019ba940-885a-72ee-ba48-9f4927e5b096
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 36287 | artifact.fetch | complete | 1 / 3 | 3 months ago |
| 36288 | proxy.resolve | complete | 1 / 3 | 3 months ago |
| 36289 | tool.cast_disasm | complete | 1 / 3 | 3 months ago |
| 36290 | analysis.bundle | complete | 1 / 3 | 3 months ago |
| 36291 | capability.graph | complete | 1 / 3 | 3 months ago |
| 36292 | detector.run | complete | 1 / 3 | 3 months ago |
| 36293 | validation.fork | complete | 1 / 3 | 3 months ago |
{
"status": "etherscan_only",
"etherscan_hint": {
"source": "etherscan",
"etherscan": {
"proxy_flag": true,
"implementation": "0x7d4167f56dab086ac119eec8ff013dc4f7754a1c"
}
},
"implementation": "0x7d4167f56dab086ac119eec8ff013dc4f7754a1c"
}
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: PUSH32 0xc5f16f0fcc639fa48a6947836d9850f504798523bf8c9a3a87d5876cf622bcf7 00000026: SLOAD 00000027: PUSH1 0x40 00000029: MLOAD 0000002a: CALLDATASIZE 0000002b: PUSH1 0x00 0000002d: DUP3 0000002e: CALLDATACOPY 0000002f: PUSH1 0x00 00000031: DUP1 00000032: CALLDATASIZE 00000033: DUP4 00000034: DUP6 00000035: GAS 00000036: DELEGATECALL 00000037: SWAP2 00000038: POP 00000039: RETURNDATASIZE 0000003a: DUP1 0000003b: PUSH1 0x00 0000003d: DUP4 0000003e: RETURNDATACOPY 0000003f: DUP3 00000040: DUP1 00000041: ISZERO 00000042: PUSH1 0x48 00000044: JUMPI 00000045: DUP2 00000046: DUP4 00000047: RETURN 00000048: JUMPDEST 00000049: DUP2 0000004a: DUP4 0000004b: REVERT 0000004c: INVALID 0000004d: LOG2 0000004e: PUSH5 0x6970667358 00000054: UNKNOWN(0x22) 00000055: SLT 00000056: KECCAK256 00000057: SSTORE 00000058: SHL 00000059: SGT 0000005a: POP 0000005b: UNKNOWN(0xF7) 0000005c: SSTORE 0000005d: DUP6 0000005e: SAR 0000005f: PUSH19 0x8f025e1e78d87c1a8cf67ba97458c753f6e1b3 00000073: PUSH28
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | no |
viewtrace_id: 0x27e3c7d1610e8fd865960f3bac9b04a8314ba0b2ded452ace495b677fcbf2dda
call_targets:
0x7d4167f56dab086ac119eec8ff013dc4f7754a1c
target_varies:
no
classification:
constant_target
validation_json{
"sink": "DELEGATECALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0x27e3c7d1610e8fd865960f3bac9b04a8314ba0b2ded452ace495b677fcbf2dda",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x7d4167f56dab086ac119eec8ff013dc4f7754a1c"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 54,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 1,
"untrusted_delegatecall_count": 1
}
|
| medium | upgradeability | cast | DELEGATECALL present | 80 | no | — |
viewevidence_json{
"notes": "delegatecall enables execution in caller context; common in proxies/upgradeable patterns",
"delegatecall_count": 1
}
|
| info | upgradeability | cast | Likely proxy-like runtime | 60 | no | — |
viewevidence_json{
"notes": "short runtime with SLOAD and DELEGATECALL resembles minimal proxy/upgradeable pattern",
"sload_count": 1,
"total_opcodes": 53,
"delegatecall_count": 1
}
|