TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

019c0ea9-0745-7141-887d-3061a28b705a

complete
Chain ID
1
Address
Block Number
Created
Fri, Jan 30, 2026 11:28 AM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
2
Validated
2
Source
Bytecode only
Review Backing
Present
Best current signal
Untrusted CALL target/value reachable
crit 0 high 2 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
41557 artifact.fetch complete 1 / 3 2 months ago
41558 proxy.resolve complete 1 / 3 2 months ago
41559 tool.cast_disasm complete 1 / 3 2 months ago
41560 analysis.bundle complete 1 / 3 2 months ago
41561 capability.graph complete 1 / 3 2 months ago
41562 detector.run complete 1 / 3 2 months ago
41563 validation.fork complete 1 / 3 2 months ago
42200 report.consolidate complete 1 / 6 2 months ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no not_proxy
Implementation:
Verified Source: no
Proxy evidence
{
    "status": "not_proxy"
}

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate
Job Status
complete
Attempts
1 / 6
Findings
1
No findings?
no
Summary
Bytecode-only review found low-level CALLs with computed targets and nonzero ETH value transfer; no delegatecall/proxy evidence. Access control around these paths is not confirmed (guard detection is heuristic).
View stdout
{"no_findings":false,"summary":"Bytecode-only review found low-level CALLs with computed targets and nonzero ETH value transfer; no delegatecall/proxy evidence. Access control around these paths is not confirmed (guard detection is heuristic).","findings":[{"severity":"medium","category":"other","title":"Untrusted low-level CALL with variable target/value (potential arbitrary external call/ETH transfer)","exploit_scenario":"If an untrusted caller can reach these CALL sites, they can supply a target and value to send ETH or trigger external code execution (including reentrancy) via a malicious callee.","recommendation":"Restrict these call paths with explicit access control and/or a strict allowlist of targets; limit or eliminate ETH value forwarding; apply checks-effects-interactions and consider a reentrancy guard around state changes that occur near these calls.","evidence":"BYTECODE_BUNDLE.json detector_findings report 4 CALL sites with computed targets and values; validation confirms target_varies and ETH value can be nonzero. No guards were detected by heuristics.","locations":["pc:0x890","pc:0x93c","pc:0x9d7","pc:0xa68"]}]}
View stderr
OpenAI Codex v0.77.0 (research preview)
--------
workdir: /tmp/codex-mr7ruvba
model: gpt-5.2-codex
provider: openai
approval: never
sandbox: read-only
reasoning effort: high
reasoning summaries: auto
session id: 019c0ec4-1ed8-7981-abf9-3baf65afde7b
--------
user
You are a security auditor. You ONLY have runtime bytecode + analysis artifacts.
You MUST read `BYTECODE_BUNDLE.json` before concluding; it contains the bytecode summary,
evidence bundle, callsites, storage slots, and detector findings.

Special cases when reasoning from bytecode (be explicit about uncertainty):
- Selector inference is best-effort; missing selectors are common.
- Fallback/receive paths may be the only entrypoints.
- CALL vs DELEGATECALL semantics differ; DELEGATECALL executes in caller storage.
- Proxy patterns (EIP-1967, minimal proxies, beacon) change which storage is authoritative.
- Storage slots are raw; mappings/arrays appear via keccak patterns, names are unknown.
- Guard detection is heuristic; absence of guards does NOT mean unguarded.
- Returndata checking is unknown unless explicitly shown in evidence.
- Precompiles (0x1..0x9) and common ERC20 transfer selectors may appear; do not over-claim.

Output MUST be valid JSON matching the provided schema.
- If you find nothing meaningful: set no_findings=true and findings=[].
- Otherwise: set no_findings=false and include findings with severity/category/title.
- Locations can be pc references like "pc:0x123" or selectors like "selector:0xa9059cbb".

Focus on: reentrancy, access control, upgradeability/proxy issues, signature validation,
accounting/invariant breaks, dangerous delegatecall, and untrusted external calls.
Be conservative: if evidence is weak, mark severity low/medium and explain why.
mcp startup: no servers
exec
/bin/bash -lc ls in /tmp/codex-mr7ruvba succeeded in 5ms:
BYTECODE_BUNDLE.json
codex-output-schema.json
exec
/bin/bash -lc 'cat BYTECODE_BUNDLE.json' in /tmp/codex-mr7ruvba succeeded in 11ms:
{
  "analysis_artifact": {
    "address": "0xda4fbd0ebe88877df05424c10274ad9315cee83a",
    "artifact_hash": "0x2f122f099f3c041209e0f5dee0d7bedb855da08da0f26684ca356619655c89e5",
    "artifact_json": {
      "auth": {
        "guards": []
      },
      "basic_blocks": [
        {
          "end_pc": 12,
          "hash": "0xd9d09b647fa9d9f98119efd59bcf326fb57c72fa65195d5c59cb481a6c81d003",
          "opcodes": [
            "PUSH1",
            "PUSH1",
            "MSTORE",
            "PUSH1",
            "CALLDATASIZE",
            "LT",
            "PUSH2",
exec
/bin/bash -lc 'rg -n "storage|slot|sstore|sload|proxy|eip-1967|delegatecall|beacon" BYTECODE_BUNDLE.json' in /tmp/codex-mr7ruvba succeeded in 17ms:
3655:            "delegatecall": 0,
3659:          "storage": {
3661:            "slots": [
3665:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000001"
3670:                "slot": "0x000000000000000000000000000000000000000000000000000000000000000f"
3675:                "slot": "0x000000000000000000000000000000000000000000000000000000000000000a"
3680:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000002"
3685:                "slot": "0x000000000000000000000000000000000000000000000000000000000000000c"
3690:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000000"
3695:                "slot": "0x000000000000000000000000000000000000000000000000000000000000000b"
3700:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000002"
3705:                "slot": "0x000000000000000000000000000000000000000000000000000000000000000f"
3710:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000003"
3715:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000004"
3720:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000005"
3725:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000006"
3730:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000007"
3735:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000008"
3740:                "slot": "0x0000000000000000000000000000000000000000000000000000000000000009"
3745:                "slot": "0x000000000000000000000000000000000000000000000000000000000000000a"
exec
/bin/bash -lc 'rg -n "proxy_evidence|is_proxy|upgrade_slot_write" -n -C 2 BYTECODE_BUNDLE.json' in /tmp/codex-mr7ruvba succeeded in 13ms:
6805-        "selfdestruct": 0,
6806-        "staticcall": 0,
6807:        "upgrade_slot_write_suspected": false
6808-      },
6809-      "storage": {
--
7053-      "optimizer_enabled": false,
7054-      "optimizer_runs": 0,
7055:      "proxy_evidence": {
7056-        "status": "not_proxy"
7057-      }
7058-    },
7059-    "implementation_address": null,
7060:    "is_proxy": false,
7061-    "runtime_bytecode": {
7062-      "full": "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",
codex
{"no_findings":false,"summary":"Bytecode-only review found low-level CALLs with computed targets and nonzero ETH value transfer; no delegatecall/proxy evidence. Access control around these paths is not confirmed (guard detection is heuristic).","findings":[{"severity":"medium","category":"other","title":"Untrusted low-level CALL with variable target/value (potential arbitrary external call/ETH transfer)","exploit_scenario":"If an untrusted caller can reach these CALL sites, they can supply a target and value to send ETH or trigger external code execution (including reentrancy) via a malicious callee.","recommendation":"Restrict these call paths with explicit access control and/or a strict allowlist of targets; limit or eliminate ETH value forwarding; apply checks-effects-interactions and consider a reentrancy guard around state changes that occur near these calls.","evidence":"BYTECODE_BUNDLE.json detector_findings report 4 CALL sites with computed targets and values; validation confirms target_varies and ETH value can be nonzero. No guards were detected by heuristics.","locations":["pc:0x890","pc:0x93c","pc:0x9d7","pc:0xa68"]}]}
tokens used
36,093
Metadata
{
    "codex": {
        "ran_at": "2026-01-30T11:59:00.090045+00:00",
        "returncode": 0
    },
    "project": {
        "mode": "bytecode",
        "bytecode_length": 6032,
        "bytecode_truncated": false,
        "capability_graph_present": true,
        "analysis_artifact_present": true
    },
    "summary": "Bytecode-only review found low-level CALLs with computed targets and nonzero ETH value transfer; no delegatecall/proxy evidence. Access control around these paths is not confirmed (guard detection is heuristic).",
    "raw_final": {
        "summary": "Bytecode-only review found low-level CALLs with computed targets and nonzero ETH value transfer; no delegatecall/proxy evidence. Access control around these paths is not confirmed (guard detection is heuristic).",
        "findings": [
            {
                "title": "Untrusted low-level CALL with variable target/value (potential arbitrary external call/ETH transfer)",
                "category": "other",
                "evidence": "BYTECODE_BUNDLE.json detector_findings report 4 CALL sites with computed targets and values; validation confirms target_varies and ETH value can be nonzero. No guards were detected by heuristics.",
                "severity": "medium",
                "locations": [
                    "pc:0x890",
                    "pc:0x93c",
                    "pc:0x9d7",
                    "pc:0xa68"
                ],
                "recommendation": "Restrict these call paths with explicit access control and/or a strict allowlist of targets; limit or eliminate ETH value forwarding; apply checks-effects-interactions and consider a reentrancy guard around state changes that occur near these calls.",
                "exploit_scenario": "If an untrusted caller can reach these CALL sites, they can supply a target and value to send ETH or trigger external code execution (including reentrancy) via a malicious callee."
