019ba8e4-073a-7379-a229-15a4fb096379
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 33380 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 33381 | proxy.resolve | complete | 1 / 3 | 3 months ago |
| 33382 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 33383 | analysis.bundle | complete | 1 / 3 | 3 months ago |
| 33384 | capability.graph | complete | 1 / 3 | 3 months ago |
| 33385 | detector.run | complete | 1 / 3 | 3 months ago |
| 33386 | validation.fork | complete | 1 / 3 | 3 months ago |
{
"method": "etherscan+onchain",
"status": "confirmed",
"etherscan_hint": {
"source": "etherscan",
"etherscan": {
"proxy_flag": true,
"implementation": "0xb8843223a711074cc4781b9b7d5385415b3209cb"
}
},
"implementation": "0xb8843223a711074cc4781b9b7d5385415b3209cb",
"onchain_method": "beacon"
}
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: CALLDATASIZE 00000006: PUSH2 0x0013 00000009: JUMPI 0000000a: PUSH2 0x0011 0000000d: PUSH2 0x0017 00000010: JUMP 00000011: JUMPDEST 00000012: STOP 00000013: JUMPDEST 00000014: PUSH2 0x0011 00000017: JUMPDEST 00000018: PUSH2 0x0027 0000001b: PUSH2 0x0022 0000001e: PUSH2 0x0029 00000021: JUMP 00000022: JUMPDEST 00000023: PUSH2 0x00c2 00000026: JUMP 00000027: JUMPDEST 00000028: JUMP 00000029: JUMPDEST 0000002a: PUSH1 0x00 0000002c: PUSH2 0x005c 0000002f: PUSH32 0xa3f0ad74e5423aebfd80d3ef4346578335a9a72aeaee59ff6cb3582b35133d50 00000050: SLOAD 00000051: PUSH1 0x01 00000053: PUSH1 0x01 00000055: PUSH1 0xa0 00000057: SHL 00000058: SUB 00000059: AND 0000005a: SWAP1 0000005b: JUMP 0000005c: JUMPDEST 0000005d: PUSH1 0x01 0000005f: PUSH1 0x01 00000061: PUSH1 0xa0 00000063: SHL 00000064: SUB 00000065: AND 00000066: PUSH4 0x5c60da1b 0000006b: PUSH1 0x40 0000006d: MLOAD 0000006e: DUP2 0000006f: PUSH4 0xffffffff 00000074: AND 00000075: PUSH1 0xe0 00000077: SHL 00000078: DUP2 00000079: MSTORE 0000007a: PUSH1 0x04 0000007c: ADD 0000007d: PUSH1 0x20 0000007f: PUSH1 0x40 00000081: MLOAD 00000082: DUP1 00000083: DUP4 00000084: SUB 00000085: DUP2 00000086: DUP7 00000087: GAS 00000088: STATICCALL 00000089: ISZERO 0000008a: DUP1 0000008b: ISZERO 0000008c: PUSH2 0x0099 0000008f: JUMPI 00000090: RETURNDATASIZE 00000091: PUSH1 0x00 00000093: DUP1 00000094: RETURNDATACOPY 00000095: RETURNDATASIZE 00000096: PUSH1 0x00 00000098: REVERT 00000099: JUMPDEST 0000009a: POP 0000009b: POP 0000009c: POP 0000009d: POP 0000009e: PUSH1 0x40 000000a0: MLOAD 000000a1: RETURNDATASIZE 000000a2: PUSH1 0x1f 000000a4: NOT 000000a5: PUSH1 0x1f 000000a7: DUP3 000000a8: ADD 000000a9: AND 000000aa: DUP3 000000ab: ADD 000000ac: DUP1 000000ad: PUSH1 0x40 000000af: MSTORE 000000b0: POP 000000b1: DUP2 000000b2: ADD 000000b3: SWAP1 000000b4: PUSH2 0x00bd 000000b7: SWAP2 000000b8: SWAP1 