019cdede-853e-714c-ad09-a481a20967ac
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 42550 | artifact.fetch | complete | 3 / 3 | 2 weeks ago |
| 42551 | proxy.resolve | complete | 3 / 3 | 2 weeks ago |
| 42552 | tool.cast_disasm | complete | 3 / 3 | 2 weeks ago |
| 42553 | analysis.bundle | complete | 3 / 3 | 2 weeks ago |
| 42554 | capability.graph | complete | 3 / 3 | 2 weeks ago |
| 42555 | detector.run | complete | 3 / 3 | 2 weeks ago |
| 42556 | validation.fork | complete | 1 / 3 | 1 month ago |
{
"method": "etherscan+onchain",
"status": "confirmed",
"etherscan_hint": {
"source": "etherscan",
"etherscan": {
"proxy_flag": true,
"implementation": "0xc7a5b0e3e3ebb500c2502b8525c9e97d0d40faf7"
}
},
"implementation": "0xc7a5b0e3e3ebb500c2502b8525c9e97d0d40faf7",
"onchain_method": "eip1967"
}
No slither job recorded yet.
No codex job recorded yet.
00000000: PUSH1 0x80 00000002: PUSH1 0x40 00000004: MSTORE 00000005: CALLDATASIZE 00000006: ISZERO 00000007: PUSH1 0x5c 00000009: JUMPI 0000000a: PUSH0 0000000b: DUP1 0000000c: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000021: PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc 00000042: SLOAD 00000043: AND 00000044: CALLDATASIZE 00000045: DUP3 00000046: DUP1 00000047: CALLDATACOPY 00000048: DUP2 00000049: CALLDATASIZE 0000004a: SWAP2 0000004b: GAS 0000004c: DELEGATECALL 0000004d: RETURNDATASIZE 0000004e: PUSH0 0000004f: DUP1 00000050: RETURNDATACOPY 00000051: ISZERO 00000052: PUSH1 0x58 00000054: JUMPI 00000055: RETURNDATASIZE 00000056: PUSH0 00000057: RETURN 00000058: JUMPDEST 00000059: RETURNDATASIZE 0000005a: PUSH0 0000005b: REVERT 0000005c: JUMPDEST 0000005d: PUSH0 0000005e: DUP1 0000005f: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000074: PUSH32 0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc 00000095: SLOAD 00000096: AND 00000097: CALLDATASIZE 00000098: DUP3 00000099: DUP1 0000009a: CALLDATACOPY 0000009b: DUP2 0000009c: CALLDATASIZE 0000009d: SWAP2 0000009e: GAS 0000009f: DELEGATECALL 000000a0: RETURNDATASIZE 000000a1: PUSH0 000000a2: DUP1 000000a3: RETURNDATACOPY 000000a4: ISZERO 000000a5: PUSH1 0x58 000000a7: JUMPI 000000a8: RETURNDATASIZE 000000a9: PUSH0 000000aa: RETURN 000000ab: INVALID 000000ac: LOG2 000000ad: PUSH5 0x6970667358 000000b3: UNKNOWN(0x22) 000000b4: SLT 000000b5: KECCAK256 000000b6: UNKNOWN(0xB9) 000000b7: SWAP3 000000b8: UNKNOWN(0xBF) 000000b9: PUSH23 0x9094d908d0a8a5e18ba528333318de855d9d0166fc6cb0 000000d1: UNKNOWN(0xBF) 000000d2: PUSH20
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| critical | upgradeability | detector | Untrusted DELEGATECALL target reachable | 70 | no | — |
viewwitness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x",
"selector": "fallback",
"calldata_variants": [
"0x"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 76,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
},
{
"pc": 159,
"opcode": "DELEGATECALL",
"returndata_checked": null,
"value_expression_category": "n/a",
"target_expression_category": "computed"
}
],
"guards_detected": [],
"delegatecall_count": 2,
"untrusted_delegatecall_count": 2
}
|
| medium | upgradeability | cast | DELEGATECALL present | 80 | no | — |
viewevidence_json{
"notes": "delegatecall enables execution in caller context; common in proxies/upgradeable patterns",
"delegatecall_count": 2
}
|
| info | upgradeability | cast | Likely proxy-like runtime | 60 | no | — |
viewevidence_json{
"notes": "short runtime with SLOAD and DELEGATECALL resembles minimal proxy/upgradeable pattern",
"sload_count": 2,
"total_opcodes": 74,
"delegatecall_count": 2
}
|