            }
        ],
        "no_findings": false
    },
    "no_findings": false,
    "schema_version": 1
}

Opcode Heuristics

tool.cast_disasm
Delegatecall
0
Selfdestruct
0
CREATE2
0
CALL-family (heavy)
4
EXT*/BALANCE
4
Total opcodes
1925
Flags
No heuristic flags raised.
View cast disassembly output
00000000: PUSH1 0x80
00000002: PUSH1 0x40
00000004: MSTORE
00000005: PUSH1 0x04
00000007: CALLDATASIZE
00000008: LT
00000009: PUSH2 0x00cf
0000000c: JUMPI
0000000d: PUSH4 0xffffffff
00000012: PUSH29 0x0100000000000000000000000000000000000000000000000000000000
00000030: PUSH1 0x00
00000032: CALLDATALOAD
00000033: DIV
00000034: AND
00000035: PUSH4 0x13af4035
0000003a: DUP2
0000003b: EQ
0000003c: PUSH2 0x00d4
0000003f: JUMPI
00000040: DUP1
00000041: PUSH4 0x158ef93e
00000046: EQ
00000047: PUSH2 0x00f7
0000004a: JUMPI
0000004b: DUP1
0000004c: PUSH4 0x20531bc9
00000051: EQ
00000052: PUSH2 0x0120
00000055: JUMPI
00000056: DUP1
00000057: PUSH4 0x365a86fc
0000005c: EQ
0000005d: PUSH2 0x0151
00000060: JUMPI
00000061: DUP1
00000062: PUSH4 0x54fd4d50
00000067: EQ
00000068: PUSH2 0x0166
0000006b: JUMPI
0000006c: DUP1
0000006d: PUSH4 0x7a9e5e4b
00000072: EQ
00000073: PUSH2 0x017b
00000076: JUMPI
00000077: DUP1
00000078: PUSH4 0x7b103999
0000007d: EQ
0000007e: PUSH2 0x019c
00000081: JUMPI
00000082: DUP1
00000083: PUSH4 0x83259ed9
00000088: EQ
00000089: PUSH2 0x01b1
0000008c: JUMPI
0000008d: DUP1
0000008e: PUSH4 0x8a471df9
00000093: EQ
00000094: PUSH2 0x01c8
00000097: JUMPI
00000098: DUP1
00000099: PUSH4 0x8da5cb5b
0000009e: EQ
0000009f: PUSH2 0x01dd
000000a2: JUMPI
000000a3: DUP1
000000a4: PUSH4 0xb1ffd471
000000a9: EQ
000000aa: PUSH2 0x01f2
000000ad: JUMPI
000000ae: DUP1
000000af: PUSH4 0xbf7e214f
000000b4: EQ
000000b5: PUSH2 0x027c
000000b8: JUMPI
000000b9: DUP1
000000ba: PUSH4 0xc9d4623f
000000bf: EQ
000000c0: PUSH2 0x0291
000000c3: JUMPI
000000c4: DUP1
000000c5: PUSH4 0xf3fef3a3
000000ca: EQ
000000cb: PUSH2 0x02a6
000000ce: JUMPI
000000cf: JUMPDEST
000000d0: PUSH1 0x00
000000d2: DUP1
000000d3: REVERT
000000d4: JUMPDEST
000000d5: CALLVALUE
000000d6: DUP1
000000d7: ISZERO
000000d8: PUSH2 0x00e0
000000db: JUMPI
000000dc: PUSH1 0x00
000000de: DUP1
000000df: REVERT
000000e0: JUMPDEST
000000e1: POP
000000e2: PUSH2 0x00f5
000000e5: PUSH1 0x01
000000e7: PUSH1 0xa0
000000e9: PUSH1 0x02
000000eb: EXP
000000ec: SUB
000000ed: PUSH1 0x04
000000ef: CALLDATALOAD
000000f0: AND
000000f1: PUSH2 0x02ca
000000f4: JUMP
000000f5: JUMPDEST
000000f6: STOP
000000f7: JUMPDEST
000000f8: CALLVALUE
000000f9: DUP1
000000fa: ISZERO
000000fb: PUSH2 0x0103
000000fe: JUMPI
000000ff: PUSH1 0x00
00000101: DUP1
00000102: REVERT
00000103: JUMPDEST
00000104: POP
00000105: PUSH2 0x010c
00000108: PUSH2 0x0381
0000010b: JUMP
0000010c: JUMPDEST
0000010d: PUSH1 0x40
0000010f: DUP1
00000110: MLOAD
00000111: SWAP2
00000112: ISZERO
00000113: ISZERO
00000114: DUP3
00000115: MSTORE
00000116: MLOAD
00000117: SWAP1
00000118: DUP2
00000119: SWAP1
0000011a: SUB
0000011b: PUSH1 0x20
0000011d: ADD
0000011e: SWAP1
0000011f: RETURN
00000120: JUMPDEST
00000121: CALLVALUE
00000122: DUP1
00000123: ISZERO
00000124: PUSH2 0x012c
00000127: JUMPI
00000128: PUSH1 0x00
0000012a: DUP1
0000012b: REVERT
0000012c: JUMPDEST
0000012d: POP
0000012e: PUSH2 0x0135
00000131: PUSH2 0x038a
00000134: JUMP
00000135: JUMPDEST
00000136: PUSH1 0x40
00000138: DUP1
00000139: MLOAD
0000013a: PUSH1 0x01
0000013c: PUSH1 0xa0
0000013e: PUSH1 0x02
00000140: EXP
00000141: SUB
00000142: SWAP1
00000143: SWAP3
00000144: AND
00000145: DUP3
00000146: MSTORE
00000147: MLOAD
00000148: SWAP1
00000149: DUP2
0000014a: SWAP1
0000014b: SUB
0000014c: PUSH1 0x20
0000014e: ADD
0000014f: SWAP1
00000150: RETURN
00000151: JUMPDEST
00000152: CALLVALUE
00000153: DUP1
00000154: ISZERO
00000155: PUSH2 0x015d
00000158: JUMPI
00000159: PUSH1 0x00
0000015b: DUP1
0000015c: REVERT
0000015d: JUMPDEST
0000015e: POP
0000015f: PUSH2 0x0135
00000162: PUSH2 0x0399
00000165: JUMP
00000166: JUMPDEST
00000167: CALLVALUE
00000168: DUP1
00000169: ISZERO
0000016a: PUSH2 0x0172
0000016d: JUMPI
0000016e: PUSH1 0x00
00000170: DUP1
00000171: REVERT
00000172: JUMPDEST
00000173: POP
00000174: PUSH2 0x0135
00000177: PUSH2 0x03a8
0000017a: JUMP
0000017b: JUMPDEST
0000017c: CALLVALUE
0000017d: DUP1
0000017e: ISZERO
0000017f: PUSH2 0x0187
00000182: JUMPI
00000183: PUSH1 0x00
00000185: DUP1
00000186: REVERT
00000187: JUMPDEST
00000188: POP
00000189: PUSH2 0x00f5
0000018c: PUSH1 0x01
0000018e: PUSH1 0xa0
00000190: PUSH1 0x02
00000192: EXP
00000193: SUB
00000194: PUSH1 0x04
00000196: CALLDATALOAD
00000197: AND
00000198: PUSH2 0x03b7
0000019b: JUMP
0000019c: JUMPDEST
0000019d: CALLVALUE
0000019e: DUP1
0000019f: ISZERO
000001a0: PUSH2 0x01a8
000001a3: JUMPI
000001a4: PUSH1 0x00
000001a6: DUP1
000001a7: REVERT
000001a8: JUMPDEST
000001a9: POP
000001aa: PUSH2 0x0135
000001ad: PUSH2 0x046a
000001b0: JUMP
000001b1: JUMPDEST
000001b2: CALLVALUE
000001b3: DUP1
000001b4: ISZERO
000001b5: PUSH2 0x01bd
000001b8: JUMPI
000001b9: PUSH1 0x00
000001bb: DUP1
000001bc: REVERT
000001bd: JUMPDEST
000001be: POP
000001bf: PUSH2 0x00f5
000001c2: PUSH1 0x04
000001c4: PUSH2 0x0479
000001c7: JUMP
000001c8: JUMPDEST
000001c9: CALLVALUE
000001ca: DUP1
000001cb: ISZERO
000001cc: PUSH2 0x01d4
000001cf: JUMPI
000001d0: PUSH1 0x00
000001d2: DUP1
000001d3: REVERT
000001d4: JUMPDEST
000001d5: POP
000001d6: PUSH2 0x0135
000001d9: PUSH2 0x06b8
000001dc: JUMP
000001dd: JUMPDEST
000001de: CALLVALUE
000001df: DUP1
000001e0: ISZERO
000001e1: PUSH2 0x01e9
000001e4: JUMPI
000001e5: PUSH1 0x00
000001e7: DUP1
000001e8: REVERT
000001e9: JUMPDEST
000001ea: POP
000001eb: PUSH2 0x0135
000001ee: PUSH2 0x06c7
000001f1: JUMP
000001f2: JUMPDEST
000001f3: CALLVALUE
000001f4: DUP1
000001f5: ISZERO
000001f6: PUSH2 0x01fe
000001f9: JUMPI
000001fa: PUSH1 0x00
000001fc: DUP1
000001fd: REVERT
000001fe: JUMPDEST