000000b9: PUSH2 0x00e6 000000bc: JUMP 000000bd: JUMPDEST 000000be: SWAP1 000000bf: POP 000000c0: SWAP1 000000c1: JUMP 000000c2: JUMPDEST 000000c3: CALLDATASIZE 000000c4: PUSH1 0x00 000000c6: DUP1 000000c7: CALLDATACOPY 000000c8: PUSH1 0x00 000000ca: DUP1 000000cb: CALLDATASIZE 000000cc: PUSH1 0x00 000000ce: DUP5 000000cf: GAS 000000d0: DELEGATECALL 000000d1: RETURNDATASIZE 000000d2: PUSH1 0x00 000000d4: DUP1 000000d5: RETURNDATACOPY 000000d6: DUP1 000000d7: DUP1 000000d8: ISZERO 000000d9: PUSH2 0x00e1 000000dc: JUMPI 000000dd: RETURNDATASIZE 000000de: PUSH1 0x00 000000e0: RETURN 000000e1: JUMPDEST 000000e2: RETURNDATASIZE 000000e3: PUSH1 0x00 000000e5: REVERT 000000e6: JUMPDEST 000000e7: PUSH1 0x00 000000e9: PUSH1 0x20 000000eb: DUP3 000000ec: DUP5 000000ed: SUB 000000ee: SLT 000000ef: ISZERO 000000f0: PUSH2 0x00f8 000000f3: JUMPI 000000f4: PUSH1 0x00 000000f6: DUP1 000000f7: REVERT 000000f8: JUMPDEST 000000f9: DUP2 000000fa: MLOAD 000000fb: PUSH1 0x01 000000fd: PUSH1 0x01 000000ff: PUSH1 0xa0 00000101: SHL 00000102: SUB 00000103: DUP2 00000104: AND 00000105: DUP2 00000106: EQ 00000107: PUSH2 0x010f 0000010a: JUMPI 0000010b: PUSH1 0x00 0000010d: DUP1 0000010e: REVERT 0000010f: JUMPDEST 00000110: SWAP4 00000111: SWAP3 00000112: POP 00000113: POP 00000114: POP 00000115: JUMP 00000116: INVALID 00000117: LOG2 00000118: PUSH5 0x6970667358 0000011e: UNKNOWN(0x22) 0000011f: SLT 00000120: KECCAK256 00000121: UNKNOWN(0xA7) 00000122: UNKNOWN(0x29) 00000123: DUP15 00000124: UNKNOWN(0xAF) 00000125: UNKNOWN(0xD4) 00000126: LOG4 00000127: KECCAK256 00000128: UNKNOWN(0xFC) 00000129: UNKNOWN(0xEF) 0000012a: TLOAD 0000012b: RETURN 0000012c: UNKNOWN(0xBA) 0000012d: SWAP6 0000012e: UNKNOWN(0xE3) 0000012f: MOD 00000130: UNKNOWN(0xB0) 00000131: CALLDATALOAD 00000132: PUSH8 0x8298d6386d26ef73 0000013b: SWAP16 0000013c: UNKNOWN(0xF7) 0000013d: SAR 0000013e: PUSH32
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewtrace_id: 0x59246ffebf16d6a2a630bccb3e9357ce8639a72a4f9f8fdc1d9def098e3a1c1b
call_targets:
0xb8843223a711074cc4781b9b7d5385415b3209cb
target_varies:
no
classification:
constant_target
validation_json{
"sink": "DELEGATECALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x59246ffebf16d6a2a630bccb3e9357ce8639a72a4f9f8fdc1d9def098e3a1c1b",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0xb8843223a711074cc4781b9b7d5385415b3209cb"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 208,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 1,
"untrusted_delegatecall_count": 1
}
|
| medium | upgradeability | cast | DELEGATECALL present | 80 | no | — |
viewevidence_json{
"notes": "delegatecall enables execution in caller context; common in proxies/upgradeable patterns",
"delegatecall_count": 1
}
|