TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

019ba8e4-073a-7379-a229-15a4fb096379

complete
Chain ID
1
Address
Block Number
Created
Sat, Jan 10, 2026 5:11 PM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
0
Validated
0
Source
Verified
Review Backing
Not yet
Best current signal
Untrusted DELEGATECALL target reachable
crit 0 high 0 proxy context implementation known
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
33380 artifact.fetch complete 1 / 3 3 months ago
33381 proxy.resolve complete 1 / 3 3 months ago
33382 tool.cast_disasm complete 1 / 3 3 months ago
33383 analysis.bundle complete 1 / 3 3 months ago
33384 capability.graph complete 1 / 3 3 months ago
33385 detector.run complete 1 / 3 3 months ago
33386 validation.fork complete 1 / 3 3 months ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: yes confirmed
Verified Source: yes
Proxy evidence
{
    "method": "etherscan+onchain",
    "status": "confirmed",
    "etherscan_hint": {
        "source": "etherscan",
        "etherscan": {
            "proxy_flag": true,
            "implementation": "0xb8843223a711074cc4781b9b7d5385415b3209cb"
        }
    },
    "implementation": "0xb8843223a711074cc4781b9b7d5385415b3209cb",
    "onchain_method": "beacon"
}

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate

No codex job recorded yet.

