TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

508cbe01-35c2-4aba-bcff-0bad10d1924a

complete
Chain ID
1
Address
Block Number
Created
Thu, Jan 1, 2026 2:56 PM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
0
Validated
0
Source
Bytecode only
Review Backing
Not yet
Best current signal
Authorization based on tx.origin
crit 0 high 0 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
31053 report.consolidate complete 1 / 1 3 months ago
76132 artifact.fetch complete 1 / 3 2 weeks ago
76133 tool.cast_disasm complete 1 / 3 2 weeks ago
76134 analysis.bundle complete 1 / 3 2 weeks ago
76135 capability.graph complete 1 / 3 2 weeks ago
76136 detector.run complete 1 / 3 2 weeks ago
76137 validation.fork complete 1 / 3 2 weeks ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no
Implementation:
Verified Source: no

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate
Job Status
complete
Attempts
1 / 1
Findings
0
No findings?
yes
Summary
Reviewed runtime bytecode: three externally callable selectors (0x5074171d, 0x856acdc2, 0xcc9ce197) all enforce tx.origin == slot0 (owner) before any external calls; no SSTORE, DELEGATECALL, or SELFDESTRUCT present. No public value-transfer path or unauthorized call target control found from bytecode alone.
View stderr
[codex:555929] OpenAI Codex v0.77.0 (research preview)
[codex:555929] --------
[codex:555929] workdir: /tmp/codex-multi-lwb_8gk3
[codex:555929] model: gpt-5.2-codex
[codex:555929] provider: openai
[codex:555929] approval: never
[codex:555929] sandbox: read-only
[codex:555929] reasoning effort: xhigh
[codex:555929] reasoning summaries: auto
[codex:555929] session id: 019b7a0d-b18b-7230-a448-a94642e2c4c2
[codex:555929] --------
[codex:555929] user
[codex:555929] You are a profit-focused exploit hunter analyzing EVM bytecode. Your ONLY goal is finding ways to extract value (ETH, tokens, NFTs) from this contract.
[codex:555929] 
[codex:555929] Read `BYTECODE_BUNDLE.txt` completely before concluding.
[codex:555929] 
[codex:555929] ONLY REPORT if you find a CONCRETE, EXPLOITABLE path to profit. We do NOT care about:
[codex:555929] - Gas inefficiency, code quality, or best practices
[codex:555929] - Theoretical vulnerabilities without a clear extraction path
[codex:555929] - Generic footguns (unchecked return values, etc.) unless they enable theft
[codex:555929] - Issues requiring social engineering or off-chain coordination
[codex:555929] 
[codex:555929] PATTERNS WORTH INVESTIGATING in bytecode:
[codex:555929] - CALL/DELEGATECALL with controllable destination or calldata
[codex:555929] - Value transfers (CALL with non-zero value) without prior CALLER/ORIGIN checks
[codex:555929] - SSTORE to low slots (0-10) that might be owner/admin storage
[codex:555929] - ecrecover (signature validation) - look for missing nonce/replay protection
[codex:555929] - External calls before state updates (reentrancy)
[codex:555929] - SELFDESTRUCT with controllable beneficiary
[codex:555929] - Proxy patterns (DELEGATECALL to storage slot) with unprotected upgrade paths
[codex:555929] 
[codex:555929] For each finding, you MUST explain:
[codex:555929] 1. The specific bytecode pattern/offsets that indicate the vulnerability
[codex:555929] 2. The concrete sequence of transactions to extract value
[codex:555929] 3. Why you believe this is exploitable (not just suspicious)
[codex:555929] 
[codex:555929] If you cannot identify a concrete profit path from bytecode alone: set no_findings=true.
[codex:555929] Do NOT hallucinate. Bytecode-only analysis is limited - be honest about uncertainty.
[codex:555929] 
[codex:555929] Output MUST be valid JSON matching the provided schema.
[codex:555929] - severity: info, low, medium, high, critical (use high/critical ONLY for clear extraction paths)
[codex:555929] - category: access_control, reentrancy, math, oracle, upgradeability, auth, other
[codex:555929] mcp startup: no servers
[codex:555929] 
[codex:555929] thinking
[codex:555929] **Reviewing bytecode bundle**
[codex:555929] exec
[codex:555929] /bin/bash -lc ls in /tmp/codex-multi-lwb_8gk3 succeeded in 5ms:
[codex:555929] BYTECODE_BUNDLE.txt
[codex:555929] codex-output-schema.json
[codex:555929] exec
[codex:555929] /bin/bash -lc 'cat BYTECODE_BUNDLE.txt' in /tmp/codex-multi-lwb_8gk3 succeeded in 6ms:
[codex:555929] Runtime bytecode bundle for best-effort auditing.
[codex:555929] Note: without verified source, conclusions are low-confidence unless a concrete pattern is visible.
[codex:555929] 
[codex:555929] FILE: runtime_bytecode.hex
[codex:555929] 0x6080604052600436106100345760003560e01c80635074171d14610036578063856acdc214610071578063cc9ce197146100be575b005b34801561004257600080fd5b506100346004803603604081101561005957600080fd5b506001600160a01b0381351690602001351515610150565b34801561007d57600080fd5b506100346004803603608081101561009457600080fd5b506001600160a01b0381358116916020810135909116906040810135151590606001351515610175565b3480156100ca57600080fd5b50610034600480360360608110156100e157600080fd5b6001600160a01b038235169160208101359181019060608101604082013564010000000081111561011157600080fd5b82018360208201111561012357600080fd5b8035906020019184600183028401116401000000008311171561014557600080fd5b509092509050610694565b6000546001600160a01b0316321461016757600080fd5b6101718282610709565b5050565b6000546001600160a01b0316321461018c57600080fd5b60006001831515146101a9576003546001600160a01b03166101b6565b6002546001600160a01b03165b9050846001600160a01b03166370a08231826040518263ffffffff1660e01b815260040180826001600160a01b0316815260200191505060206040518083038186803b15801561020557600080fd5b505afa158015610219573d6000803e3d6000fd5b505050506040513d602081101561022f57600080fd5b505161023b575061068e565b6040805160028082526060808301845292602083019080368337505060015482519293506001600160a01b03169183915060009061027557fe5b60200260200101906001600160a01b031690816001600160a01b03168152505085816001815181106102a357fe5b60200260200101906001600160a01b031690816001600160a01b031681525050816001600160a01b0316635c11d795655af3107a40006000843042601e016040518663ffffffff1660e01b81526004018086815260200185815260200180602001846001600160a01b03168152602001838152602001828103825285818151815260200191508051906020019060200280838360005b83811015610351578181015183820152602001610339565b505050509050019650505050505050600060405180830381600087803b15801561037a57600080fd5b505af115801561038e573d6000803e3d6000fd5b50506001546040805163a9059cbb60e01b81526001600160a01b038a81166004830152655af3107a40006024830152915191909216935063a9059cbb9250604480830192600092919082900301818387803b1580156103ec57600080fd5b505af1158015610400573d6000803e3d6000fd5b50505050856001600160a01b031663a9059cbb86886001600160a01b03166370a08231306040518263ffffffff1660e01b815260040180826001600160a01b0316815260200191505060206040518083038186803b15801561046157600080fd5b505afa158015610475573d6000803e3d6000fd5b505050506040513d602081101561048b57600080fd5b5051604080516001600160e01b031960e086901b1681526001600160a01b039093166004840152602483019190915251604480830192600092919082900301818387803b1580156104db57600080fd5b505af11580156104ef573d6000803e3d6000fd5b505050506000856001600160a01b0316636a627842306040518263ffffffff1660e01b815260040180826001600160a01b03168152602001915050602060405180830381600087803b15801561054457600080fd5b505af1158015610558573d6000803e3d6000fd5b505050506040513d602081101561056e57600080fd5b50516040805163095ea7b360e01b81526001600160a01b0386811660048301526024820184905291519293509088169163095ea7b39160448082019260009290919082900301818387803b1580156105c557600080fd5b505af11580156105d9573d6000803e3d6000fd5b50506040805163af2979eb60e01b81526001600160a01b038b811660048301526024820186905260006044830181905260648301819052306084840152601e420160a48401529251908816945063af2979eb935060c48083019360209383900390910190829087803b15801561064e57600080fd5b505af1158015610662573d6000803e3d6000fd5b505050506040513d602081101561067857600080fd5b5050831561068a5761068a8786610709565b5050505b50505050565b6000546001600160a01b031633146106ab57600080fd5b836001600160a01b0316838383604051808383808284376040519201945060009350909150508083038185875af1925050503d806000811461068a576040519150601f19603f3d011682016040523d82523d6000602084013e61068a565b6000600182151514610726576003546001600160a01b0316610733565b6002546001600160a01b03165b90506000836001600160a01b03166370a08231306040518263ffffffff1660e01b815260040180826001600160a01b0316815260200191505060206040518083038186803b15801561078457600080fd5b505afa158015610798573d6000803e3d6000fd5b505050506040513d60208110156107ae57600080fd5b50519050806107be575050610171565b836001600160a01b031663095ea7b383836040518363ffffffff1660e01b815260040180836001600160a01b0316815260200182815260200192505050600060405180830381600087803b15801561081557600080fd5b505af1158015610829573d6000803e3d6000fd5b505060408051600280825260608083018452945090925090602083019080368337019050509050848160008151811061085e57fe5b6001600160a01b039283166020918202929092010152600180548351921691839190811061088857fe5b60200260200101906001600160a01b031690816001600160a01b031681525050826001600160a01b0316635c11d795836000843042601e016040518663ffffffff1660e01b81526004018086815260200185815260200180602001846001600160a01b03168152602001838152602001828103825285818151815260200191508051906020019060200280838360005b83811015610930578181015183820152602001610918565b505050509050019650505050505050600060405180830381600087803b15801561095957600080fd5b505af115801561096d573d6000803e3d6000fd5b50505050505050505056fea26469706673582212209f212af67a57393133100856448905fd8d192ade229dd653ae6f9262838aa13a64736f6c63430007010033
[codex:555929] 
[codex:555929] 
[codex:555929] thinking
[codex:555929] **Examining bytecode for potential exploits**
[codex:555929] thinking
[codex:555929] **Investigating owner state mutability**
[codex:555929] 
[codex:555929] I’m checking if the owner address stored in slot0 can ever change by searching for SSTORE (opcode 0x55) in the bytecode. Since no SSTORE appears in the runtime, the owner and other storage slots seem immutable after deployment, so the owner check likely remains fixed. This suggests the contract’s critical addresses can’t be updated later.