000001ff: POP
00000200: PUSH2 0x0207
00000203: PUSH2 0x06d6
00000206: JUMP
00000207: JUMPDEST
00000208: PUSH1 0x40
0000020a: DUP1
0000020b: MLOAD
0000020c: PUSH1 0x01
0000020e: PUSH1 0xa0
00000210: PUSH1 0x02
00000212: EXP
00000213: SUB
00000214: SWAP14
00000215: DUP15
00000216: AND
00000217: DUP2
00000218: MSTORE
00000219: SWAP12
0000021a: DUP14
0000021b: AND
0000021c: PUSH1 0x20
0000021e: DUP14
0000021f: ADD
00000220: MSTORE
00000221: SWAP10
00000222: DUP13
00000223: AND
00000224: DUP12
00000225: DUP12
00000226: ADD
00000227: MSTORE
00000228: SWAP8
00000229: DUP12
0000022a: AND
0000022b: PUSH1 0x60
0000022d: DUP12
0000022e: ADD
0000022f: MSTORE
00000230: SWAP6
00000231: DUP11
00000232: AND
00000233: PUSH1 0x80
00000235: DUP11
00000236: ADD
00000237: MSTORE
00000238: SWAP4
00000239: DUP10
0000023a: AND
0000023b: PUSH1 0xa0
0000023d: DUP10
0000023e: ADD
0000023f: MSTORE
00000240: SWAP2
00000241: DUP9
00000242: AND
00000243: PUSH1 0xc0
00000245: DUP9
00000246: ADD
00000247: MSTORE
00000248: DUP8
00000249: AND
0000024a: PUSH1 0xe0
0000024c: DUP8
0000024d: ADD
0000024e: MSTORE
0000024f: DUP7
00000250: AND
00000251: PUSH2 0x0100
00000254: DUP7
00000255: ADD
00000256: MSTORE
00000257: DUP6
00000258: AND
00000259: PUSH2 0x0120
0000025c: DUP6
0000025d: ADD
0000025e: MSTORE
0000025f: DUP5
00000260: AND
00000261: PUSH2 0x0140
00000264: DUP5
00000265: ADD
00000266: MSTORE
00000267: SWAP1
00000268: SWAP3
00000269: AND
0000026a: PUSH2 0x0160
0000026d: DUP3
0000026e: ADD
0000026f: MSTORE
00000270: SWAP1
00000271: MLOAD
00000272: SWAP1
00000273: DUP2
00000274: SWAP1
00000275: SUB
00000276: PUSH2 0x0180
00000279: ADD
0000027a: SWAP1
0000027b: RETURN
0000027c: JUMPDEST
0000027d: CALLVALUE
0000027e: DUP1
0000027f: ISZERO
00000280: PUSH2 0x0288
00000283: JUMPI
00000284: PUSH1 0x00
00000286: DUP1
00000287: REVERT
00000288: JUMPDEST
00000289: POP
0000028a: PUSH2 0x0135
0000028d: PUSH2 0x0732
00000290: JUMP
00000291: JUMPDEST
00000292: CALLVALUE
00000293: DUP1
00000294: ISZERO
00000295: PUSH2 0x029d
00000298: JUMPI
00000299: PUSH1 0x00
0000029b: DUP1
0000029c: REVERT
0000029d: JUMPDEST
0000029e: POP
0000029f: PUSH2 0x0135
000002a2: PUSH2 0x0741
000002a5: JUMP
000002a6: JUMPDEST
000002a7: CALLVALUE
000002a8: DUP1
000002a9: ISZERO
000002aa: PUSH2 0x02b2
000002ad: JUMPI
000002ae: PUSH1 0x00
000002b0: DUP1
000002b1: REVERT
000002b2: JUMPDEST
000002b3: POP
000002b4: PUSH2 0x00f5
000002b7: PUSH1 0x01
000002b9: PUSH1 0xa0
000002bb: PUSH1 0x02
000002bd: EXP
000002be: SUB
000002bf: PUSH1 0x04
000002c1: CALLDATALOAD
000002c2: AND
000002c3: PUSH1 0x24
000002c5: CALLDATALOAD
000002c6: PUSH2 0x0750
000002c9: JUMP
000002ca: JUMPDEST
000002cb: PUSH2 0x02e0
000002ce: CALLER
000002cf: PUSH1 0x00
000002d1: CALLDATALOAD
000002d2: PUSH1 0x01
000002d4: PUSH1 0xe0
000002d6: PUSH1 0x02
000002d8: EXP
000002d9: SUB
000002da: NOT
000002db: AND
000002dc: PUSH2 0x07b9
000002df: JUMP
000002e0: JUMPDEST
000002e1: ISZERO
000002e2: ISZERO
000002e3: PUSH2 0x0324
000002e6: JUMPI
000002e7: PUSH1 0x40
000002e9: DUP1
000002ea: MLOAD
000002eb: PUSH1 0xe5
000002ed: PUSH1 0x02
000002ef: EXP
000002f0: PUSH3 0x461bcd
000002f4: MUL
000002f5: DUP2
000002f6: MSTORE
000002f7: PUSH1 0x20
000002f9: PUSH1 0x04
000002fb: DUP3
000002fc: ADD
000002fd: MSTORE
000002fe: PUSH1 0x14
00000300: PUSH1 0x24
00000302: DUP3
00000303: ADD
00000304: MSTORE
00000305: PUSH1 0x00
00000307: DUP1
00000308: MLOAD
00000309: PUSH1 0x20
0000030b: PUSH2 0x0b7c
0000030e: DUP4
0000030f: CODECOPY
00000310: DUP2
00000311: MLOAD
00000312: SWAP2
00000313: MSTORE
00000314: PUSH1 0x44
00000316: DUP3
00000317: ADD
00000318: MSTORE
00000319: SWAP1
0000031a: MLOAD
0000031b: SWAP1
0000031c: DUP2
0000031d: SWAP1
0000031e: SUB
0000031f: PUSH1 0x64
00000321: ADD
00000322: SWAP1
00000323: REVERT
00000324: JUMPDEST
00000325: PUSH1 0x01
00000327: DUP1
00000328: SLOAD
00000329: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000033e: NOT
0000033f: AND
00000340: PUSH1 0x01
00000342: PUSH1 0xa0
00000344: PUSH1 0x02
00000346: EXP
00000347: SUB
00000348: DUP4
00000349: DUP2
0000034a: AND
0000034b: SWAP2
0000034c: SWAP1
0000034d: SWAP2
0000034e: OR
0000034f: SWAP2
00000350: DUP3
00000351: SWAP1
00000352: SSTORE
00000353: PUSH1 0x40
00000355: MLOAD
00000356: SWAP2
00000357: AND
00000358: SWAP1
00000359: PUSH32 0xce241d7ca1f669fee44b6fc00b8eba2df3bb514eed0f6f668f8f89096e81ed94
0000037a: SWAP1
0000037b: PUSH1 0x00
0000037d: SWAP1
0000037e: LOG2
0000037f: POP
00000380: JUMP
00000381: JUMPDEST
00000382: PUSH1 0x0f
00000384: SLOAD
00000385: PUSH1 0xff
00000387: AND
00000388: DUP2
00000389: JUMP
0000038a: JUMPDEST
0000038b: PUSH1 0x0a
0000038d: SLOAD
0000038e: PUSH1 0x01
00000390: PUSH1 0xa0
00000392: PUSH1 0x02
00000394: EXP
00000395: SUB
00000396: AND
00000397: SWAP1
00000398: JUMP
00000399: JUMPDEST
0000039a: PUSH1 0x02
0000039c: SLOAD
0000039d: PUSH1 0x01
0000039f: PUSH1 0xa0
000003a1: PUSH1 0x02
000003a3: EXP
000003a4: SUB
000003a5: AND
000003a6: DUP2
000003a7: JUMP
000003a8: JUMPDEST
000003a9: PUSH1 0x0c
000003ab: SLOAD
000003ac: PUSH1 0x01
000003ae: PUSH1 0xa0
000003b0: PUSH1 0x02
000003b2: EXP
000003b3: SUB
000003b4: AND
000003b5: SWAP1
000003b6: JUMP
000003b7: JUMPDEST
000003b8: PUSH2 0x03cd
000003bb: CALLER
000003bc: PUSH1 0x00
000003be: CALLDATALOAD
000003bf: PUSH1 0x01
000003c1: PUSH1 0xe0
000003c3: PUSH1 0x02
000003c5: EXP
000003c6: SUB
000003c7: NOT
000003c8: AND
000003c9: PUSH2 0x07b9
000003cc: JUMP
000003cd: JUMPDEST
000003ce: ISZERO
000003cf: ISZERO
000003d0: PUSH2 0x0411
000003d3: JUMPI
000003d4: PUSH1 0x40
000003d6: DUP1
000003d7: MLOAD
000003d8: PUSH1 0xe5
000003da: PUSH1 0x02
000003dc: EXP
000003dd: PUSH3 0x461bcd
000003e1: MUL
000003e2: DUP2
000003e3: MSTORE
000003e4: PUSH1 0x20
000003e6: PUSH1 0x04
000003e8: DUP3
000003e9: ADD
000003ea: MSTORE
000003eb: PUSH1 0x14
000003ed: PUSH1 0x24
000003ef: DUP3
