019ba940-8814-7278-869a-d9b89066625c
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 36231 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 36232 | proxy.resolve | complete | 1 / 3 | 3 months ago |
| 36233 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 36234 | analysis.bundle | complete | 1 / 3 | 3 months ago |
| 36235 | capability.graph | complete | 1 / 3 | 3 months ago |
| 36236 | detector.run | complete | 1 / 3 | 3 months ago |
| 36237 | validation.fork | complete | 1 / 3 | 3 months ago |
{
"status": "not_proxy"
}
No slither job recorded yet.
No codex job recorded yet.
00000000: CALLDATASIZE 00000001: PUSH1 0x00 00000003: PUSH1 0x00 00000005: CALLDATACOPY 00000006: PUSH2 0x1000 00000009: PUSH1 0x00 0000000b: CALLDATASIZE 0000000c: PUSH1 0x00 0000000e: PUSH20 0x575ba30c7b77fa0eebd34cc5416538323c4e5612 00000023: GAS 00000024: DELEGATECALL 00000025: ISZERO 00000026: PC 00000027: JUMPI 00000028: PUSH2 0x1000 0000002b: PUSH1 0x00 0000002d: RETURN
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| medium | upgradeability | cast | DELEGATECALL present | 80 | no | — |
viewevidence_json{
"notes": "delegatecall enables execution in caller context; common in proxies/upgradeable patterns",
"delegatecall_count": 1
}
|