[codex:555929] exec
[codex:555929] /bin/bash -lc "python3 - <<'PY'
[codex:555929] import binascii
[codex:555929] hexdata=open('BYTECODE_BUNDLE.txt').read().split('runtime_bytecode.hex')[1]
[codex:555929] # extract 0x... from file
[codex:555929] import re
[codex:555929] m=re.search(r'0x([0-9a-fA-F]+)', hexdata)
[codex:555929] hexstr=m.group(1)
[codex:555929] code=bytes.fromhex(hexstr)
[codex:555929] # count sstore opcode 0x55 positions
[codex:555929] positions=[i for i,b in enumerate(code) if b==0x55]
[codex:555929] print('sstore count', len(positions))
[codex:555929] print('first positions', positions[:20])
[codex:555929] PY" in /tmp/codex-multi-lwb_8gk3 succeeded in 40ms:
[codex:555929] sstore count 0
[codex:555929] first positions []
[codex:555929] 
[codex:555929] thinking
[codex:555929] **Analyzing contract bytecode for exploits**
[codex:555929] codex
[codex:555929] {"no_findings":true,"summary":"Reviewed runtime bytecode: three externally callable selectors (0x5074171d, 0x856acdc2, 0xcc9ce197) all enforce tx.origin == slot0 (owner) before any external calls; no SSTORE, DELEGATECALL, or SELFDESTRUCT present. No public value-transfer path or unauthorized call target control found from bytecode alone.","findings":[]}
[codex:555929] tokens used
[codex:555929] 28,058
[codex:555929] {"no_findings":true,"summary":"Reviewed runtime bytecode: three externally callable selectors (0x5074171d, 0x856acdc2, 0xcc9ce197) all enforce tx.origin == slot0 (owner) before any external calls; no SSTORE, DELEGATECALL, or SELFDESTRUCT present. No public value-transfer path or unauthorized call target control found from bytecode alone.","findings":[]}
Metadata
{
    "codex": {
        "ran_at": "2026-01-01T14:56:50.036924+00:00",
        "returncode": 0
    },
    "summary": "Reviewed runtime bytecode: three externally callable selectors (0x5074171d, 0x856acdc2, 0xcc9ce197) all enforce tx.origin == slot0 (owner) before any external calls; no SSTORE, DELEGATECALL, or SELFDESTRUCT present. No public value-transfer path or unauthorized call target control found from bytecode alone.",
    "raw_final": {
        "summary": "Reviewed runtime bytecode: three externally callable selectors (0x5074171d, 0x856acdc2, 0xcc9ce197) all enforce tx.origin == slot0 (owner) before any external calls; no SSTORE, DELEGATECALL, or SELFDESTRUCT present. No public value-transfer path or unauthorized call target control found from bytecode alone.",
        "findings": [],
        "no_findings": true
    },
    "no_findings": true,
    "schema_version": 1
}

Opcode Heuristics

tool.cast_disasm
Delegatecall
0
Selfdestruct
0
CREATE2
0
CALL-family (heavy)
12
EXT*/BALANCE
11
Total opcodes
1838
Flags
heavy_ext_balance_usage call_family_heavy
View cast disassembly output
00000000: PUSH1 0x80
00000002: PUSH1 0x40
00000004: MSTORE
00000005: PUSH1 0x04
00000007: CALLDATASIZE
00000008: LT
00000009: PUSH2 0x0034
0000000c: JUMPI
0000000d: PUSH1 0x00
0000000f: CALLDATALOAD
00000010: PUSH1 0xe0
00000012: SHR
00000013: DUP1
00000014: PUSH4 0x5074171d
00000019: EQ
0000001a: PUSH2 0x0036
0000001d: JUMPI
0000001e: DUP1
0000001f: PUSH4 0x856acdc2
00000024: EQ
00000025: PUSH2 0x0071
00000028: JUMPI
00000029: DUP1
0000002a: PUSH4 0xcc9ce197
0000002f: EQ
00000030: PUSH2 0x00be
00000033: JUMPI
00000034: JUMPDEST
00000035: STOP
00000036: JUMPDEST
00000037: CALLVALUE
00000038: DUP1
00000039: ISZERO
0000003a: PUSH2 0x0042
0000003d: JUMPI
0000003e: PUSH1 0x00
00000040: DUP1
00000041: REVERT
00000042: JUMPDEST
00000043: POP
00000044: PUSH2 0x0034
00000047: PUSH1 0x04
00000049: DUP1
0000004a: CALLDATASIZE
0000004b: SUB
0000004c: PUSH1 0x40
0000004e: DUP2
0000004f: LT
00000050: ISZERO
00000051: PUSH2 0x0059
00000054: JUMPI
00000055: PUSH1 0x00
00000057: DUP1
00000058: REVERT
00000059: JUMPDEST
0000005a: POP
0000005b: PUSH1 0x01
0000005d: PUSH1 0x01
0000005f: PUSH1 0xa0
00000061: SHL
00000062: SUB
00000063: DUP2
00000064: CALLDATALOAD
00000065: AND
00000066: SWAP1
00000067: PUSH1 0x20
00000069: ADD
0000006a: CALLDATALOAD
0000006b: ISZERO
0000006c: ISZERO
0000006d: PUSH2 0x0150
00000070: JUMP
00000071: JUMPDEST
00000072: CALLVALUE
00000073: DUP1
00000074: ISZERO
00000075: PUSH2 0x007d
00000078: JUMPI
00000079: PUSH1 0x00
0000007b: DUP1
0000007c: REVERT
0000007d: JUMPDEST
0000007e: POP
0000007f: PUSH2 0x0034
00000082: PUSH1 0x04
00000084: DUP1
00000085: CALLDATASIZE
00000086: SUB
00000087: PUSH1 0x80
00000089: DUP2
0000008a: LT
0000008b: ISZERO
0000008c: PUSH2 0x0094
0000008f: JUMPI
00000090: PUSH1 0x00
00000092: DUP1
00000093: REVERT
00000094: JUMPDEST
00000095: POP
00000096: PUSH1 0x01
00000098: PUSH1 0x01
0000009a: PUSH1 0xa0
0000009c: SHL
0000009d: SUB
0000009e: DUP2
0000009f: CALLDATALOAD
000000a0: DUP2
000000a1: AND
000000a2: SWAP2
000000a3: PUSH1 0x20
000000a5: DUP2
000000a6: ADD
000000a7: CALLDATALOAD
000000a8: SWAP1
000000a9: SWAP2
000000aa: AND
000000ab: SWAP1
000000ac: PUSH1 0x40
000000ae: DUP2
000000af: ADD
000000b0: CALLDATALOAD
000000b1: ISZERO
000000b2: ISZERO
000000b3: SWAP1
000000b4: PUSH1 0x60
000000b6: ADD
000000b7: CALLDATALOAD
000000b8: ISZERO
000000b9: ISZERO
000000ba: PUSH2 0x0175
000000bd: JUMP
000000be: JUMPDEST
000000bf: CALLVALUE
000000c0: DUP1
000000c1: ISZERO
000000c2: PUSH2 0x00ca
000000c5: JUMPI
000000c6: PUSH1 0x00
000000c8: DUP1
000000c9: REVERT
000000ca: JUMPDEST
000000cb: POP
000000cc: PUSH2 0x0034
000000cf: PUSH1 0x04
000000d1: DUP1
000000d2: CALLDATASIZE
000000d3: SUB
000000d4: PUSH1 0x60
000000d6: DUP2
000000d7: LT
000000d8: ISZERO
000000d9: PUSH2 0x00e1
000000dc: JUMPI
000000dd: PUSH1 0x00
000000df: DUP1
000000e0: REVERT
000000e1: JUMPDEST
000000e2: PUSH1 0x01
