019ba8b4-4f11-70bc-9f0a-1b81926c2f26
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 32657 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 32658 | proxy.resolve | complete | 1 / 3 | 3 months ago |
| 32659 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 32660 | analysis.bundle | complete | 1 / 3 | 3 months ago |
| 32661 | capability.graph | complete | 1 / 3 | 3 months ago |
| 32662 | detector.run | complete | 1 / 3 | 3 months ago |
| 32663 | validation.fork | complete | 1 / 3 | 3 months ago |
{
"method": "etherscan+onchain",
"status": "confirmed",
"etherscan_hint": {
"source": "etherscan",
"etherscan": {
"proxy_flag": true,
"implementation": "0xe10572ea8e9ed9cc7f9a528da3856a5caa26c7bf"
}
},
"implementation": "0xe10572ea8e9ed9cc7f9a528da3856a5caa26c7bf",
"onchain_method": "beacon"
}
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: PUSH1 0x0a 00000007: PUSH1 0x0c 00000009: JUMP 0000000a: JUMPDEST 0000000b: STOP 0000000c: JUMPDEST 0000000d: PUSH1 0x18 0000000f: PUSH1 0x14 00000011: PUSH1 0x1a 00000013: JUMP 00000014: JUMPDEST 00000015: PUSH1 0x9d 00000017: JUMP 00000018: JUMPDEST 00000019: JUMP 0000001a: JUMPDEST 0000001b: PUSH0 0000001c: PUSH32 0x0000000000000000000000005c680ec39bafe8524f3c2fa9d5f6d65f09bd7333 0000003d: PUSH1 0x01 0000003f: PUSH1 0x01 00000041: PUSH1 0xa0 00000043: SHL 00000044: SUB 00000045: AND 00000046: PUSH4 0x5c60da1b 0000004b: PUSH1 0x40 0000004d: MLOAD 0000004e: DUP2 0000004f: PUSH4 0xffffffff 00000054: AND 00000055: PUSH1 0xe0 00000057: SHL 00000058: DUP2 00000059: MSTORE 0000005a: PUSH1 0x04 0000005c: ADD 0000005d: PUSH1 0x20 0000005f: PUSH1 0x40 00000061: MLOAD 00000062: DUP1 00000063: DUP4 00000064: SUB 00000065: DUP2 00000066: DUP7 00000067: GAS 00000068: STATICCALL 00000069: ISZERO 0000006a: DUP1 0000006b: ISZERO 0000006c: PUSH1 0x76 0000006e: JUMPI 0000006f: RETURNDATASIZE 00000070: PUSH0 00000071: PUSH0 00000072: RETURNDATACOPY 00000073: RETURNDATASIZE 00000074: PUSH0 00000075: REVERT 00000076: JUMPDEST 00000077: POP 00000078: POP 00000079: POP 0000007a: POP 0000007b: PUSH1 0x40 0000007d: MLOAD 0000007e: RETURNDATASIZE 0000007f: PUSH1 0x1f 00000081: NOT 00000082: PUSH1 0x1f 00000084: DUP3 00000085: ADD 00000086: AND 00000087: DUP3 00000088: ADD 00000089: DUP1 0000008a: PUSH1 0x40 0000008c: MSTORE 0000008d: POP 0000008e: DUP2 0000008f: ADD 00000090: SWAP1 00000091: PUSH1 0x98 00000093: SWAP2 00000094: SWAP1 00000095: PUSH1 0xba 00000097: JUMP 00000098: JUMPDEST 00000099: SWAP1 0000009a: POP 0000009b: SWAP1 0000009c: JUMP 0000009d: JUMPDEST 0000009e: CALLDATASIZE 0000009f: PUSH0 000000a0: PUSH0 000000a1: CALLDATACOPY 000000a2: PUSH0 000000a3: PUSH0 000000a4: CALLDATASIZE 000000a5: PUSH0 000000a6: DUP5 000000a7: GAS 000000a8: DELEGATECALL 000000a9: RETURNDATASIZE 000000aa: PUSH0 000000ab: PUSH0 000000ac: RETURNDATACOPY 000000ad: DUP1 000000ae: DUP1 000000af: ISZERO 000000b0: PUSH1 0xb6 000000b2: JUMPI 000000b3: RETURNDATASIZE 000000b4: PUSH0 000000b5: RETURN 000000b6: JUMPDEST 000000b7: RETURNDATASIZE 000000b8: PUSH0 000000b9: REVERT 000000ba: JUMPDEST 000000bb: PUSH0 000000bc: PUSH1 0x20 000000be: DUP3 000000bf: DUP5 000000c0: SUB 000000c1: SLT 000000c2: ISZERO 000000c3: PUSH1 0xc9 000000c5: JUMPI 000000c6: PUSH0 000000c7: PUSH0 000000c8: REVERT 000000c9: JUMPDEST 000000ca: DUP2 000000cb: MLOAD 000000cc: PUSH1 0x01 000000ce: PUSH1 0x01 000000d0: PUSH1 0xa0 000000d2: SHL 000000d3: SUB 000000d4: DUP2 000000d5: AND 000000d6: DUP2 000000d7: EQ 000000d8: PUSH1 0xde 000000da: JUMPI 000000db: PUSH0 000000dc: PUSH0 000000dd: REVERT 000000de: JUMPDEST 000000df: SWAP4 000000e0: SWAP3 000000e1: POP 000000e2: POP 000000e3: POP 000000e4: JUMP 000000e5: INVALID 000000e6: LOG2 000000e7: PUSH5 0x6970667358 000000ed: UNKNOWN(0x22) 000000ee: SLT 000000ef: KECCAK256 000000f0: GAS 000000f1: CALLDATACOPY 000000f2: BLOBBASEFEE 000000f3: MUL 000000f4: UNKNOWN(0xE8) 000000f5: CLZ 000000f6: UNKNOWN(0xAD) 000000f7: CHAINID 000000f8: PUSH18 0x75e11e434a2f235768a938621f67add2f5b8 0000010b: DELEGATECALL 0000010c: UNKNOWN(0x25) 0000010d: PUSH2 0x8746 00000110: PUSH5 0x736f6c6343 00000116: STOP 00000117: ADDMOD 00000118: SHR 00000119: STOP 0000011a: CALLER
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewtrace_id: 0x7b17070cc0b1fdd74d989149851199cadab1492198555350a391d4d6a64601ca
call_targets:
0xe10572ea8e9ed9cc7f9a528da3856a5caa26c7bf
target_varies:
no
classification:
constant_target
validation_json{
"sink": "DELEGATECALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x7b17070cc0b1fdd74d989149851199cadab1492198555350a391d4d6a64601ca",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0xe10572ea8e9ed9cc7f9a528da3856a5caa26c7bf"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 168,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
},
{
"pc": 267,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 2,
"untrusted_delegatecall_count": 2
}
|
| medium | upgradeability | cast | DELEGATECALL present | 80 | no | — |
viewevidence_json{
"notes": "delegatecall enables execution in caller context; common in proxies/upgradeable patterns",
"delegatecall_count": 2
}
|