000003f0: ADD
000003f1: MSTORE
000003f2: PUSH1 0x00
000003f4: DUP1
000003f5: MLOAD
000003f6: PUSH1 0x20
000003f8: PUSH2 0x0b7c
000003fb: DUP4
000003fc: CODECOPY
000003fd: DUP2
000003fe: MLOAD
000003ff: SWAP2
00000400: MSTORE
00000401: PUSH1 0x44
00000403: DUP3
00000404: ADD
00000405: MSTORE
00000406: SWAP1
00000407: MLOAD
00000408: SWAP1
00000409: DUP2
0000040a: SWAP1
0000040b: SUB
0000040c: PUSH1 0x64
0000040e: ADD
0000040f: SWAP1
00000410: REVERT
00000411: JUMPDEST
00000412: PUSH1 0x00
00000414: DUP1
00000415: SLOAD
00000416: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000042b: NOT
0000042c: AND
0000042d: PUSH1 0x01
0000042f: PUSH1 0xa0
00000431: PUSH1 0x02
00000433: EXP
00000434: SUB
00000435: DUP4
00000436: DUP2
00000437: AND
00000438: SWAP2
00000439: SWAP1
0000043a: SWAP2
0000043b: OR
0000043c: DUP1
0000043d: DUP4
0000043e: SSTORE
0000043f: PUSH1 0x40
00000441: MLOAD
00000442: SWAP2
00000443: AND
00000444: SWAP2
00000445: PUSH32 0x1abebea81bfa2637f28358c371278fb15ede7ea8dd28d2e03b112ff6d936ada4
00000466: SWAP2
00000467: LOG2
00000468: POP
00000469: JUMP
0000046a: JUMPDEST
0000046b: PUSH1 0x0b
0000046d: SLOAD
0000046e: PUSH1 0x01
00000470: PUSH1 0xa0
00000472: PUSH1 0x02
00000474: EXP
00000475: SUB
00000476: AND
00000477: SWAP1
00000478: JUMP
00000479: JUMPDEST
0000047a: PUSH2 0x048f
0000047d: CALLER
0000047e: PUSH1 0x00
00000480: CALLDATALOAD
00000481: PUSH1 0x01
00000483: PUSH1 0xe0
00000485: PUSH1 0x02
00000487: EXP
00000488: SUB
00000489: NOT
0000048a: AND
0000048b: PUSH2 0x07b9
0000048e: JUMP
0000048f: JUMPDEST
00000490: ISZERO
00000491: ISZERO
00000492: PUSH2 0x04d3
00000495: JUMPI
00000496: PUSH1 0x40
00000498: DUP1
00000499: MLOAD
0000049a: PUSH1 0xe5
0000049c: PUSH1 0x02
0000049e: EXP
0000049f: PUSH3 0x461bcd
000004a3: MUL
000004a4: DUP2
000004a5: MSTORE
000004a6: PUSH1 0x20
000004a8: PUSH1 0x04
000004aa: DUP3
000004ab: ADD
000004ac: MSTORE
000004ad: PUSH1 0x14
000004af: PUSH1 0x24
000004b1: DUP3
000004b2: ADD
000004b3: MSTORE
000004b4: PUSH1 0x00
000004b6: DUP1
000004b7: MLOAD
000004b8: PUSH1 0x20
000004ba: PUSH2 0x0b7c
000004bd: DUP4
000004be: CODECOPY
000004bf: DUP2
000004c0: MLOAD
000004c1: SWAP2
000004c2: MSTORE
000004c3: PUSH1 0x44
000004c5: DUP3
000004c6: ADD
000004c7: MSTORE
000004c8: SWAP1
000004c9: MLOAD
000004ca: SWAP1
000004cb: DUP2
000004cc: SWAP1
000004cd: SUB
000004ce: PUSH1 0x64
000004d0: ADD
000004d1: SWAP1
000004d2: REVERT
000004d3: JUMPDEST
000004d4: PUSH1 0x02
000004d6: SLOAD
000004d7: PUSH1 0x01
000004d9: PUSH1 0xa0
000004db: PUSH1 0x02
000004dd: EXP
000004de: SUB
000004df: AND
000004e0: CALLER
000004e1: EQ
000004e2: PUSH2 0x04ea
000004e5: JUMPI
000004e6: PUSH1 0x00
000004e8: DUP1
000004e9: REVERT
000004ea: JUMPDEST
000004eb: PUSH1 0x0f
000004ed: SLOAD
000004ee: PUSH1 0xff
000004f0: AND
000004f1: ISZERO
000004f2: PUSH2 0x0545
000004f5: JUMPI
000004f6: PUSH1 0x40
000004f8: DUP1
000004f9: MLOAD
000004fa: PUSH1 0xe5
000004fc: PUSH1 0x02
000004fe: EXP
000004ff: PUSH3 0x461bcd
00000503: MUL
00000504: DUP2
00000505: MSTORE
00000506: PUSH1 0x20
00000508: PUSH1 0x04
0000050a: DUP3
0000050b: ADD
0000050c: MSTORE
0000050d: PUSH1 0x13
0000050f: PUSH1 0x24
00000511: DUP3
00000512: ADD
00000513: MSTORE
00000514: PUSH32 0x416c726561647920696e697469616c697a656400000000000000000000000000
00000535: PUSH1 0x44
00000537: DUP3
00000538: ADD
00000539: MSTORE
0000053a: SWAP1
0000053b: MLOAD
0000053c: SWAP1
0000053d: DUP2
0000053e: SWAP1
0000053f: SUB
00000540: PUSH1 0x64
00000542: ADD
00000543: SWAP1
00000544: REVERT
00000545: JUMPDEST
00000546: PUSH1 0x40
00000548: DUP1
00000549: MLOAD
0000054a: PUSH2 0x0180
0000054d: DUP2
0000054e: ADD
0000054f: DUP3
00000550: MSTORE
00000551: PUSH1 0x01
00000553: PUSH1 0xa0
00000555: PUSH1 0x02
00000557: EXP
00000558: SUB
00000559: DUP4
0000055a: CALLDATALOAD
0000055b: DUP2
0000055c: AND
0000055d: DUP1
0000055e: DUP4
0000055f: MSTORE
00000560: PUSH1 0x20
00000562: DUP1
00000563: DUP7
00000564: ADD
00000565: CALLDATALOAD
00000566: DUP4
00000567: AND
00000568: SWAP1
00000569: DUP5
0000056a: ADD
0000056b: DUP2
0000056c: SWAP1
0000056d: MSTORE
0000056e: DUP6
0000056f: DUP6
00000570: ADD
00000571: CALLDATALOAD
00000572: DUP4
00000573: AND
00000574: SWAP5
00000575: DUP5
00000576: ADD
00000577: DUP6
00000578: SWAP1
00000579: MSTORE
0000057a: PUSH1 0x60
0000057c: DUP1
0000057d: DUP8
0000057e: ADD
0000057f: CALLDATALOAD
00000580: DUP5
00000581: AND
00000582: SWAP1
00000583: DUP6
00000584: ADD
00000585: DUP2
00000586: SWAP1
00000587: MSTORE
00000588: PUSH1 0x80
0000058a: DUP1
0000058b: DUP9
0000058c: ADD
0000058d: CALLDATALOAD
0000058e: DUP6
0000058f: AND
00000590: SWAP1
00000591: DUP7
00000592: ADD
00000593: DUP2
00000594: SWAP1
00000595: MSTORE
00000596: PUSH1 0xa0
00000598: DUP1
00000599: DUP10
0000059a: ADD
0000059b: CALLDATALOAD
0000059c: DUP7
0000059d: AND
0000059e: SWAP1
0000059f: DUP8
000005a0: ADD
000005a1: DUP2
000005a2: SWAP1
000005a3: MSTORE
000005a4: PUSH1 0xc0
000005a6: DUP1
000005a7: DUP11
000005a8: ADD
000005a9: CALLDATALOAD
000005aa: DUP8
000005ab: AND
000005ac: SWAP1
000005ad: DUP9
000005ae: ADD
000005af: DUP2
000005b0: SWAP1
000005b1: MSTORE
000005b2: PUSH1 0xe0
000005b4: DUP1
000005b5: DUP12
000005b6: ADD
000005b7: CALLDATALOAD
000005b8: DUP9
000005b9: AND
000005ba: SWAP1
000005bb: DUP10
000005bc: ADD
000005bd: DUP2
000005be: SWAP1
000005bf: MSTORE
000005c0: PUSH2 0x0100
000005c3: DUP1
000005c4: DUP13
000005c5: ADD
000005c6: CALLDATALOAD
000005c7: DUP10
000005c8: AND
000005c9: SWAP1
000005ca: DUP11
000005cb: ADD
000005cc: DUP2
000005cd: SWAP1
000005ce: MSTORE
000005cf: PUSH2 0x0120
000005d2: DUP1
000005d3: DUP14
000005d4: ADD
000005d5: CALLDATALOAD
000005d6: DUP11
000005d7: AND
000005d8: SWAP1
000005d9: DUP12
000005da: ADD
000005db: DUP2
000005dc: SWAP1
000005dd: MSTORE
000005de: PUSH2 0x0140
000005e1: DUP1
000005e2: DUP15
000005e3: ADD
000005e4: CALLDATALOAD