000000e4: PUSH1 0x01
000000e6: PUSH1 0xa0
000000e8: SHL
000000e9: SUB
000000ea: DUP3
000000eb: CALLDATALOAD
000000ec: AND
000000ed: SWAP2
000000ee: PUSH1 0x20
000000f0: DUP2
000000f1: ADD
000000f2: CALLDATALOAD
000000f3: SWAP2
000000f4: DUP2
000000f5: ADD
000000f6: SWAP1
000000f7: PUSH1 0x60
000000f9: DUP2
000000fa: ADD
000000fb: PUSH1 0x40
000000fd: DUP3
000000fe: ADD
000000ff: CALLDATALOAD
00000100: PUSH5 0x0100000000
00000106: DUP2
00000107: GT
00000108: ISZERO
00000109: PUSH2 0x0111
0000010c: JUMPI
0000010d: PUSH1 0x00
0000010f: DUP1
00000110: REVERT
00000111: JUMPDEST
00000112: DUP3
00000113: ADD
00000114: DUP4
00000115: PUSH1 0x20
00000117: DUP3
00000118: ADD
00000119: GT
0000011a: ISZERO
0000011b: PUSH2 0x0123
0000011e: JUMPI
0000011f: PUSH1 0x00
00000121: DUP1
00000122: REVERT
00000123: JUMPDEST
00000124: DUP1
00000125: CALLDATALOAD
00000126: SWAP1
00000127: PUSH1 0x20
00000129: ADD
0000012a: SWAP2
0000012b: DUP5
0000012c: PUSH1 0x01
0000012e: DUP4
0000012f: MUL
00000130: DUP5
00000131: ADD
00000132: GT
00000133: PUSH5 0x0100000000
00000139: DUP4
0000013a: GT
0000013b: OR
0000013c: ISZERO
0000013d: PUSH2 0x0145
00000140: JUMPI
00000141: PUSH1 0x00
00000143: DUP1
00000144: REVERT
00000145: JUMPDEST
00000146: POP
00000147: SWAP1
00000148: SWAP3
00000149: POP
0000014a: SWAP1
0000014b: POP
0000014c: PUSH2 0x0694
0000014f: JUMP
00000150: JUMPDEST
00000151: PUSH1 0x00
00000153: SLOAD
00000154: PUSH1 0x01
00000156: PUSH1 0x01
00000158: PUSH1 0xa0
0000015a: SHL
0000015b: SUB
0000015c: AND
0000015d: ORIGIN
0000015e: EQ
0000015f: PUSH2 0x0167
00000162: JUMPI
00000163: PUSH1 0x00
00000165: DUP1
00000166: REVERT
00000167: JUMPDEST
00000168: PUSH2 0x0171
0000016b: DUP3
0000016c: DUP3
0000016d: PUSH2 0x0709
00000170: JUMP
00000171: JUMPDEST
00000172: POP
00000173: POP
00000174: JUMP
00000175: JUMPDEST
00000176: PUSH1 0x00
00000178: SLOAD
00000179: PUSH1 0x01
0000017b: PUSH1 0x01
0000017d: PUSH1 0xa0
0000017f: SHL
00000180: SUB
00000181: AND
00000182: ORIGIN
00000183: EQ
00000184: PUSH2 0x018c
00000187: JUMPI
00000188: PUSH1 0x00
0000018a: DUP1
0000018b: REVERT
0000018c: JUMPDEST
0000018d: PUSH1 0x00
0000018f: PUSH1 0x01
00000191: DUP4
00000192: ISZERO
00000193: ISZERO
00000194: EQ
00000195: PUSH2 0x01a9
00000198: JUMPI
00000199: PUSH1 0x03
0000019b: SLOAD
0000019c: PUSH1 0x01
0000019e: PUSH1 0x01
000001a0: PUSH1 0xa0
000001a2: SHL
000001a3: SUB
000001a4: AND
000001a5: PUSH2 0x01b6
000001a8: JUMP
000001a9: JUMPDEST
000001aa: PUSH1 0x02
000001ac: SLOAD
000001ad: PUSH1 0x01
000001af: PUSH1 0x01
000001b1: PUSH1 0xa0
000001b3: SHL
000001b4: SUB
000001b5: AND
000001b6: JUMPDEST
000001b7: SWAP1
000001b8: POP
000001b9: DUP5
000001ba: PUSH1 0x01
000001bc: PUSH1 0x01
000001be: PUSH1 0xa0
000001c0: SHL
000001c1: SUB
000001c2: AND
000001c3: PUSH4 0x70a08231
000001c8: DUP3
000001c9: PUSH1 0x40
000001cb: MLOAD
000001cc: DUP3
000001cd: PUSH4 0xffffffff
000001d2: AND
000001d3: PUSH1 0xe0
000001d5: SHL
000001d6: DUP2
000001d7: MSTORE
000001d8: PUSH1 0x04
000001da: ADD
000001db: DUP1
000001dc: DUP3
000001dd: PUSH1 0x01
000001df: PUSH1 0x01
000001e1: PUSH1 0xa0
000001e3: SHL
000001e4: SUB
000001e5: AND
000001e6: DUP2
000001e7: MSTORE
000001e8: PUSH1 0x20
000001ea: ADD
000001eb: SWAP2
000001ec: POP
000001ed: POP
000001ee: PUSH1 0x20
000001f0: PUSH1 0x40
000001f2: MLOAD
000001f3: DUP1
000001f4: DUP4
000001f5: SUB
000001f6: DUP2
000001f7: DUP7
000001f8: DUP1
000001f9: EXTCODESIZE
000001fa: ISZERO
000001fb: DUP1
000001fc: ISZERO
000001fd: PUSH2 0x0205
00000200: JUMPI
00000201: PUSH1 0x00
00000203: DUP1
00000204: REVERT
00000205: JUMPDEST
00000206: POP
00000207: GAS
00000208: STATICCALL
00000209: ISZERO
0000020a: DUP1
0000020b: ISZERO
0000020c: PUSH2 0x0219
0000020f: JUMPI
00000210: RETURNDATASIZE
00000211: PUSH1 0x00
00000213: DUP1
00000214: RETURNDATACOPY
00000215: RETURNDATASIZE
00000216: PUSH1 0x00
00000218: REVERT
00000219: JUMPDEST
0000021a: POP
0000021b: POP
0000021c: POP
0000021d: POP
0000021e: PUSH1 0x40
00000220: MLOAD
00000221: RETURNDATASIZE
00000222: PUSH1 0x20
00000224: DUP2
00000225: LT
00000226: ISZERO
00000227: PUSH2 0x022f
0000022a: JUMPI
0000022b: PUSH1 0x00
0000022d: DUP1
0000022e: REVERT
0000022f: JUMPDEST
00000230: POP
00000231: MLOAD
00000232: PUSH2 0x023b
00000235: JUMPI
00000236: POP
00000237: PUSH2 0x068e
0000023a: JUMP
0000023b: JUMPDEST
0000023c: PUSH1 0x40
0000023e: DUP1
0000023f: MLOAD
00000240: PUSH1 0x02
00000242: DUP1
00000243: DUP3
00000244: MSTORE
00000245: PUSH1 0x60
00000247: DUP1
00000248: DUP4
00000249: ADD
0000024a: DUP5
0000024b: MSTORE
0000024c: SWAP3
0000024d: PUSH1 0x20
0000024f: DUP4
00000250: ADD
00000251: SWAP1
00000252: DUP1
00000253: CALLDATASIZE
00000254: DUP4
00000255: CALLDATACOPY
00000256: POP
00000257: POP
00000258: PUSH1 0x01
0000025a: SLOAD
0000025b: DUP3
0000025c: MLOAD
0000025d: SWAP3
0000025e: SWAP4
0000025f: POP
00000260: PUSH1 0x01
00000262: PUSH1 0x01
00000264: PUSH1 0xa0
00000266: SHL
00000267: SUB
00000268: AND
00000269: SWAP2
0000026a: DUP4
0000026b: SWAP2
0000026c: POP
0000026d: PUSH1 0x00
0000026f: SWAP1
00000270: PUSH2 0x0275
00000273: JUMPI
00000274: INVALID
00000275: JUMPDEST
00000276: PUSH1 0x20
00000278: MUL
00000279: PUSH1 0x20
0000027b: ADD
0000027c: ADD
0000027d: SWAP1
0000027e: PUSH1 0x01
00000280: PUSH1 0x01
00000282: PUSH1 0xa0
00000284: SHL
00000285: SUB
00000286: AND
00000287: SWAP1
00000288: DUP2
00000289: PUSH1 0x01
0000028b: PUSH1 0x01
0000028d: PUSH1 0xa0
0000028f: SHL
00000290: SUB
00000291: AND
00000292: DUP2
00000293: MSTORE
00000294: POP
00000295: POP
00000296: DUP6
00000297: DUP2
00000298: PUSH1 0x01
0000029a: DUP2
0000029b: MLOAD
0000029c: DUP2
0000029d: LT
