019ba4db-e543-73e9-b2b8-f25f0b6dc6b6
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 31825 | artifact.fetch | failed | 3 / 3 | 3 months ago |
| 31826 | proxy.resolve | failed | 3 / 3 | 3 months ago |
| 31827 | tool.cast_disasm | failed | 3 / 3 | 3 months ago |
| 31828 | analysis.bundle | failed | 3 / 3 | 3 months ago |
| 31829 | capability.graph | failed | 3 / 3 | 3 months ago |
| 31830 | detector.run | failed | 3 / 3 | 3 months ago |
| 31831 | validation.fork | complete | 1 / 3 | 3 months ago |
No artifact recorded yet.
No slither job recorded yet.
No codex job recorded yet.
Traceback (most recent call last):
File "/var/www/tripwire/worker/worker.py", line 190, in main
raise ValueError("job type missing from metadata")
~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/var/www/tripwire/worker/worker.py", line 98, in dispatch_job
return artifact_fetch.run(job_id, job_meta, run_data, config, log)
~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/var/www/tripwire/worker/jobs/cast_disasm.py", line 466, in run
raise ValueError("artifact missing runtime_bytecode after retries")
ValueError: artifact missing runtime_bytecode after retries
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| No findings yet. | |||||||