000005e5: DUP12
000005e6: AND
000005e7: SWAP1
000005e8: DUP13
000005e9: ADD
000005ea: DUP2
000005eb: SWAP1
000005ec: MSTORE
000005ed: PUSH2 0x0160
000005f0: DUP1
000005f1: DUP16
000005f2: ADD
000005f3: CALLDATALOAD
000005f4: SWAP1
000005f5: SWAP12
000005f6: AND
000005f7: SWAP11
000005f8: SWAP1
000005f9: SWAP12
000005fa: ADD
000005fb: DUP11
000005fc: SWAP1
000005fd: MSTORE
000005fe: PUSH1 0x03
00000600: DUP1
00000601: SLOAD
00000602: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000617: NOT
00000618: SWAP1
00000619: DUP2
0000061a: AND
0000061b: SWAP1
0000061c: SWAP11
0000061d: OR
0000061e: SWAP1
0000061f: SSTORE
00000620: PUSH1 0x04
00000622: DUP1
00000623: SLOAD
00000624: DUP11
00000625: AND
00000626: SWAP1
00000627: SWAP9
00000628: OR
00000629: SWAP1
0000062a: SWAP8
0000062b: SSTORE
0000062c: PUSH1 0x05
0000062e: DUP1
0000062f: SLOAD
00000630: DUP10
00000631: AND
00000632: SWAP1
00000633: SWAP12
00000634: OR
00000635: SWAP1
00000636: SWAP11
00000637: SSTORE
00000638: PUSH1 0x06
0000063a: DUP1
0000063b: SLOAD
0000063c: DUP9
0000063d: AND
0000063e: SWAP1
0000063f: SWAP6
00000640: OR
00000641: SWAP1
00000642: SWAP5
00000643: SSTORE
00000644: PUSH1 0x07
00000646: DUP1
00000647: SLOAD
00000648: DUP8
00000649: AND
0000064a: SWAP1
0000064b: SWAP4
0000064c: OR
0000064d: SWAP1
0000064e: SWAP3
0000064f: SSTORE
00000650: PUSH1 0x08
00000652: DUP1
00000653: SLOAD
00000654: DUP7
00000655: AND
00000656: SWAP1
00000657: SWAP2
00000658: OR
00000659: SWAP1
0000065a: SSTORE
0000065b: PUSH1 0x09
0000065d: DUP1
0000065e: SLOAD
0000065f: DUP6
00000660: AND
00000661: SWAP1
00000662: SWAP2
00000663: OR
00000664: SWAP1
00000665: SSTORE
00000666: PUSH1 0x0a
00000668: DUP1
00000669: SLOAD
0000066a: DUP5
0000066b: AND
0000066c: SWAP1
0000066d: SWAP2
0000066e: OR
0000066f: SWAP1
00000670: SSTORE
00000671: PUSH1 0x0b
00000673: DUP1
00000674: SLOAD
00000675: DUP4
00000676: AND
00000677: SWAP1
00000678: SWAP6
00000679: OR
0000067a: SWAP1
0000067b: SWAP5
0000067c: SSTORE
0000067d: PUSH1 0x0c
0000067f: DUP1
00000680: SLOAD
00000681: DUP3
00000682: AND
00000683: SWAP1
00000684: SWAP5
00000685: OR
00000686: SWAP1
00000687: SWAP4
00000688: SSTORE
00000689: PUSH1 0x0d
0000068b: DUP1
0000068c: SLOAD
0000068d: DUP5
0000068e: AND
0000068f: SWAP1
00000690: SWAP3
00000691: OR
00000692: SWAP1
00000693: SWAP2
00000694: SSTORE
00000695: PUSH1 0x0e
00000697: DUP1
00000698: SLOAD
00000699: SWAP1
0000069a: SWAP3
0000069b: AND
0000069c: OR
0000069d: SWAP1
0000069e: SSTORE
0000069f: PUSH1 0x0f
000006a1: DUP1
000006a2: SLOAD
000006a3: PUSH1 0xff
000006a5: NOT
000006a6: AND
000006a7: PUSH1 0x01
000006a9: OR
000006aa: SWAP1
000006ab: SSTORE
000006ac: PUSH2 0x06b5
000006af: PUSH1 0x00
000006b1: PUSH2 0x02ca
000006b4: JUMP
000006b5: JUMPDEST
000006b6: POP
000006b7: JUMP
000006b8: JUMPDEST
000006b9: PUSH1 0x0e
000006bb: SLOAD
000006bc: PUSH1 0x01
000006be: PUSH1 0xa0
000006c0: PUSH1 0x02
000006c2: EXP
000006c3: SUB
000006c4: AND
000006c5: SWAP1
000006c6: JUMP
000006c7: JUMPDEST
000006c8: PUSH1 0x01
000006ca: SLOAD
000006cb: PUSH1 0x01
000006cd: PUSH1 0xa0
000006cf: PUSH1 0x02
000006d1: EXP
000006d2: SUB
000006d3: AND
000006d4: DUP2
000006d5: JUMP
000006d6: JUMPDEST
000006d7: PUSH1 0x03
000006d9: SLOAD
000006da: PUSH1 0x04
000006dc: SLOAD
000006dd: PUSH1 0x05
000006df: SLOAD
000006e0: PUSH1 0x06
000006e2: SLOAD
000006e3: PUSH1 0x07
000006e5: SLOAD
000006e6: PUSH1 0x08
000006e8: SLOAD
000006e9: PUSH1 0x09
000006eb: SLOAD
000006ec: PUSH1 0x0a
000006ee: SLOAD
000006ef: PUSH1 0x0b
000006f1: SLOAD
000006f2: PUSH1 0x0c
000006f4: SLOAD
000006f5: PUSH1 0x0d
000006f7: SLOAD
000006f8: PUSH1 0x0e
000006fa: SLOAD
000006fb: PUSH1 0x01
000006fd: PUSH1 0xa0
000006ff: PUSH1 0x02
00000701: EXP
00000702: SUB
00000703: SWAP12
00000704: DUP13
00000705: AND
00000706: SWAP12
00000707: SWAP11
00000708: DUP12
00000709: AND
0000070a: SWAP11
0000070b: SWAP10
0000070c: DUP11
0000070d: AND
0000070e: SWAP10
0000070f: SWAP9
00000710: DUP10
00000711: AND
00000712: SWAP9
00000713: SWAP8
00000714: DUP9
00000715: AND
00000716: SWAP8
00000717: SWAP7
00000718: DUP8
00000719: AND
0000071a: SWAP7
0000071b: SWAP6
0000071c: DUP7
0000071d: AND
0000071e: SWAP6
0000071f: SWAP5
00000720: DUP6
00000721: AND
00000722: SWAP5
00000723: SWAP4
00000724: DUP5
00000725: AND
00000726: SWAP4
00000727: SWAP3
00000728: DUP4
00000729: AND
0000072a: SWAP3
0000072b: SWAP2
0000072c: DUP3
0000072d: AND
0000072e: SWAP2
0000072f: AND
00000730: DUP13
00000731: JUMP
00000732: JUMPDEST
00000733: PUSH1 0x00
00000735: SLOAD
00000736: PUSH1 0x01
00000738: PUSH1 0xa0
0000073a: PUSH1 0x02
0000073c: EXP
0000073d: SUB
0000073e: AND
0000073f: DUP2
00000740: JUMP
00000741: JUMPDEST
00000742: PUSH1 0x0d
00000744: SLOAD
00000745: PUSH1 0x01
00000747: PUSH1 0xa0
00000749: PUSH1 0x02
0000074b: EXP
0000074c: SUB
0000074d: AND
0000074e: SWAP1
0000074f: JUMP
00000750: JUMPDEST
00000751: PUSH2 0x0766
00000754: CALLER
00000755: PUSH1 0x00
00000757: CALLDATALOAD
00000758: PUSH1 0x01
0000075a: PUSH1 0xe0
0000075c: PUSH1 0x02
0000075e: EXP
0000075f: SUB
00000760: NOT
00000761: AND
00000762: PUSH2 0x07b9
00000765: JUMP
00000766: JUMPDEST
00000767: ISZERO
00000768: ISZERO
00000769: PUSH2 0x07aa
0000076c: JUMPI
0000076d: PUSH1 0x40
0000076f: DUP1
00000770: MLOAD
00000771: PUSH1 0xe5
00000773: PUSH1 0x02
00000775: EXP
00000776: PUSH3 0x461bcd
0000077a: MUL
0000077b: DUP2
0000077c: MSTORE
0000077d: PUSH1 0x20
0000077f: PUSH1 0x04
00000781: DUP3
00000782: ADD
00000783: MSTORE
00000784: PUSH1 0x14
00000786: PUSH1 0x24
00000788: DUP3
00000789: ADD
0000078a: MSTORE
0000078b: PUSH1 0x00
0000078d: DUP1
0000078e: MLOAD
0000078f: PUSH1 0x20
00000791: PUSH2 0x0b7c
00000794: DUP4
00000795: CODECOPY
00000796: DUP2
00000797: MLOAD
00000798: SWAP2
00000799: MSTORE
0000079a: PUSH1 0x44
0000079c: DUP3
0000079d: ADD
0000079e: MSTORE
0000079f: SWAP1