0000029e: PUSH2 0x02a3
000002a1: JUMPI
000002a2: INVALID
000002a3: JUMPDEST
000002a4: PUSH1 0x20
000002a6: MUL
000002a7: PUSH1 0x20
000002a9: ADD
000002aa: ADD
000002ab: SWAP1
000002ac: PUSH1 0x01
000002ae: PUSH1 0x01
000002b0: PUSH1 0xa0
000002b2: SHL
000002b3: SUB
000002b4: AND
000002b5: SWAP1
000002b6: DUP2
000002b7: PUSH1 0x01
000002b9: PUSH1 0x01
000002bb: PUSH1 0xa0
000002bd: SHL
000002be: SUB
000002bf: AND
000002c0: DUP2
000002c1: MSTORE
000002c2: POP
000002c3: POP
000002c4: DUP2
000002c5: PUSH1 0x01
000002c7: PUSH1 0x01
000002c9: PUSH1 0xa0
000002cb: SHL
000002cc: SUB
000002cd: AND
000002ce: PUSH4 0x5c11d795
000002d3: PUSH6 0x5af3107a4000
000002da: PUSH1 0x00
000002dc: DUP5
000002dd: ADDRESS
000002de: TIMESTAMP
000002df: PUSH1 0x1e
000002e1: ADD
000002e2: PUSH1 0x40
000002e4: MLOAD
000002e5: DUP7
000002e6: PUSH4 0xffffffff
000002eb: AND
000002ec: PUSH1 0xe0
000002ee: SHL
000002ef: DUP2
000002f0: MSTORE
000002f1: PUSH1 0x04
000002f3: ADD
000002f4: DUP1
000002f5: DUP7
000002f6: DUP2
000002f7: MSTORE
000002f8: PUSH1 0x20
000002fa: ADD
000002fb: DUP6
000002fc: DUP2
000002fd: MSTORE
000002fe: PUSH1 0x20
00000300: ADD
00000301: DUP1
00000302: PUSH1 0x20
00000304: ADD
00000305: DUP5
00000306: PUSH1 0x01
00000308: PUSH1 0x01
0000030a: PUSH1 0xa0
0000030c: SHL
0000030d: SUB
0000030e: AND
0000030f: DUP2
00000310: MSTORE
00000311: PUSH1 0x20
00000313: ADD
00000314: DUP4
00000315: DUP2
00000316: MSTORE
00000317: PUSH1 0x20
00000319: ADD
0000031a: DUP3
0000031b: DUP2
0000031c: SUB
0000031d: DUP3
0000031e: MSTORE
0000031f: DUP6
00000320: DUP2
00000321: DUP2
00000322: MLOAD
00000323: DUP2
00000324: MSTORE
00000325: PUSH1 0x20
00000327: ADD
00000328: SWAP2
00000329: POP
0000032a: DUP1
0000032b: MLOAD
0000032c: SWAP1
0000032d: PUSH1 0x20
0000032f: ADD
00000330: SWAP1
00000331: PUSH1 0x20
00000333: MUL
00000334: DUP1
00000335: DUP4
00000336: DUP4
00000337: PUSH1 0x00
00000339: JUMPDEST
0000033a: DUP4
0000033b: DUP2
0000033c: LT
0000033d: ISZERO
0000033e: PUSH2 0x0351
00000341: JUMPI
00000342: DUP2
00000343: DUP2
00000344: ADD
00000345: MLOAD
00000346: DUP4
00000347: DUP3
00000348: ADD
00000349: MSTORE
0000034a: PUSH1 0x20
0000034c: ADD
0000034d: PUSH2 0x0339
00000350: JUMP
00000351: JUMPDEST
00000352: POP
00000353: POP
00000354: POP
00000355: POP
00000356: SWAP1
00000357: POP
00000358: ADD
00000359: SWAP7
0000035a: POP
0000035b: POP
0000035c: POP
0000035d: POP
0000035e: POP
0000035f: POP
00000360: POP
00000361: PUSH1 0x00
00000363: PUSH1 0x40
00000365: MLOAD
00000366: DUP1
00000367: DUP4
00000368: SUB
00000369: DUP2
0000036a: PUSH1 0x00
0000036c: DUP8
0000036d: DUP1
0000036e: EXTCODESIZE
0000036f: ISZERO
00000370: DUP1
00000371: ISZERO
00000372: PUSH2 0x037a
00000375: JUMPI
00000376: PUSH1 0x00
00000378: DUP1
00000379: REVERT
0000037a: JUMPDEST
0000037b: POP
0000037c: GAS
0000037d: CALL
0000037e: ISZERO
0000037f: DUP1
00000380: ISZERO
00000381: PUSH2 0x038e
00000384: JUMPI
00000385: RETURNDATASIZE
00000386: PUSH1 0x00
00000388: DUP1
00000389: RETURNDATACOPY
0000038a: RETURNDATASIZE
0000038b: PUSH1 0x00
0000038d: REVERT
0000038e: JUMPDEST
0000038f: POP
00000390: POP
00000391: PUSH1 0x01
00000393: SLOAD
00000394: PUSH1 0x40
00000396: DUP1
00000397: MLOAD
00000398: PUSH4 0xa9059cbb
0000039d: PUSH1 0xe0
0000039f: SHL
000003a0: DUP2
000003a1: MSTORE
000003a2: PUSH1 0x01
000003a4: PUSH1 0x01
000003a6: PUSH1 0xa0
000003a8: SHL
000003a9: SUB
000003aa: DUP11
000003ab: DUP2
000003ac: AND
000003ad: PUSH1 0x04
000003af: DUP4
000003b0: ADD
000003b1: MSTORE
000003b2: PUSH6 0x5af3107a4000
000003b9: PUSH1 0x24
000003bb: DUP4
000003bc: ADD
000003bd: MSTORE
000003be: SWAP2
000003bf: MLOAD
000003c0: SWAP2
000003c1: SWAP1
000003c2: SWAP3
000003c3: AND
000003c4: SWAP4
000003c5: POP
000003c6: PUSH4 0xa9059cbb
000003cb: SWAP3
000003cc: POP
000003cd: PUSH1 0x44
000003cf: DUP1
000003d0: DUP4
000003d1: ADD
000003d2: SWAP3
000003d3: PUSH1 0x00
000003d5: SWAP3
000003d6: SWAP2
000003d7: SWAP1
000003d8: DUP3
000003d9: SWAP1
000003da: SUB
000003db: ADD
000003dc: DUP2
000003dd: DUP4
000003de: DUP8
000003df: DUP1
000003e0: EXTCODESIZE
000003e1: ISZERO
000003e2: DUP1
000003e3: ISZERO
000003e4: PUSH2 0x03ec
000003e7: JUMPI
000003e8: PUSH1 0x00
000003ea: DUP1
000003eb: REVERT
000003ec: JUMPDEST
000003ed: POP
000003ee: GAS
000003ef: CALL
000003f0: ISZERO
000003f1: DUP1
000003f2: ISZERO
000003f3: PUSH2 0x0400
000003f6: JUMPI
000003f7: RETURNDATASIZE
000003f8: PUSH1 0x00
000003fa: DUP1
000003fb: RETURNDATACOPY
000003fc: RETURNDATASIZE
000003fd: PUSH1 0x00
000003ff: REVERT
00000400: JUMPDEST
00000401: POP
00000402: POP
00000403: POP
00000404: POP
00000405: DUP6
00000406: PUSH1 0x01
00000408: PUSH1 0x01
0000040a: PUSH1 0xa0
0000040c: SHL
0000040d: SUB
0000040e: AND
0000040f: PUSH4 0xa9059cbb
00000414: DUP7
00000415: DUP9
00000416: PUSH1 0x01
00000418: PUSH1 0x01
0000041a: PUSH1 0xa0
0000041c: SHL
0000041d: SUB
0000041e: AND
0000041f: PUSH4 0x70a08231
00000424: ADDRESS
00000425: PUSH1 0x40
00000427: MLOAD
00000428: DUP3
00000429: PUSH4 0xffffffff
0000042e: AND
0000042f: PUSH1 0xe0
00000431: SHL
00000432: DUP2
00000433: MSTORE
00000434: PUSH1 0x04
00000436: ADD
00000437: DUP1
00000438: DUP3
00000439: PUSH1 0x01
0000043b: PUSH1 0x01
0000043d: PUSH1 0xa0
0000043f: SHL
00000440: SUB
00000441: AND
00000442: DUP2
00000443: MSTORE
00000444: PUSH1 0x20
00000446: ADD
00000447: SWAP2
00000448: POP
00000449: POP
0000044a: PUSH1 0x20
0000044c: PUSH1 0x40
0000044e: MLOAD
0000044f: DUP1
00000450: DUP4
00000451: SUB
00000452: DUP2
00000453: DUP7
00000454: DUP1
00000455: EXTCODESIZE
00000456: ISZERO
00000457: DUP1
00000458: ISZERO
00000459: PUSH2 0x0461
0000045c: JUMPI
0000045d: PUSH1 0x00
0000045f: DUP1
