019ba5f9-b759-72d7-98bf-cd9623e00924
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 32134 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 32135 | proxy.resolve | complete | 1 / 3 | 3 months ago |
| 32136 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 32137 | analysis.bundle | complete | 1 / 3 | 3 months ago |
| 32138 | capability.graph | complete | 1 / 3 | 3 months ago |
| 32139 | detector.run | complete | 1 / 3 | 3 months ago |
| 32140 | validation.fork | complete | 1 / 3 | 3 months ago |
{
"status": "conflict",
"onchain_impl": "0xde4d0329db2c046b8ba35180822aeeccf63d3294",
"etherscan_hint": {
"source": "etherscan",
"etherscan": {
"proxy_flag": true,
"implementation": "0x899a4f5f5422cc5e8183280182e7096fb923c762"
}
},
"etherscan_impl": "0x899a4f5f5422cc5e8183280182e7096fb923c762",
"onchain_method": "eip1967"
}
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: PUSH1 0x0a 00000007: PUSH1 0x0c 00000009: JUMP 0000000a: JUMPDEST 0000000b: STOP 0000000c: JUMPDEST 0000000d: PUSH1 0x18 0000000f: PUSH1 0x14 00000011: PUSH1 0x1a 00000013: JUMP 00000014: JUMPDEST 00000015: PUSH1 0x50 00000017: JUMP 00000018: JUMPDEST 00000019: JUMP 0000001a: JUMPDEST 0000001b: PUSH0 0000001c: PUSH1 0x4b 0000001e: PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc 0000003f: SLOAD 00000040: PUSH1 0x01 00000042: PUSH1 0x01 00000044: PUSH1 0xa0 00000046: SHL 00000047: SUB 00000048: AND 00000049: SWAP1 0000004a: JUMP 0000004b: JUMPDEST 0000004c: SWAP1 0000004d: POP 0000004e: SWAP1 0000004f: JUMP 00000050: JUMPDEST 00000051: CALLDATASIZE 00000052: PUSH0 00000053: PUSH0 00000054: CALLDATACOPY 00000055: PUSH0 00000056: PUSH0 00000057: CALLDATASIZE 00000058: PUSH0 00000059: DUP5 0000005a: GAS 0000005b: DELEGATECALL 0000005c: RETURNDATASIZE 0000005d: PUSH0 0000005e: PUSH0 0000005f: RETURNDATACOPY 00000060: DUP1 00000061: DUP1 00000062: ISZERO 00000063: PUSH1 0x69 00000065: JUMPI 00000066: RETURNDATASIZE 00000067: PUSH0 00000068: RETURN 00000069: JUMPDEST 0000006a: RETURNDATASIZE 0000006b: PUSH0 0000006c: REVERT 0000006d: INVALID 0000006e: LOG2 0000006f: PUSH5 0x6970667358 00000075: UNKNOWN(0x22) 00000076: SLT 00000077: KECCAK256 00000078: UNKNOWN(0xC7) 00000079: UNKNOWN(0xE6) 0000007a: BASEFEE 0000007b: ADDMOD 0000007c: UNKNOWN(0xD4) 0000007d: UNKNOWN(0xC5) 0000007e: SWAP6 0000007f: DELEGATECALL 00000080: DUP3 00000081: SLOAD 00000082: UNKNOWN(0x22) 00000083: BASEFEE 00000084: PUSH5 0xee5d8de24e 0000008a: PUSH12 0x4b170ccfeaaba971ffb3ff4e 00000097: UNKNOWN(0xAF) 00000098: PUSH5 0x736f6c6343 0000009e: STOP 0000009f: ADDMOD 000000a0: SAR 000000a1: STOP 000000a2: CALLER
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewtrace_id: 0x289f6438e5ea7dbcac40b99f1f047633bf51cf839198e7079c27548bfcb291ca
call_targets:
0xde4d0329db2c046b8ba35180822aeeccf63d3294
target_varies:
no
classification:
constant_target
validation_json{
"sink": "DELEGATECALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x289f6438e5ea7dbcac40b99f1f047633bf51cf839198e7079c27548bfcb291ca",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0xde4d0329db2c046b8ba35180822aeeccf63d3294"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 91,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
},
{
"pc": 127,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 2,
"untrusted_delegatecall_count": 2
}
|
| medium | upgradeability | cast | DELEGATECALL present | 80 | no | — |
viewevidence_json{
"notes": "delegatecall enables execution in caller context; common in proxies/upgradeable patterns",
"delegatecall_count": 2
}
|
| info | upgradeability | cast | Likely proxy-like runtime | 60 | no | — |
viewevidence_json{
"notes": "short runtime with SLOAD and DELEGATECALL resembles minimal proxy/upgradeable pattern",
"sload_count": 2,
"total_opcodes": 91,
"delegatecall_count": 2
}
|