000007a0: MLOAD
000007a1: SWAP1
000007a2: DUP2
000007a3: SWAP1
000007a4: SUB
000007a5: PUSH1 0x64
000007a7: ADD
000007a8: SWAP1
000007a9: REVERT
000007aa: JUMPDEST
000007ab: PUSH2 0x07b5
000007ae: DUP3
000007af: CALLER
000007b0: DUP4
000007b1: PUSH2 0x08c2
000007b4: JUMP
000007b5: JUMPDEST
000007b6: POP
000007b7: POP
000007b8: JUMP
000007b9: JUMPDEST
000007ba: PUSH1 0x00
000007bc: PUSH1 0x01
000007be: PUSH1 0xa0
000007c0: PUSH1 0x02
000007c2: EXP
000007c3: SUB
000007c4: DUP4
000007c5: AND
000007c6: ADDRESS
000007c7: EQ
000007c8: ISZERO
000007c9: PUSH2 0x07d4
000007cc: JUMPI
000007cd: POP
000007ce: PUSH1 0x01
000007d0: PUSH2 0x08bc
000007d3: JUMP
000007d4: JUMPDEST
000007d5: PUSH1 0x01
000007d7: SLOAD
000007d8: PUSH1 0x01
000007da: PUSH1 0xa0
000007dc: PUSH1 0x02
000007de: EXP
000007df: SUB
000007e0: DUP5
000007e1: DUP2
000007e2: AND
000007e3: SWAP2
000007e4: AND
000007e5: EQ
000007e6: ISZERO
000007e7: PUSH2 0x07f2
000007ea: JUMPI
000007eb: POP
000007ec: PUSH1 0x01
000007ee: PUSH2 0x08bc
000007f1: JUMP
000007f2: JUMPDEST
000007f3: PUSH1 0x00
000007f5: SLOAD
000007f6: PUSH1 0x01
000007f8: PUSH1 0xa0
000007fa: PUSH1 0x02
000007fc: EXP
000007fd: SUB
000007fe: AND
000007ff: ISZERO
00000800: ISZERO
00000801: PUSH2 0x080c
00000804: JUMPI
00000805: POP
00000806: PUSH1 0x00
00000808: PUSH2 0x08bc
0000080b: JUMP
0000080c: JUMPDEST
0000080d: PUSH1 0x00
0000080f: DUP1
00000810: SLOAD
00000811: PUSH1 0x40
00000813: DUP1
00000814: MLOAD
00000815: PUSH32 0xb700961300000000000000000000000000000000000000000000000000000000
00000836: DUP2
00000837: MSTORE
00000838: PUSH1 0x01
0000083a: PUSH1 0xa0
0000083c: PUSH1 0x02
0000083e: EXP
0000083f: SUB
00000840: DUP8
00000841: DUP2
00000842: AND
00000843: PUSH1 0x04
00000845: DUP4
00000846: ADD
00000847: MSTORE
00000848: ADDRESS
00000849: PUSH1 0x24
0000084b: DUP4
0000084c: ADD
0000084d: MSTORE
0000084e: PUSH1 0x01
00000850: PUSH1 0xe0
00000852: PUSH1 0x02
00000854: EXP
00000855: SUB
00000856: NOT
00000857: DUP8
00000858: AND
00000859: PUSH1 0x44
0000085b: DUP4
0000085c: ADD
0000085d: MSTORE
0000085e: SWAP2
0000085f: MLOAD
00000860: SWAP2
00000861: SWAP1
00000862: SWAP3
00000863: AND
00000864: SWAP3
00000865: PUSH4 0xb7009613
0000086a: SWAP3
0000086b: PUSH1 0x64
0000086d: DUP1
0000086e: DUP3
0000086f: ADD
00000870: SWAP4
00000871: PUSH1 0x20
00000873: SWAP4
00000874: SWAP1
00000875: SWAP3
00000876: DUP4
00000877: SWAP1
00000878: SUB
00000879: SWAP1
0000087a: SWAP2
0000087b: ADD
0000087c: SWAP1
0000087d: DUP3
0000087e: SWAP1
0000087f: DUP8
00000880: DUP1
00000881: EXTCODESIZE
00000882: ISZERO
00000883: DUP1
00000884: ISZERO
00000885: PUSH2 0x088d
00000888: JUMPI
00000889: PUSH1 0x00
0000088b: DUP1
0000088c: REVERT
0000088d: JUMPDEST
0000088e: POP
0000088f: GAS
00000890: CALL
00000891: ISZERO
00000892: DUP1
00000893: ISZERO
00000894: PUSH2 0x08a1
00000897: JUMPI
00000898: RETURNDATASIZE
00000899: PUSH1 0x00
0000089b: DUP1
0000089c: RETURNDATACOPY
0000089d: RETURNDATASIZE
0000089e: PUSH1 0x00
000008a0: REVERT
000008a1: JUMPDEST
000008a2: POP
000008a3: POP
000008a4: POP
000008a5: POP
000008a6: PUSH1 0x40
000008a8: MLOAD
000008a9: RETURNDATASIZE
000008aa: PUSH1 0x20
000008ac: DUP2
000008ad: LT
000008ae: ISZERO
000008af: PUSH2 0x08b7
000008b2: JUMPI
000008b3: PUSH1 0x00
000008b5: DUP1
000008b6: REVERT
000008b7: JUMPDEST
000008b8: POP
000008b9: MLOAD
000008ba: SWAP1
000008bb: POP
000008bc: JUMPDEST
000008bd: SWAP3
000008be: SWAP2
000008bf: POP
000008c0: POP
000008c1: JUMP
000008c2: JUMPDEST
000008c3: PUSH1 0x00
000008c5: DUP1
000008c6: DUP5
000008c7: PUSH1 0x01
000008c9: PUSH1 0xa0
000008cb: PUSH1 0x02
000008cd: EXP
000008ce: SUB
000008cf: AND
000008d0: PUSH4 0x70a08231
000008d5: DUP6
000008d6: PUSH1 0x40
000008d8: MLOAD
000008d9: DUP3
000008da: PUSH4 0xffffffff
000008df: AND
000008e0: PUSH29 0x0100000000000000000000000000000000000000000000000000000000
000008fe: MUL
000008ff: DUP2
00000900: MSTORE
00000901: PUSH1 0x04
00000903: ADD
00000904: DUP1
00000905: DUP3
00000906: PUSH1 0x01
00000908: PUSH1 0xa0
0000090a: PUSH1 0x02
0000090c: EXP
0000090d: SUB
0000090e: AND
0000090f: PUSH1 0x01
00000911: PUSH1 0xa0
00000913: PUSH1 0x02
00000915: EXP
00000916: SUB
00000917: AND
00000918: DUP2
00000919: MSTORE
0000091a: PUSH1 0x20
0000091c: ADD
0000091d: SWAP2
0000091e: POP
0000091f: POP
00000920: PUSH1 0x20
00000922: PUSH1 0x40
00000924: MLOAD
00000925: DUP1
00000926: DUP4
00000927: SUB
00000928: DUP2
00000929: PUSH1 0x00
0000092b: DUP8
0000092c: DUP1
0000092d: EXTCODESIZE
0000092e: ISZERO
0000092f: DUP1
00000930: ISZERO
00000931: PUSH2 0x0939
00000934: JUMPI
00000935: PUSH1 0x00
00000937: DUP1
00000938: REVERT
00000939: JUMPDEST
0000093a: POP
0000093b: GAS
0000093c: CALL
0000093d: ISZERO
0000093e: DUP1
0000093f: ISZERO
00000940: PUSH2 0x094d
00000943: JUMPI
00000944: RETURNDATASIZE
00000945: PUSH1 0x00
00000947: DUP1
00000948: RETURNDATACOPY
00000949: RETURNDATASIZE
0000094a: PUSH1 0x00
0000094c: REVERT
0000094d: JUMPDEST
0000094e: POP
0000094f: POP
00000950: POP
00000951: POP
00000952: PUSH1 0x40
00000954: MLOAD
00000955: RETURNDATASIZE
00000956: PUSH1 0x20
00000958: DUP2
00000959: LT
0000095a: ISZERO
0000095b: PUSH2 0x0963
0000095e: JUMPI
0000095f: PUSH1 0x00
00000961: DUP1
00000962: REVERT
00000963: JUMPDEST
00000964: POP
00000965: MLOAD
00000966: PUSH1 0x40
00000968: DUP1
00000969: MLOAD
0000096a: PUSH32 0xa9059cbb00000000000000000000000000000000000000000000000000000000
0000098b: DUP2
0000098c: MSTORE
0000098d: PUSH1 0x01
0000098f: PUSH1 0xa0
00000991: PUSH1 0x02
00000993: EXP
00000994: SUB
00000995: DUP8
00000996: DUP2
00000997: AND
00000998: PUSH1 0x04
0000099a: DUP4
0000099b: ADD
0000099c: MSTORE
0000099d: PUSH1 0x24
0000099f: DUP3
000009a0: ADD
000009a1: DUP8
000009a2: SWAP1
000009a3: MSTORE
000009a4: SWAP2
000009a5: MLOAD
000009a6: SWAP3
000009a7: SWAP5
000009a8: POP
000009a9: SWAP1
000009aa: DUP8