00000460: REVERT
00000461: JUMPDEST
00000462: POP
00000463: GAS
00000464: STATICCALL
00000465: ISZERO
00000466: DUP1
00000467: ISZERO
00000468: PUSH2 0x0475
0000046b: JUMPI
0000046c: RETURNDATASIZE
0000046d: PUSH1 0x00
0000046f: DUP1
00000470: RETURNDATACOPY
00000471: RETURNDATASIZE
00000472: PUSH1 0x00
00000474: REVERT
00000475: JUMPDEST
00000476: POP
00000477: POP
00000478: POP
00000479: POP
0000047a: PUSH1 0x40
0000047c: MLOAD
0000047d: RETURNDATASIZE
0000047e: PUSH1 0x20
00000480: DUP2
00000481: LT
00000482: ISZERO
00000483: PUSH2 0x048b
00000486: JUMPI
00000487: PUSH1 0x00
00000489: DUP1
0000048a: REVERT
0000048b: JUMPDEST
0000048c: POP
0000048d: MLOAD
0000048e: PUSH1 0x40
00000490: DUP1
00000491: MLOAD
00000492: PUSH1 0x01
00000494: PUSH1 0x01
00000496: PUSH1 0xe0
00000498: SHL
00000499: SUB
0000049a: NOT
0000049b: PUSH1 0xe0
0000049d: DUP7
0000049e: SWAP1
0000049f: SHL
000004a0: AND
000004a1: DUP2
000004a2: MSTORE
000004a3: PUSH1 0x01
000004a5: PUSH1 0x01
000004a7: PUSH1 0xa0
000004a9: SHL
000004aa: SUB
000004ab: SWAP1
000004ac: SWAP4
000004ad: AND
000004ae: PUSH1 0x04
000004b0: DUP5
000004b1: ADD
000004b2: MSTORE
000004b3: PUSH1 0x24
000004b5: DUP4
000004b6: ADD
000004b7: SWAP2
000004b8: SWAP1
000004b9: SWAP2
000004ba: MSTORE
000004bb: MLOAD
000004bc: PUSH1 0x44
000004be: DUP1
000004bf: DUP4
000004c0: ADD
000004c1: SWAP3
000004c2: PUSH1 0x00
000004c4: SWAP3
000004c5: SWAP2
000004c6: SWAP1
000004c7: DUP3
000004c8: SWAP1
000004c9: SUB
000004ca: ADD
000004cb: DUP2
000004cc: DUP4
000004cd: DUP8
000004ce: DUP1
000004cf: EXTCODESIZE
000004d0: ISZERO
000004d1: DUP1
000004d2: ISZERO
000004d3: PUSH2 0x04db
000004d6: JUMPI
000004d7: PUSH1 0x00
000004d9: DUP1
000004da: REVERT
000004db: JUMPDEST
000004dc: POP
000004dd: GAS
000004de: CALL
000004df: ISZERO
000004e0: DUP1
000004e1: ISZERO
000004e2: PUSH2 0x04ef
000004e5: JUMPI
000004e6: RETURNDATASIZE
000004e7: PUSH1 0x00
000004e9: DUP1
000004ea: RETURNDATACOPY
000004eb: RETURNDATASIZE
000004ec: PUSH1 0x00
000004ee: REVERT
000004ef: JUMPDEST
000004f0: POP
000004f1: POP
000004f2: POP
000004f3: POP
000004f4: PUSH1 0x00
000004f6: DUP6
000004f7: PUSH1 0x01
000004f9: PUSH1 0x01
000004fb: PUSH1 0xa0
000004fd: SHL
000004fe: SUB
000004ff: AND
00000500: PUSH4 0x6a627842
00000505: ADDRESS
00000506: PUSH1 0x40
00000508: MLOAD
00000509: DUP3
0000050a: PUSH4 0xffffffff
0000050f: AND
00000510: PUSH1 0xe0
00000512: SHL
00000513: DUP2
00000514: MSTORE
00000515: PUSH1 0x04
00000517: ADD
00000518: DUP1
00000519: DUP3
0000051a: PUSH1 0x01
0000051c: PUSH1 0x01
0000051e: PUSH1 0xa0
00000520: SHL
00000521: SUB
00000522: AND
00000523: DUP2
00000524: MSTORE
00000525: PUSH1 0x20
00000527: ADD
00000528: SWAP2
00000529: POP
0000052a: POP
0000052b: PUSH1 0x20
0000052d: PUSH1 0x40
0000052f: MLOAD
00000530: DUP1
00000531: DUP4
00000532: SUB
00000533: DUP2
00000534: PUSH1 0x00
00000536: DUP8
00000537: DUP1
00000538: EXTCODESIZE
00000539: ISZERO
0000053a: DUP1
0000053b: ISZERO
0000053c: PUSH2 0x0544
0000053f: JUMPI
00000540: PUSH1 0x00
00000542: DUP1
00000543: REVERT
00000544: JUMPDEST
00000545: POP
00000546: GAS
00000547: CALL
00000548: ISZERO
00000549: DUP1
0000054a: ISZERO
0000054b: PUSH2 0x0558
0000054e: JUMPI
0000054f: RETURNDATASIZE
00000550: PUSH1 0x00
00000552: DUP1
00000553: RETURNDATACOPY
00000554: RETURNDATASIZE
00000555: PUSH1 0x00
00000557: REVERT
00000558: JUMPDEST
00000559: POP
0000055a: POP
0000055b: POP
0000055c: POP
0000055d: PUSH1 0x40
0000055f: MLOAD
00000560: RETURNDATASIZE
00000561: PUSH1 0x20
00000563: DUP2
00000564: LT
00000565: ISZERO
00000566: PUSH2 0x056e
00000569: JUMPI
0000056a: PUSH1 0x00
0000056c: DUP1
0000056d: REVERT
0000056e: JUMPDEST
0000056f: POP
00000570: MLOAD
00000571: PUSH1 0x40
00000573: DUP1
00000574: MLOAD
00000575: PUSH4 0x095ea7b3
0000057a: PUSH1 0xe0
0000057c: SHL
0000057d: DUP2
0000057e: MSTORE
0000057f: PUSH1 0x01
00000581: PUSH1 0x01
00000583: PUSH1 0xa0
00000585: SHL
00000586: SUB
00000587: DUP7
00000588: DUP2
00000589: AND
0000058a: PUSH1 0x04
0000058c: DUP4
0000058d: ADD
0000058e: MSTORE
0000058f: PUSH1 0x24
00000591: DUP3
00000592: ADD
00000593: DUP5
00000594: SWAP1
00000595: MSTORE
00000596: SWAP2
00000597: MLOAD
00000598: SWAP3
00000599: SWAP4
0000059a: POP
0000059b: SWAP1
0000059c: DUP9
0000059d: AND
0000059e: SWAP2
0000059f: PUSH4 0x095ea7b3
000005a4: SWAP2
000005a5: PUSH1 0x44
000005a7: DUP1
000005a8: DUP3
000005a9: ADD
000005aa: SWAP3
000005ab: PUSH1 0x00
000005ad: SWAP3
000005ae: SWAP1
000005af: SWAP2
000005b0: SWAP1
000005b1: DUP3
000005b2: SWAP1
000005b3: SUB
000005b4: ADD
000005b5: DUP2
000005b6: DUP4
000005b7: DUP8
000005b8: DUP1
000005b9: EXTCODESIZE
000005ba: ISZERO
000005bb: DUP1
000005bc: ISZERO
000005bd: PUSH2 0x05c5
000005c0: JUMPI
000005c1: PUSH1 0x00
000005c3: DUP1
000005c4: REVERT
000005c5: JUMPDEST
000005c6: POP
000005c7: GAS
000005c8: CALL
000005c9: ISZERO
000005ca: DUP1
000005cb: ISZERO
000005cc: PUSH2 0x05d9
000005cf: JUMPI
000005d0: RETURNDATASIZE
000005d1: PUSH1 0x00
000005d3: DUP1
000005d4: RETURNDATACOPY
000005d5: RETURNDATASIZE
000005d6: PUSH1 0x00
000005d8: REVERT
000005d9: JUMPDEST
000005da: POP
000005db: POP
000005dc: PUSH1 0x40
000005de: DUP1
000005df: MLOAD
000005e0: PUSH4 0xaf2979eb
000005e5: PUSH1 0xe0
000005e7: SHL
000005e8: DUP2
000005e9: MSTORE
000005ea: PUSH1 0x01
000005ec: PUSH1 0x01
000005ee: PUSH1 0xa0
000005f0: SHL
000005f1: SUB
000005f2: DUP12
000005f3: DUP2
000005f4: AND
000005f5: PUSH1 0x04
000005f7: DUP4
000005f8: ADD
000005f9: MSTORE
000005fa: PUSH1 0x24
000005fc: DUP3
000005fd: ADD
000005fe: DUP7
000005ff: SWAP1
00000600: MSTORE
00000601: PUSH1 0x00
00000603: PUSH1 0x44
00000605: DUP4
00000606: ADD
