019b477e-de41-7059-8ad6-ce1100b618c1
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 30103 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 30104 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 73328 | analysis.bundle | complete | 1 / 3 | 2 weeks ago |
| 73329 | capability.graph | complete | 1 / 3 | 2 weeks ago |
| 73330 | detector.run | complete | 1 / 3 | 2 weeks ago |
| 73331 | validation.fork | complete | 1 / 3 | 2 weeks ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: RETURNDATASIZE 00000001: RETURNDATASIZE 00000002: CALLER 00000003: PUSH20 0x2f6d0ce53506d72eb21a39d39f16fc1dc4e45797 00000018: EQ 00000019: PUSH1 0x57 0000001b: JUMPI 0000001c: CALLDATASIZE 0000001d: RETURNDATASIZE 0000001e: RETURNDATASIZE 0000001f: CALLDATACOPY 00000020: CALLDATASIZE 00000021: RETURNDATASIZE 00000022: PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc 00000043: SLOAD 00000044: GAS 00000045: DELEGATECALL 00000046: RETURNDATASIZE 00000047: PUSH1 0x00 00000049: DUP1 0000004a: RETURNDATACOPY 0000004b: PUSH1 0x52 0000004d: JUMPI 0000004e: RETURNDATASIZE 0000004f: PUSH1 0x00 00000051: REVERT 00000052: JUMPDEST 00000053: RETURNDATASIZE 00000054: PUSH1 0x00 00000056: RETURN 00000057: JUMPDEST 00000058: RETURNDATASIZE 00000059: CALLDATALOAD 0000005a: PUSH1 0x20 0000005c: CALLDATALOAD 0000005d: SSTORE 0000005e: PUSH1 0x40 00000060: DUP1 00000061: CALLDATASIZE 00000062: GT 00000063: ISZERO 00000064: PUSH1 0x52 00000066: JUMPI 00000067: CALLDATASIZE 00000068: SUB 00000069: DUP1 0000006a: PUSH1 0x40 0000006c: RETURNDATASIZE 0000006d: CALLDATACOPY 0000006e: RETURNDATASIZE 0000006f: RETURNDATASIZE 00000070: CALLDATALOAD 00000071: GAS 00000072: DELEGATECALL 00000073: RETURNDATASIZE 00000074: PUSH1 0x00 00000076: DUP1 00000077: RETURNDATACOPY 00000078: PUSH1 0x52 0000007a: JUMPI 0000007b: RETURNDATASIZE 0000007c: PUSH1 0x00 0000007e: REVERT
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| high | upgradeability | detector | Untrusted DELEGATECALL target reachable | 55 | no | no |
viewtrace_id: 0x7d780c8ff18a5af7a2add2ed79556de23bb143abefe9c89855d58b500a381d42
call_targets:
0x28334db7521a87d4261bb459fcc297c1e0882eb0
target_varies:
no
classification:
constant_target
validation_json{
"sink": "DELEGATECALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x7d780c8ff18a5af7a2add2ed79556de23bb143abefe9c89855d58b500a381d42",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x28334db7521a87d4261bb459fcc297c1e0882eb0"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 69,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
},
{
"pc": 114,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [
{
"pc": 24,
"type": "msg_sender_eq_const",
"value": 2.707544707979381e+47
},
{
"pc": 2,
"type": "msg_sender_eq_const",
"value": "0x2f6d0ce53506d72eb21a39d39f16fc1dc4e45797"
}
],
"delegatecall_count": 2,
"untrusted_delegatecall_count": 2
}
|