000009ab: AND
000009ac: SWAP2
000009ad: PUSH4 0xa9059cbb
000009b2: SWAP2
000009b3: PUSH1 0x44
000009b5: DUP1
000009b6: DUP3
000009b7: ADD
000009b8: SWAP3
000009b9: PUSH1 0x20
000009bb: SWAP3
000009bc: SWAP1
000009bd: SWAP2
000009be: SWAP1
000009bf: DUP3
000009c0: SWAP1
000009c1: SUB
000009c2: ADD
000009c3: DUP2
000009c4: PUSH1 0x00
000009c6: DUP8
000009c7: DUP1
000009c8: EXTCODESIZE
000009c9: ISZERO
000009ca: DUP1
000009cb: ISZERO
000009cc: PUSH2 0x09d4
000009cf: JUMPI
000009d0: PUSH1 0x00
000009d2: DUP1
000009d3: REVERT
000009d4: JUMPDEST
000009d5: POP
000009d6: GAS
000009d7: CALL
000009d8: ISZERO
000009d9: DUP1
000009da: ISZERO
000009db: PUSH2 0x09e8
000009de: JUMPI
000009df: RETURNDATASIZE
000009e0: PUSH1 0x00
000009e2: DUP1
000009e3: RETURNDATACOPY
000009e4: RETURNDATASIZE
000009e5: PUSH1 0x00
000009e7: REVERT
000009e8: JUMPDEST
000009e9: POP
000009ea: POP
000009eb: POP
000009ec: POP
000009ed: PUSH1 0x40
000009ef: MLOAD
000009f0: RETURNDATASIZE
000009f1: PUSH1 0x20
000009f3: DUP2
000009f4: LT
000009f5: ISZERO
000009f6: PUSH2 0x09fe
000009f9: JUMPI
000009fa: PUSH1 0x00
000009fc: DUP1
000009fd: REVERT
000009fe: JUMPDEST
000009ff: POP
00000a00: POP
00000a01: PUSH1 0x40
00000a03: DUP1
00000a04: MLOAD
00000a05: PUSH32 0x70a0823100000000000000000000000000000000000000000000000000000000
00000a26: DUP2
00000a27: MSTORE
00000a28: PUSH1 0x01
00000a2a: PUSH1 0xa0
00000a2c: PUSH1 0x02
00000a2e: EXP
00000a2f: SUB
00000a30: DUP7
00000a31: DUP2
00000a32: AND
00000a33: PUSH1 0x04
00000a35: DUP4
00000a36: ADD
00000a37: MSTORE
00000a38: SWAP2
00000a39: MLOAD
00000a3a: SWAP2
00000a3b: DUP8
00000a3c: AND
00000a3d: SWAP2
00000a3e: PUSH4 0x70a08231
00000a43: SWAP2
00000a44: PUSH1 0x24
00000a46: DUP1
00000a47: DUP3
00000a48: ADD
00000a49: SWAP3
00000a4a: PUSH1 0x20
00000a4c: SWAP3
00000a4d: SWAP1
00000a4e: SWAP2
00000a4f: SWAP1
00000a50: DUP3
00000a51: SWAP1
00000a52: SUB
00000a53: ADD
00000a54: DUP2
00000a55: PUSH1 0x00
00000a57: DUP8
00000a58: DUP1
00000a59: EXTCODESIZE
00000a5a: ISZERO
00000a5b: DUP1
00000a5c: ISZERO
00000a5d: PUSH2 0x0a65
00000a60: JUMPI
00000a61: PUSH1 0x00
00000a63: DUP1
00000a64: REVERT
00000a65: JUMPDEST
00000a66: POP
00000a67: GAS
00000a68: CALL
00000a69: ISZERO
00000a6a: DUP1
00000a6b: ISZERO
00000a6c: PUSH2 0x0a79
00000a6f: JUMPI
00000a70: RETURNDATASIZE
00000a71: PUSH1 0x00
00000a73: DUP1
00000a74: RETURNDATACOPY
00000a75: RETURNDATASIZE
00000a76: PUSH1 0x00
00000a78: REVERT
00000a79: JUMPDEST
00000a7a: POP
00000a7b: POP
00000a7c: POP
00000a7d: POP
00000a7e: PUSH1 0x40
00000a80: MLOAD
00000a81: RETURNDATASIZE
00000a82: PUSH1 0x20
00000a84: DUP2
00000a85: LT
00000a86: ISZERO
00000a87: PUSH2 0x0a8f
00000a8a: JUMPI
00000a8b: PUSH1 0x00
00000a8d: DUP1
00000a8e: REVERT
00000a8f: JUMPDEST
00000a90: POP
00000a91: MLOAD
00000a92: SWAP1
00000a93: POP
00000a94: DUP1
00000a95: PUSH2 0x0a9e
00000a98: DUP4
00000a99: DUP6
00000a9a: PUSH2 0x0b20
00000a9d: JUMP
00000a9e: JUMPDEST
00000a9f: EQ
00000aa0: PUSH2 0x0b19
00000aa3: JUMPI
00000aa4: PUSH1 0x40
00000aa6: DUP1
00000aa7: MLOAD
00000aa8: PUSH1 0xe5
00000aaa: PUSH1 0x02
00000aac: EXP
00000aad: PUSH3 0x461bcd
00000ab1: MUL
00000ab2: DUP2
00000ab3: MSTORE
00000ab4: PUSH1 0x20
00000ab6: PUSH1 0x04
00000ab8: DUP3
00000ab9: ADD
00000aba: MSTORE
00000abb: PUSH1 0x2b
00000abd: PUSH1 0x24
00000abf: DUP3
00000ac0: ADD
00000ac1: MSTORE
00000ac2: PUSH32 0x526563656976657220646964206e6f74207265636569766520746f6b656e7320
00000ae3: PUSH1 0x44
00000ae5: DUP3
00000ae6: ADD
00000ae7: MSTORE
00000ae8: PUSH32 0x696e207472616e73666572000000000000000000000000000000000000000000
00000b09: PUSH1 0x64
00000b0b: DUP3
00000b0c: ADD
00000b0d: MSTORE
00000b0e: SWAP1
00000b0f: MLOAD
00000b10: SWAP1
00000b11: DUP2
00000b12: SWAP1
00000b13: SUB
00000b14: PUSH1 0x84
00000b16: ADD
00000b17: SWAP1
00000b18: REVERT
00000b19: JUMPDEST
00000b1a: POP
00000b1b: POP
00000b1c: POP
00000b1d: POP
00000b1e: POP
00000b1f: JUMP
00000b20: JUMPDEST
00000b21: DUP1
00000b22: DUP3
00000b23: ADD
00000b24: DUP3
00000b25: DUP2
00000b26: LT
00000b27: ISZERO
00000b28: PUSH2 0x08bc
00000b2b: JUMPI
00000b2c: PUSH1 0x40
00000b2e: DUP1
00000b2f: MLOAD
00000b30: PUSH1 0xe5
00000b32: PUSH1 0x02
00000b34: EXP
00000b35: PUSH3 0x461bcd
00000b39: MUL
00000b3a: DUP2
00000b3b: MSTORE
00000b3c: PUSH1 0x20
00000b3e: PUSH1 0x04
00000b40: DUP3
00000b41: ADD
00000b42: MSTORE
00000b43: PUSH1 0x14
00000b45: PUSH1 0x24
00000b47: DUP3
00000b48: ADD
00000b49: MSTORE
00000b4a: PUSH32 0x64732d6d6174682d6164642d6f766572666c6f77000000000000000000000000
00000b6b: PUSH1 0x44
00000b6d: DUP3
00000b6e: ADD
00000b6f: MSTORE
00000b70: SWAP1
00000b71: MLOAD
00000b72: SWAP1
00000b73: DUP2
00000b74: SWAP1
00000b75: SUB
00000b76: PUSH1 0x64
00000b78: ADD
00000b79: SWAP1
00000b7a: REVERT
00000b7b: STOP
00000b7c: PUSH5 0x732d617574
00000b82: PUSH9 0x2d756e617574686f72
00000b8c: PUSH10 0x7a656400000000000000
00000b97: STOP
00000b98: STOP
00000b99: STOP
00000b9a: STOP
00000b9b: STOP
00000b9c: LOG1
00000b9d: PUSH6 0x627a7a723058
00000ba4: KECCAK256
00000ba5: PUSH3 0x4a3d00
00000ba9: UNKNOWN(0xD2)
00000baa: PUSH7 0x3535d0f8dc18e3
00000bb2: MLOAD
00000bb3: UNKNOWN(0xD0)
00000bb4: UNKNOWN(0xBE)
00000bb5: SHR
00000bb6: BASEFEE
00000bb7: MSTORE
00000bb8: DUP15
00000bb9: UNKNOWN(0xEC)
00000bba: UNKNOWN(0xB5)
00000bbb: UNKNOWN(0xAB)
00000bbc: UNKNOWN(0xC4)
00000bbd: PUSH2 0xc670
00000bc0: UNKNOWN(0xAB)
00000bc1: UNKNOWN(0xBE)
00000bc2: SWAP15
00000bc3: PUSH25

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
high other detector Untrusted CALL target/value reachable 60 yes yes
view
trace_id: 0x003cd80077b34e98907b9307245cee214e3c6d1de8ad743cfdd90a69eca908ed
call_targets: 0x4734f894739cddd4e26786fa078d50f5b71bfb88, 0xda4fbd0ebe88877df05424c10274ad9315cee83a
target_varies: yes
classification: target_varies
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "confirmed",