00000607: DUP2
00000608: SWAP1
00000609: MSTORE
0000060a: PUSH1 0x64
0000060c: DUP4
0000060d: ADD
0000060e: DUP2
0000060f: SWAP1
00000610: MSTORE
00000611: ADDRESS
00000612: PUSH1 0x84
00000614: DUP5
00000615: ADD
00000616: MSTORE
00000617: PUSH1 0x1e
00000619: TIMESTAMP
0000061a: ADD
0000061b: PUSH1 0xa4
0000061d: DUP5
0000061e: ADD
0000061f: MSTORE
00000620: SWAP3
00000621: MLOAD
00000622: SWAP1
00000623: DUP9
00000624: AND
00000625: SWAP5
00000626: POP
00000627: PUSH4 0xaf2979eb
0000062c: SWAP4
0000062d: POP
0000062e: PUSH1 0xc4
00000630: DUP1
00000631: DUP4
00000632: ADD
00000633: SWAP4
00000634: PUSH1 0x20
00000636: SWAP4
00000637: DUP4
00000638: SWAP1
00000639: SUB
0000063a: SWAP1
0000063b: SWAP2
0000063c: ADD
0000063d: SWAP1
0000063e: DUP3
0000063f: SWAP1
00000640: DUP8
00000641: DUP1
00000642: EXTCODESIZE
00000643: ISZERO
00000644: DUP1
00000645: ISZERO
00000646: PUSH2 0x064e
00000649: JUMPI
0000064a: PUSH1 0x00
0000064c: DUP1
0000064d: REVERT
0000064e: JUMPDEST
0000064f: POP
00000650: GAS
00000651: CALL
00000652: ISZERO
00000653: DUP1
00000654: ISZERO
00000655: PUSH2 0x0662
00000658: JUMPI
00000659: RETURNDATASIZE
0000065a: PUSH1 0x00
0000065c: DUP1
0000065d: RETURNDATACOPY
0000065e: RETURNDATASIZE
0000065f: PUSH1 0x00
00000661: REVERT
00000662: JUMPDEST
00000663: POP
00000664: POP
00000665: POP
00000666: POP
00000667: PUSH1 0x40
00000669: MLOAD
0000066a: RETURNDATASIZE
0000066b: PUSH1 0x20
0000066d: DUP2
0000066e: LT
0000066f: ISZERO
00000670: PUSH2 0x0678
00000673: JUMPI
00000674: PUSH1 0x00
00000676: DUP1
00000677: REVERT
00000678: JUMPDEST
00000679: POP
0000067a: POP
0000067b: DUP4
0000067c: ISZERO
0000067d: PUSH2 0x068a
00000680: JUMPI
00000681: PUSH2 0x068a
00000684: DUP8
00000685: DUP7
00000686: PUSH2 0x0709
00000689: JUMP
0000068a: JUMPDEST
0000068b: POP
0000068c: POP
0000068d: POP
0000068e: JUMPDEST
0000068f: POP
00000690: POP
00000691: POP
00000692: POP
00000693: JUMP
00000694: JUMPDEST
00000695: PUSH1 0x00
00000697: SLOAD
00000698: PUSH1 0x01
0000069a: PUSH1 0x01
0000069c: PUSH1 0xa0
0000069e: SHL
0000069f: SUB
000006a0: AND
000006a1: CALLER
000006a2: EQ
000006a3: PUSH2 0x06ab
000006a6: JUMPI
000006a7: PUSH1 0x00
000006a9: DUP1
000006aa: REVERT
000006ab: JUMPDEST
000006ac: DUP4
000006ad: PUSH1 0x01
000006af: PUSH1 0x01
000006b1: PUSH1 0xa0
000006b3: SHL
000006b4: SUB
000006b5: AND
000006b6: DUP4
000006b7: DUP4
000006b8: DUP4
000006b9: PUSH1 0x40
000006bb: MLOAD
000006bc: DUP1
000006bd: DUP4
000006be: DUP4
000006bf: DUP1
000006c0: DUP3
000006c1: DUP5
000006c2: CALLDATACOPY
000006c3: PUSH1 0x40
000006c5: MLOAD
000006c6: SWAP3
000006c7: ADD
000006c8: SWAP5
000006c9: POP
000006ca: PUSH1 0x00
000006cc: SWAP4
000006cd: POP
000006ce: SWAP1
000006cf: SWAP2
000006d0: POP
000006d1: POP
000006d2: DUP1
000006d3: DUP4
000006d4: SUB
000006d5: DUP2
000006d6: DUP6
000006d7: DUP8
000006d8: GAS
000006d9: CALL
000006da: SWAP3
000006db: POP
000006dc: POP
000006dd: POP
000006de: RETURNDATASIZE
000006df: DUP1
000006e0: PUSH1 0x00
000006e2: DUP2
000006e3: EQ
000006e4: PUSH2 0x068a
000006e7: JUMPI
000006e8: PUSH1 0x40
000006ea: MLOAD
000006eb: SWAP2
000006ec: POP
000006ed: PUSH1 0x1f
000006ef: NOT
000006f0: PUSH1 0x3f
000006f2: RETURNDATASIZE
000006f3: ADD
000006f4: AND
000006f5: DUP3
000006f6: ADD
000006f7: PUSH1 0x40
000006f9: MSTORE
000006fa: RETURNDATASIZE
000006fb: DUP3
000006fc: MSTORE
000006fd: RETURNDATASIZE
000006fe: PUSH1 0x00
00000700: PUSH1 0x20
00000702: DUP5
00000703: ADD
00000704: RETURNDATACOPY
00000705: PUSH2 0x068a
00000708: JUMP
00000709: JUMPDEST
0000070a: PUSH1 0x00
0000070c: PUSH1 0x01
0000070e: DUP3
0000070f: ISZERO
00000710: ISZERO
00000711: EQ
00000712: PUSH2 0x0726
00000715: JUMPI
00000716: PUSH1 0x03
00000718: SLOAD
00000719: PUSH1 0x01
0000071b: PUSH1 0x01
0000071d: PUSH1 0xa0
0000071f: SHL
00000720: SUB
00000721: AND
00000722: PUSH2 0x0733
00000725: JUMP
00000726: JUMPDEST
00000727: PUSH1 0x02
00000729: SLOAD
0000072a: PUSH1 0x01
0000072c: PUSH1 0x01
0000072e: PUSH1 0xa0
00000730: SHL
00000731: SUB
00000732: AND
00000733: JUMPDEST
00000734: SWAP1
00000735: POP
00000736: PUSH1 0x00
00000738: DUP4
00000739: PUSH1 0x01
0000073b: PUSH1 0x01
0000073d: PUSH1 0xa0
0000073f: SHL
00000740: SUB
00000741: AND
00000742: PUSH4 0x70a08231
00000747: ADDRESS
00000748: PUSH1 0x40
0000074a: MLOAD
0000074b: DUP3
0000074c: PUSH4 0xffffffff
00000751: AND
00000752: PUSH1 0xe0
00000754: SHL
00000755: DUP2
00000756: MSTORE
00000757: PUSH1 0x04
00000759: ADD
0000075a: DUP1
0000075b: DUP3
0000075c: PUSH1 0x01
0000075e: PUSH1 0x01
00000760: PUSH1 0xa0
00000762: SHL
00000763: SUB
00000764: AND
00000765: DUP2
00000766: MSTORE
00000767: PUSH1 0x20
00000769: ADD
0000076a: SWAP2
0000076b: POP
0000076c: POP
0000076d: PUSH1 0x20
0000076f: PUSH1 0x40
00000771: MLOAD
00000772: DUP1
00000773: DUP4
00000774: SUB
00000775: DUP2
00000776: DUP7
00000777: DUP1
00000778: EXTCODESIZE
00000779: ISZERO
0000077a: DUP1
0000077b: ISZERO
0000077c: PUSH2 0x0784
0000077f: JUMPI
00000780: PUSH1 0x00
00000782: DUP1
00000783: REVERT
00000784: JUMPDEST
00000785: POP
00000786: GAS
00000787: STATICCALL
00000788: ISZERO
00000789: DUP1
0000078a: ISZERO
0000078b: PUSH2 0x0798
0000078e: JUMPI
0000078f: RETURNDATASIZE
00000790: PUSH1 0x00
00000792: DUP1
00000793: RETURNDATACOPY
00000794: RETURNDATASIZE
00000795: PUSH1 0x00
00000797: REVERT
00000798: JUMPDEST
00000799: POP
0000079a: POP
0000079b: POP
0000079c: POP
0000079d: PUSH1 0x40
0000079f: MLOAD
000007a0: RETURNDATASIZE
000007a1: PUSH1 0x20
000007a3: DUP2
000007a4: LT
000007a5: ISZERO
000007a6: PUSH2 0x07ae
000007a9: JUMPI
000007aa: PUSH1 0x00
000007ac: DUP1
000007ad: REVERT
000007ae: JUMPDEST
000007af: POP
