019b477e-de5a-72ac-8fd6-716c3cf35e06
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 30121 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 30122 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 73340 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 73341 | capability.graph | complete | 1 / 3 | 1 week ago |
| 73342 | detector.run | complete | 1 / 3 | 1 week ago |
| 73343 | validation.fork | complete | 1 / 3 | 1 week ago |
No slither job recorded yet.
No codex job recorded yet.
00000000: CALLDATASIZE 00000001: RETURNDATASIZE 00000002: RETURNDATASIZE 00000003: CALLDATACOPY 00000004: RETURNDATASIZE 00000005: RETURNDATASIZE 00000006: CALLDATASIZE 00000007: RETURNDATASIZE 00000008: PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc 00000029: SLOAD 0000002a: GAS 0000002b: DELEGATECALL 0000002c: RETURNDATASIZE 0000002d: PUSH1 0x00 0000002f: DUP1 00000030: RETURNDATACOPY 00000031: PUSH1 0x38 00000033: JUMPI 00000034: RETURNDATASIZE 00000035: PUSH1 0x00 00000037: REVERT 00000038: JUMPDEST 00000039: RETURNDATASIZE 0000003a: PUSH1 0x00 0000003c: RETURN 0000003d: PUSH13 0xbec215ad4a98e67a0b42babdf7 0000004b: SWAP5 0000004c: UNKNOWN(0xC4) 0000004d: UNKNOWN(0xC5) 0000004e: UNKNOWN(0xE2) 0000004f: UNKNOWN(0xD8) 00000050: UNKNOWN(0x2B) 00000051: STOP 00000052: STOP 00000053: STOP 00000054: STOP 00000055: STOP 00000056: STOP 00000057: DIFFICULTY 00000058: LOG3 00000059: PUSH2 0xae3c 0000005c: UNKNOWN(0xAC) 0000005d: MULMOD 0000005e: UNKNOWN(0x4C) 0000005f: SWAP14 00000060: SHL 00000061: EQ 00000062: UNKNOWN(0xEE) 00000063: UNKNOWN(0xCE) 00000064: SWAP8 00000065: STOP 00000066: STOP 00000067: STOP 00000068: STOP 00000069: STOP 0000006a: DIV 0000006b: DIFFICULTY 0000006c: UNKNOWN(0x4C) 0000006d: TSTORE 0000006e: UNKNOWN(0xC7) 0000006f: TLOAD 00000070: UNKNOWN(0xB3) 00000071: PC 00000072: CODESIZE 00000073: UNKNOWN(0x0D) 00000074: UNKNOWN(0x2E) 00000075: RETURNDATASIZE 00000076: UNKNOWN(0xE0) 00000077: DUP11 00000078: SWAP1
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewtrace_id: 0x8ce63923526b0cd865efca6d20fafc0906f925882321afde6e0b0154ed9466be
call_targets:
0x7212eda151e8ee9f78a63e3c617e115bf66c5ff8
target_varies:
no
classification:
constant_target
validation_json{
"sink": "DELEGATECALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x8ce63923526b0cd865efca6d20fafc0906f925882321afde6e0b0154ed9466be",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x7212eda151e8ee9f78a63e3c617e115bf66c5ff8"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 43,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 1,
"untrusted_delegatecall_count": 1
}
|