019ba8a4-ffa9-70d4-939b-c5365e6d097a
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 32306 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 32307 | proxy.resolve | complete | 1 / 3 | 3 months ago |
| 32308 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 32309 | analysis.bundle | complete | 1 / 3 | 3 months ago |
| 32310 | capability.graph | complete | 1 / 3 | 3 months ago |
| 32311 | detector.run | complete | 1 / 3 | 3 months ago |
| 32312 | validation.fork | complete | 1 / 3 | 3 months ago |
{
"method": "etherscan+onchain",
"status": "confirmed",
"etherscan_hint": {
"source": "etherscan",
"etherscan": {
"proxy_flag": true,
"implementation": "0x378de16133b418e1a8a46824a0fb3a4228d083cd"
}
},
"implementation": "0x378de16133b418e1a8a46824a0fb3a4228d083cd",
"onchain_method": "eip1967"
}
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc 00000026: SLOAD 00000027: PUSH1 0x00 00000029: SWAP1 0000002a: DUP2 0000002b: SWAP1 0000002c: DUP2 0000002d: SWAP1 0000002e: PUSH1 0x01 00000030: PUSH1 0x01 00000032: PUSH1 0xa0 00000034: SHL 00000035: SUB 00000036: AND 00000037: CALLDATASIZE 00000038: DUP3 00000039: DUP1 0000003a: CALLDATACOPY 0000003b: DUP2 0000003c: CALLDATASIZE 0000003d: SWAP2 0000003e: GAS 0000003f: DELEGATECALL 00000040: RETURNDATASIZE 00000041: DUP3 00000042: DUP1 00000043: RETURNDATACOPY 00000044: ISZERO 00000045: PUSH1 0x4b 00000047: JUMPI 00000048: RETURNDATASIZE 00000049: SWAP1 0000004a: RETURN 0000004b: JUMPDEST 0000004c: RETURNDATASIZE 0000004d: SWAP1 0000004e: REVERT 0000004f: INVALID 00000050: LOG2 00000051: PUSH5 0x6970667358 00000057: UNKNOWN(0x22) 00000058: SLT 00000059: KECCAK256 0000005a: BYTE 0000005b: SWAP12 0000005c: UNKNOWN(0xC8) 0000005d: PUSH23 0x90d7316faa5e53baa4901917b34a88d7c337c100e8dcbd 00000075: UNKNOWN(0xAE) 00000076: UNKNOWN(0xB2) 00000077: GASPRICE 00000078: UNKNOWN(0xE4) 00000079: AND 0000007a: PUSH5 0x736f6c6343 00000080: STOP 00000081: ADDMOD 00000082: EQ 00000083: STOP 00000084: CALLER
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewtrace_id: 0x2167bb5edf586db6bffa3fcd34020e82cc168fdcc9e9995d2eaebd62a83b79da
call_targets:
0x378de16133b418e1a8a46824a0fb3a4228d083cd
target_varies:
no
classification:
constant_target
validation_json{
"sink": "DELEGATECALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x2167bb5edf586db6bffa3fcd34020e82cc168fdcc9e9995d2eaebd62a83b79da",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x378de16133b418e1a8a46824a0fb3a4228d083cd"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 63,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 1,
"untrusted_delegatecall_count": 1
}
|
| medium | upgradeability | cast | DELEGATECALL present | 80 | no | — |
viewevidence_json{
"notes": "delegatecall enables execution in caller context; common in proxies/upgradeable patterns",
"delegatecall_count": 1
}
|
| info | upgradeability | cast | Likely proxy-like runtime | 60 | no | — |
viewevidence_json{
"notes": "short runtime with SLOAD and DELEGATECALL resembles minimal proxy/upgradeable pattern",
"sload_count": 1,
"total_opcodes": 61,
"delegatecall_count": 1
}
|