "value": "0xffffffffffffffffffffffffffffffffffffffff"
        }
    ],
    "untrusted_call_count": 1
}
medium other detector ETH value transfer possible 40 no no
view
trace_id: 0x40c6d142ec8ab597a3347f409ca503d97f9a27e97c88d6e9409c63ce74af4e98
call_targets: 0xa962ae3fc666cd1a8c3dcc2d8813a7b2b58ee0af
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0x40c6d142ec8ab597a3347f409ca503d97f9a27e97c88d6e9409c63ce74af4e98",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0xa962ae3fc666cd1a8c3dcc2d8813a7b2b58ee0af"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x566690ec",
            "selector": "0x566690ec",
            "calldata_variants": [
                "0x566690ec",
                "0x566690ec0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x8da5cb5b",
            "selector": "0x8da5cb5b",
            "calldata_variants": [
                "0x8da5cb5b",
                "0x8da5cb5b0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xebe29d74",
            "selector": "0xebe29d74",
            "calldata_variants": [
                "0xebe29d74",
                "0xebe29d740000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 418,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "eth_value_calls": 1,
    "guards_detected": [
        {
            "pc": 243,
            "type": "msg_sender_eq_const",
            "value": "0xffffffffffffffffffffffffffffffffffffffff"
        }
    ]
}