019b477e-dd9b-733f-835c-f0e748478c54
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 29993 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 29994 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 108765 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 108766 | capability.graph | complete | 1 / 3 | 1 week ago |
| 108767 | detector.run | complete | 1 / 3 | 1 week ago |
| 108768 | validation.fork | complete | 1 / 3 | 1 week ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc 00000026: SLOAD 00000027: PUSH0 00000028: SWAP1 00000029: DUP2 0000002a: SWAP1 0000002b: PUSH1 0x01 0000002d: PUSH1 0x01 0000002f: PUSH1 0xa0 00000031: SHL 00000032: SUB 00000033: AND 00000034: CALLDATASIZE 00000035: DUP3 00000036: DUP1 00000037: CALLDATACOPY 00000038: DUP2 00000039: CALLDATASIZE 0000003a: SWAP2 0000003b: GAS 0000003c: DELEGATECALL 0000003d: RETURNDATASIZE 0000003e: PUSH0 0000003f: DUP1 00000040: RETURNDATACOPY 00000041: ISZERO 00000042: PUSH1 0x48 00000044: JUMPI 00000045: RETURNDATASIZE 00000046: PUSH0 00000047: RETURN 00000048: JUMPDEST 00000049: RETURNDATASIZE 0000004a: PUSH0 0000004b: REVERT 0000004c: INVALID 0000004d: LOG2 0000004e: PUSH5 0x6970667358 00000054: UNKNOWN(0x22) 00000055: SLT 00000056: KECCAK256 00000057: UNKNOWN(0xD1) 00000058: UNKNOWN(0xBC) 00000059: ISZERO 0000005a: UNKNOWN(0xEB) 0000005b: UNKNOWN(0x4C) 0000005c: CODECOPY 0000005d: PUSH1 0x9a 0000005f: UNKNOWN(0xBD) 00000060: TSTORE 00000061: UNKNOWN(0xD1) 00000062: UNKNOWN(0x2D) 00000063: UNKNOWN(0x25) 00000064: PUSH5 0xe6dc5cafa5 0000006a: MULMOD 0000006b: UNKNOWN(0xA6) 0000006c: UNKNOWN(0x23) 0000006d: RETURN 0000006e: UNKNOWN(0xCB) 0000006f: BASEFEE 00000070: MULMOD 00000071: UNKNOWN(0x4D) 00000072: DUP3 00000073: SWAP5 00000074: JUMP 00000075: UNKNOWN(0xB3) 00000076: EXP 00000077: PUSH5 0x736f6c6343 0000007d: STOP 0000007e: ADDMOD 0000007f: SHR 00000080: STOP 00000081: CALLER
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewtrace_id: 0xe89229092ad88cb99e2ed319880c368642626b7dfba4aa6f04efebf1c8d182bc
call_targets:
0x5dc8cce71fd4962d3208c9af03844272f345b69f
target_varies:
no
classification:
constant_target
validation_json{
"sink": "DELEGATECALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0xe89229092ad88cb99e2ed319880c368642626b7dfba4aa6f04efebf1c8d182bc",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x5dc8cce71fd4962d3208c9af03844272f345b69f"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 60,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 1,
"untrusted_delegatecall_count": 1
}
|