    "attempts": 1,
    "trace_id": "0x003cd80077b34e98907b9307245cee214e3c6d1de8ad743cfdd90a69eca908ed",
    "confirmed": true,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x4734f894739cddd4e26786fa078d50f5b71bfb88",
        "0xda4fbd0ebe88877df05424c10274ad9315cee83a"
    ],
    "matched_probe": null,
    "target_varies": true,
    "classification": "target_varies"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x13af4035",
            "selector": "0x13af4035",
            "calldata_variants": [
                "0x13af4035",
                "0x13af40350000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x158ef93e",
            "selector": "0x158ef93e",
            "calldata_variants": [
                "0x158ef93e",
                "0x158ef93e0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x20531bc9",
            "selector": "0x20531bc9",
            "calldata_variants": [
                "0x20531bc9",
                "0x20531bc90000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x365a86fc",
            "selector": "0x365a86fc",
            "calldata_variants": [
                "0x365a86fc",
                "0x365a86fc0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x54fd4d50",
            "selector": "0x54fd4d50",
            "calldata_variants": [
                "0x54fd4d50",
                "0x54fd4d500000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x7a9e5e4b",
            "selector": "0x7a9e5e4b",
            "calldata_variants": [
                "0x7a9e5e4b",
                "0x7a9e5e4b0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x7b103999",
            "selector": "0x7b103999",
            "calldata_variants": [
                "0x7b103999",
                "0x7b1039990000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x83259ed9",
            "selector": "0x83259ed9",
            "calldata_variants": [
                "0x83259ed9",
                "0x83259ed90000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 2192,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 2364,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 2519,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "call_count": 4,
    "guards_detected": [],
    "untrusted_call_count": 4
}
high other detector ETH value transfer possible 55 yes yes
view
trace_id: 0x003cd80077b34e98907b9307245cee214e3c6d1de8ad743cfdd90a69eca908ed
call_targets: 0x4734f894739cddd4e26786fa078d50f5b71bfb88, 0xda4fbd0ebe88877df05424c10274ad9315cee83a
target_varies: yes
classification: target_varies
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "confirmed",
    "attempts": 1,
    "trace_id": "0x003cd80077b34e98907b9307245cee214e3c6d1de8ad743cfdd90a69eca908ed",
    "confirmed": true,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x4734f894739cddd4e26786fa078d50f5b71bfb88",
        "0xda4fbd0ebe88877df05424c10274ad9315cee83a"
    ],
    "matched_probe": null,
    "target_varies": true,
    "classification": "target_varies"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x13af4035",
            "selector": "0x13af4035",
            "calldata_variants": [
                "0x13af4035",
                "0x13af40350000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x158ef93e",
            "selector": "0x158ef93e",
            "calldata_variants": [
                "0x158ef93e",
                "0x158ef93e0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x20531bc9",
            "selector": "0x20531bc9",
            "calldata_variants": [
                "0x20531bc9",
                "0x20531bc90000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x365a86fc",
            "selector": "0x365a86fc",
            "calldata_variants": [
                "0x365a86fc",
                "0x365a86fc0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x54fd4d50",
            "selector": "0x54fd4d50",
            "calldata_variants": [
                "0x54fd4d50",
                "0x54fd4d500000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x7a9e5e4b",
            "selector": "0x7a9e5e4b",
            "calldata_variants": [
                "0x7a9e5e4b",
                "0x7a9e5e4b0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x7b103999",
            "selector": "0x7b103999",
            "calldata_variants": [
                "0x7b103999",
                "0x7b1039990000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x83259ed9",
            "selector": "0x83259ed9",
            "calldata_variants": [
                "0x83259ed9",
                "0x83259ed90000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 2192,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 2364,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 2519,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "eth_value_calls": 4,
    "guards_detected": []
}
medium other codex Untrusted low-level CALL with variable target/value (potential arbitrary external call/ETH transfer) 75 no
view
evidence_json
{
    "evidence": "BYTECODE_BUNDLE.json detector_findings report 4 CALL sites with computed targets and values; validation confirms target_varies and ETH value can be nonzero. No guards were detected by heuristics.",
    "locations": [
        "pc:0x890",
        "pc:0x93c",
        "pc:0x9d7",
        "pc:0xa68"
    ],
    "recommendation": "Restrict these call paths with explicit access control and/or a strict allowlist of targets; limit or eliminate ETH value forwarding; apply checks-effects-interactions and consider a reentrancy guard around state changes that occur near these calls.",
    "exploit_scenario": "If an untrusted caller can reach these CALL sites, they can supply a target and value to send ETH or trigger external code execution (including reentrancy) via a malicious callee."
}