Opcode Heuristics

tool.cast_disasm
Delegatecall
1
Selfdestruct
0
CREATE2
0
CALL-family (heavy)
1
EXT*/BALANCE
0
Total opcodes
203
Flags
delegatecall_present
View cast disassembly output
00000000: PUSH1 0x80
00000002: PUSH1 0x40
00000004: MSTORE
00000005: CALLDATASIZE
00000006: PUSH2 0x0013
00000009: JUMPI
0000000a: PUSH2 0x0011
0000000d: PUSH2 0x0017
00000010: JUMP
00000011: JUMPDEST
00000012: STOP
00000013: JUMPDEST
00000014: PUSH2 0x0011
00000017: JUMPDEST
00000018: PUSH2 0x0027
0000001b: PUSH2 0x0022
0000001e: PUSH2 0x0029
00000021: JUMP
00000022: JUMPDEST
00000023: PUSH2 0x00c2
00000026: JUMP
00000027: JUMPDEST
00000028: JUMP
00000029: JUMPDEST
0000002a: PUSH1 0x00
0000002c: PUSH2 0x005c
0000002f: PUSH32 0xa3f0ad74e5423aebfd80d3ef4346578335a9a72aeaee59ff6cb3582b35133d50
00000050: SLOAD
00000051: PUSH1 0x01
00000053: PUSH1 0x01
00000055: PUSH1 0xa0
00000057: SHL
00000058: SUB
00000059: AND
0000005a: SWAP1
0000005b: JUMP
0000005c: JUMPDEST
0000005d: PUSH1 0x01
0000005f: PUSH1 0x01
00000061: PUSH1 0xa0
00000063: SHL
00000064: SUB
00000065: AND
00000066: PUSH4 0x5c60da1b
0000006b: PUSH1 0x40
0000006d: MLOAD
0000006e: DUP2
0000006f: PUSH4 0xffffffff
00000074: AND
00000075: PUSH1 0xe0
00000077: SHL
00000078: DUP2
00000079: MSTORE
0000007a: PUSH1 0x04
0000007c: ADD
0000007d: PUSH1 0x20
0000007f: PUSH1 0x40
00000081: MLOAD
00000082: DUP1
00000083: DUP4
00000084: SUB
00000085: DUP2
00000086: DUP7
00000087: GAS
00000088: STATICCALL
00000089: ISZERO
0000008a: DUP1
0000008b: ISZERO
0000008c: PUSH2 0x0099
0000008f: JUMPI
00000090: RETURNDATASIZE
00000091: PUSH1 0x00
00000093: DUP1
00000094: RETURNDATACOPY
00000095: RETURNDATASIZE
00000096: PUSH1 0x00
00000098: REVERT
00000099: JUMPDEST
0000009a: POP
0000009b: POP
0000009c: POP
0000009d: POP
0000009e: PUSH1 0x40
000000a0: MLOAD
000000a1: RETURNDATASIZE
000000a2: PUSH1 0x1f
000000a4: NOT
000000a5: PUSH1 0x1f
000000a7: DUP3
000000a8: ADD
000000a9: AND
000000aa: DUP3
000000ab: ADD
000000ac: DUP1
000000ad: PUSH1 0x40
000000af: MSTORE
000000b0: POP
000000b1: DUP2
000000b2: ADD
000000b3: SWAP1
000000b4: PUSH2 0x00bd
000000b7: SWAP2
000000b8: SWAP1
000000b9: PUSH2 0x00e6
000000bc: JUMP
000000bd: JUMPDEST
000000be: SWAP1
000000bf: POP
000000c0: SWAP1
000000c1: JUMP
000000c2: JUMPDEST
000000c3: CALLDATASIZE
000000c4: PUSH1 0x00
000000c6: DUP1
000000c7: CALLDATACOPY
000000c8: PUSH1 0x00
000000ca: DUP1
000000cb: CALLDATASIZE
000000cc: PUSH1 0x00
000000ce: DUP5
000000cf: GAS
000000d0: DELEGATECALL
000000d1: RETURNDATASIZE
000000d2: PUSH1 0x00
000000d4: DUP1
000000d5: RETURNDATACOPY
000000d6: DUP1
000000d7: DUP1
000000d8: ISZERO
000000d9: PUSH2 0x00e1
000000dc: JUMPI
000000dd: RETURNDATASIZE
000000de: PUSH1 0x00
000000e0: RETURN
000000e1: JUMPDEST
000000e2: RETURNDATASIZE
000000e3: PUSH1 0x00
000000e5: REVERT
000000e6: JUMPDEST
000000e7: PUSH1 0x00
000000e9: PUSH1 0x20
000000eb: DUP3
000000ec: DUP5
000000ed: SUB
000000ee: SLT
000000ef: ISZERO
000000f0: PUSH2 0x00f8
000000f3: JUMPI
000000f4: PUSH1 0x00
000000f6: DUP1
000000f7: REVERT
000000f8: JUMPDEST
000000f9: DUP2
000000fa: MLOAD
000000fb: PUSH1 0x01
000000fd: PUSH1 0x01
000000ff: PUSH1 0xa0
00000101: SHL
00000102: SUB
00000103: DUP2
00000104: AND
00000105: DUP2
00000106: EQ
00000107: PUSH2 0x010f
0000010a: JUMPI
0000010b: PUSH1 0x00
0000010d: DUP1
0000010e: REVERT
0000010f: JUMPDEST
00000110: SWAP4
00000111: SWAP3
00000112: POP
00000113: POP
00000114: POP
00000115: JUMP
00000116: INVALID
00000117: LOG2
00000118: PUSH5 0x6970667358
0000011e: UNKNOWN(0x22)
0000011f: SLT
00000120: KECCAK256
00000121: UNKNOWN(0xA7)
00000122: UNKNOWN(0x29)
00000123: DUP15
00000124: UNKNOWN(0xAF)
00000125: UNKNOWN(0xD4)
00000126: LOG4
00000127: KECCAK256
00000128: UNKNOWN(0xFC)
00000129: UNKNOWN(0xEF)
0000012a: TLOAD
0000012b: RETURN
0000012c: UNKNOWN(0xBA)
0000012d: SWAP6
0000012e: UNKNOWN(0xE3)
0000012f: MOD
00000130: UNKNOWN(0xB0)
00000131: CALLDATALOAD
00000132: PUSH8 0x8298d6386d26ef73
0000013b: SWAP16
0000013c: UNKNOWN(0xF7)
0000013d: SAR
0000013e: PUSH32

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
critical upgradeability detector Untrusted DELEGATECALL target reachable 70 no no
view
trace_id: 0x59246ffebf16d6a2a630bccb3e9357ce8639a72a4f9f8fdc1d9def098e3a1c1b
call_targets: 0xb8843223a711074cc4781b9b7d5385415b3209cb
target_varies: no
classification: constant_target
validation_json
{
    "sink": "DELEGATECALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0x59246ffebf16d6a2a630bccb3e9357ce8639a72a4f9f8fdc1d9def098e3a1c1b",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0xb8843223a711074cc4781b9b7d5385415b3209cb"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x",
            "selector": "fallback",
            "calldata_variants": [
                "0x"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 208,
            "opcode": "DELEGATECALL",
            "returndata_checked": null,
            "value_expression_category": "n/a",
            "target_expression_category": "computed"
        }
    ],
    "guards_detected": [],
    "delegatecall_count": 1,
    "untrusted_delegatecall_count": 1
}
medium upgradeability cast DELEGATECALL present 80 no
view
evidence_json
{
    "notes": "delegatecall enables execution in caller context; common in proxies/upgradeable patterns",
    "delegatecall_count": 1
}