000007b0: MLOAD
000007b1: SWAP1
000007b2: POP
000007b3: DUP1
000007b4: PUSH2 0x07be
000007b7: JUMPI
000007b8: POP
000007b9: POP
000007ba: PUSH2 0x0171
000007bd: JUMP
000007be: JUMPDEST
000007bf: DUP4
000007c0: PUSH1 0x01
000007c2: PUSH1 0x01
000007c4: PUSH1 0xa0
000007c6: SHL
000007c7: SUB
000007c8: AND
000007c9: PUSH4 0x095ea7b3
000007ce: DUP4
000007cf: DUP4
000007d0: PUSH1 0x40
000007d2: MLOAD
000007d3: DUP4
000007d4: PUSH4 0xffffffff
000007d9: AND
000007da: PUSH1 0xe0
000007dc: SHL
000007dd: DUP2
000007de: MSTORE
000007df: PUSH1 0x04
000007e1: ADD
000007e2: DUP1
000007e3: DUP4
000007e4: PUSH1 0x01
000007e6: PUSH1 0x01
000007e8: PUSH1 0xa0
000007ea: SHL
000007eb: SUB
000007ec: AND
000007ed: DUP2
000007ee: MSTORE
000007ef: PUSH1 0x20
000007f1: ADD
000007f2: DUP3
000007f3: DUP2
000007f4: MSTORE
000007f5: PUSH1 0x20
000007f7: ADD
000007f8: SWAP3
000007f9: POP
000007fa: POP
000007fb: POP
000007fc: PUSH1 0x00
000007fe: PUSH1 0x40
00000800: MLOAD
00000801: DUP1
00000802: DUP4
00000803: SUB
00000804: DUP2
00000805: PUSH1 0x00
00000807: DUP8
00000808: DUP1
00000809: EXTCODESIZE
0000080a: ISZERO
0000080b: DUP1
0000080c: ISZERO
0000080d: PUSH2 0x0815
00000810: JUMPI
00000811: PUSH1 0x00
00000813: DUP1
00000814: REVERT
00000815: JUMPDEST
00000816: POP
00000817: GAS
00000818: CALL
00000819: ISZERO
0000081a: DUP1
0000081b: ISZERO
0000081c: PUSH2 0x0829
0000081f: JUMPI
00000820: RETURNDATASIZE
00000821: PUSH1 0x00
00000823: DUP1
00000824: RETURNDATACOPY
00000825: RETURNDATASIZE
00000826: PUSH1 0x00
00000828: REVERT
00000829: JUMPDEST
0000082a: POP
0000082b: POP
0000082c: PUSH1 0x40
0000082e: DUP1
0000082f: MLOAD
00000830: PUSH1 0x02
00000832: DUP1
00000833: DUP3
00000834: MSTORE
00000835: PUSH1 0x60
00000837: DUP1
00000838: DUP4
00000839: ADD
0000083a: DUP5
0000083b: MSTORE
0000083c: SWAP5
0000083d: POP
0000083e: SWAP1
0000083f: SWAP3
00000840: POP
00000841: SWAP1
00000842: PUSH1 0x20
00000844: DUP4
00000845: ADD
00000846: SWAP1
00000847: DUP1
00000848: CALLDATASIZE
00000849: DUP4
0000084a: CALLDATACOPY
0000084b: ADD
0000084c: SWAP1
0000084d: POP
0000084e: POP
0000084f: SWAP1
00000850: POP
00000851: DUP5
00000852: DUP2
00000853: PUSH1 0x00
00000855: DUP2
00000856: MLOAD
00000857: DUP2
00000858: LT
00000859: PUSH2 0x085e
0000085c: JUMPI
0000085d: INVALID
0000085e: JUMPDEST
0000085f: PUSH1 0x01
00000861: PUSH1 0x01
00000863: PUSH1 0xa0
00000865: SHL
00000866: SUB
00000867: SWAP3
00000868: DUP4
00000869: AND
0000086a: PUSH1 0x20
0000086c: SWAP2
0000086d: DUP3
0000086e: MUL
0000086f: SWAP3
00000870: SWAP1
00000871: SWAP3
00000872: ADD
00000873: ADD
00000874: MSTORE
00000875: PUSH1 0x01
00000877: DUP1
00000878: SLOAD
00000879: DUP4
0000087a: MLOAD
0000087b: SWAP3
0000087c: AND
0000087d: SWAP2
0000087e: DUP4
0000087f: SWAP2
00000880: SWAP1
00000881: DUP2
00000882: LT
00000883: PUSH2 0x0888
00000886: JUMPI
00000887: INVALID
00000888: JUMPDEST
00000889: PUSH1 0x20
0000088b: MUL
0000088c: PUSH1 0x20
0000088e: ADD
0000088f: ADD
00000890: SWAP1
00000891: PUSH1 0x01
00000893: PUSH1 0x01
00000895: PUSH1 0xa0
00000897: SHL
00000898: SUB
00000899: AND
0000089a: SWAP1
0000089b: DUP2
0000089c: PUSH1 0x01
0000089e: PUSH1 0x01
000008a0: PUSH1 0xa0
000008a2: SHL
000008a3: SUB
000008a4: AND
000008a5: DUP2
000008a6: MSTORE
000008a7: POP
000008a8: POP
000008a9: DUP3
000008aa: PUSH1 0x01
000008ac: PUSH1 0x01
000008ae: PUSH1 0xa0
000008b0: SHL
000008b1: SUB
000008b2: AND
000008b3: PUSH4 0x5c11d795
000008b8: DUP4
000008b9: PUSH1 0x00
000008bb: DUP5
000008bc: ADDRESS
000008bd: TIMESTAMP
000008be: PUSH1 0x1e
000008c0: ADD
000008c1: PUSH1 0x40
000008c3: MLOAD
000008c4: DUP7
000008c5: PUSH4 0xffffffff
000008ca: AND
000008cb: PUSH1 0xe0
000008cd: SHL
000008ce: DUP2
000008cf: MSTORE
000008d0: PUSH1 0x04
000008d2: ADD
000008d3: DUP1
000008d4: DUP7
000008d5: DUP2
000008d6: MSTORE
000008d7: PUSH1 0x20
000008d9: ADD
000008da: DUP6
000008db: DUP2
000008dc: MSTORE
000008dd: PUSH1 0x20
000008df: ADD
000008e0: DUP1
000008e1: PUSH1 0x20
000008e3: ADD
000008e4: DUP5
000008e5: PUSH1 0x01
000008e7: PUSH1 0x01
000008e9: PUSH1 0xa0
000008eb: SHL
000008ec: SUB
000008ed: AND
000008ee: DUP2
000008ef: MSTORE
000008f0: PUSH1 0x20
000008f2: ADD
000008f3: DUP4
000008f4: DUP2
000008f5: MSTORE
000008f6: PUSH1 0x20
000008f8: ADD
000008f9: DUP3
000008fa: DUP2
000008fb: SUB
000008fc: DUP3
000008fd: MSTORE
000008fe: DUP6
000008ff: DUP2
00000900: DUP2
00000901: MLOAD
00000902: DUP2
00000903: MSTORE
00000904: PUSH1 0x20
00000906: ADD
00000907: SWAP2
00000908: POP
00000909: DUP1
0000090a: MLOAD
0000090b: SWAP1
0000090c: PUSH1 0x20
0000090e: ADD
0000090f: SWAP1
00000910: PUSH1 0x20
00000912: MUL
00000913: DUP1
00000914: DUP4
00000915: DUP4
00000916: PUSH1 0x00
00000918: JUMPDEST
00000919: DUP4
0000091a: DUP2
0000091b: LT
0000091c: ISZERO
0000091d: PUSH2 0x0930
00000920: JUMPI
00000921: DUP2
00000922: DUP2
00000923: ADD
00000924: MLOAD
00000925: DUP4
00000926: DUP3
00000927: ADD
00000928: MSTORE
00000929: PUSH1 0x20
0000092b: ADD
0000092c: PUSH2 0x0918
0000092f: JUMP
00000930: JUMPDEST
00000931: POP
00000932: POP
00000933: POP
00000934: POP
00000935: SWAP1
00000936: POP
00000937: ADD
00000938: SWAP7
00000939: POP
0000093a: POP
0000093b: POP
0000093c: POP
0000093d: POP
0000093e: POP
0000093f: POP
00000940: PUSH1 0x00
00000942: PUSH1 0x40
00000944: MLOAD
00000945: DUP1
00000946: DUP4
00000947: SUB
00000948: DUP2
00000949: PUSH1 0x00
0000094b: DUP8
0000094c: DUP1
0000094d: EXTCODESIZE
0000094e: ISZERO
0000094f: DUP1
00000950: ISZERO
00000951: PUSH2 0x0959
00000954: JUMPI
00000955: PUSH1 0x00
00000957: DUP1
00000958: REVERT
00000959: JUMPDEST
0000095a: POP
0000095b: GAS
0000095c: CALL
0000095d: ISZERO
0000095e: DUP1
0000095f: ISZERO
00000960: PUSH2 0x096d
00000963: JUMPI
00000964: RETURNDATASIZE
00000965: PUSH1 0x00
00000967: DUP1
00000968: RETURNDATACOPY
00000969: RETURNDATASIZE
0000096a: PUSH1 0x00
0000096c: REVERT
0000096d: JUMPDEST
0000096e: POP
0000096f: POP
00000970: POP
00000971: POP
00000972: POP
00000973: POP
00000974: POP
00000975: POP
00000976: POP
00000977: JUMP
00000978: INVALID
00000979: LOG2
0000097a: PUSH5 0x6970667358
00000980: UNKNOWN(0x22)
00000981: SLT
00000982: KECCAK256
00000983: SWAP16
00000984: UNKNOWN(0x21)
00000985: UNKNOWN(0x2A)
00000986: UNKNOWN(0xF6)
00000987: PUSH27 0x57393133100856448905fd8d192ade229dd653ae6f9262838aa13a
000009a3: PUSH5 0x736f6c6343
000009a9: STOP
000009aa: SMOD
000009ab: ADD
000009ac: STOP
000009ad: CALLER

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
high auth detector Authorization based on tx.origin 70 no
view
validation_json
{
    "reason": "missing sink mapping",
    "status": "no_sink"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x5074171d",
            "selector": "0x5074171d",
            "calldata_variants": [
                "0x5074171d",
                "0x5074171d0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x856acdc2",
            "selector": "0x856acdc2",
            "calldata_variants": [
                "0x856acdc2",
                "0x856acdc20000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xcc9ce197",
            "selector": "0xcc9ce197",
            "calldata_variants": [
                "0xcc9ce197",
                "0xcc9ce1970000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "guards_detected": [
        {
            "pc": 350,
            "type": "tx_origin_used"
        },
        {
            "pc": 387,
            "type": "tx_origin_used"
        },
        {
            "pc": 349,
            "type": "tx_origin_used"
        },
        {
            "pc": 386,
            "type": "tx_origin_used"
        }
    ]
}
medium other detector Untrusted CALL target/value reachable 45 no no
view
trace_id: 0x30e60a269ce72b13584f7a8456cd2824182b7b926796a528607f5d5a62636a5b
call_targets: 0x15b73dcf773700e1120ce54065ba49410fdb17aa
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0x30e60a269ce72b13584f7a8456cd2824182b7b926796a528607f5d5a62636a5b",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x15b73dcf773700e1120ce54065ba49410fdb17aa"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x5074171d",
            "selector": "0x5074171d",
            "calldata_variants": [
                "0x5074171d",
                "0x5074171d0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x856acdc2",
            "selector": "0x856acdc2",
            "calldata_variants": [
                "0x856acdc2",
                "0x856acdc20000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xcc9ce197",
            "selector": "0xcc9ce197",
            "calldata_variants": [
                "0xcc9ce197",
                "0xcc9ce1970000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 893,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 1007,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 1246,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "call_count": 9,
    "guards_detected": [
        {
            "pc": 350,
            "type": "tx_origin_used"
        },
        {
            "pc": 387,
            "type": "tx_origin_used"
        },
        {
            "pc": 349,
            "type": "tx_origin_used"
        },
        {
            "pc": 386,
            "type": "tx_origin_used"
        }
    ],
    "untrusted_call_count": 9
}
medium other detector ETH value transfer possible 40 no no
view
trace_id: 0x30e60a269ce72b13584f7a8456cd2824182b7b926796a528607f5d5a62636a5b
call_targets: 0x15b73dcf773700e1120ce54065ba49410fdb17aa
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0x30e60a269ce72b13584f7a8456cd2824182b7b926796a528607f5d5a62636a5b",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x15b73dcf773700e1120ce54065ba49410fdb17aa"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x5074171d",
            "selector": "0x5074171d",
            "calldata_variants": [
                "0x5074171d",
                "0x5074171d0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x856acdc2",
            "selector": "0x856acdc2",
            "calldata_variants": [
                "0x856acdc2",
                "0x856acdc20000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xcc9ce197",
            "selector": "0xcc9ce197",
            "calldata_variants": [
                "0xcc9ce197",
                "0xcc9ce1970000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 893,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 1007,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 1246,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "eth_value_calls": 9,
    "guards_detected": [
        {
            "pc": 350,
            "type": "tx_origin_used"
        },
        {
            "pc": 387,
            "type": "tx_origin_used"
        },
        {
            "pc": 349,
            "type": "tx_origin_used"
        },
        {
            "pc": 386,
            "type": "tx_origin_used"
        }
    ]
}
info other cast Heavy EXTCODE*/BALANCE usage 55 no
view
evidence_json
{
    "notes": "frequent external code or balance checks; may indicate introspection or validation logic",
    "ext_balance_count": 11
}
info other cast Heavy CALL-family usage 55 no
view
evidence_json
{
    "notes": "large number of CALL/CALLCODE/STATICCALL opcodes; review external call patterns",
    "call_family_count": 12
}