TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

6e2ea2d8-8456-48aa-a3cd-ac8994612982

failed
Chain ID
1
Address
Block Number
Created
Mon, Jan 5, 2026 1:28 AM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
0
Validated
0
Source
Verified
Review Backing
Not yet
Best current signal
Untrusted CALL target/value reachable
crit 0 high 0 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
31636 report.consolidate complete 1 / 1 3 months ago
111614 artifact.fetch failed 1 / 3 1 week ago
111615 tool.cast_disasm complete 1 / 3 1 week ago
111616 analysis.bundle complete 1 / 3 1 week ago
111617 capability.graph complete 1 / 3 1 week ago
111618 detector.run complete 1 / 3 1 week ago
111619 validation.fork complete 1 / 3 1 week ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no
Implementation:
Verified Source: yes

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate
Job Status
complete
Attempts
1 / 1
Findings
0
No findings?
yes
Summary
Reviewed AUDIT_BUNDLE.txt (contracts/Contract.sol). No concrete, exploitable path to extract ETH/tokens found under the stated assumptions (admin/debugger trusted, callers list controlled).
View stderr
[codex:429351] OpenAI Codex v0.77.0 (research preview)
[codex:429351] --------
[codex:429351] workdir: /tmp/codex-multi-zk95m9ev
[codex:429351] model: gpt-5.2-codex
[codex:429351] provider: openai
[codex:429351] approval: never
[codex:429351] sandbox: read-only
[codex:429351] reasoning effort: xhigh
[codex:429351] reasoning summaries: auto
[codex:429351] session id: 019b8bc5-55ca-7652-b9c9-8391db9e0ce6
[codex:429351] --------
[codex:429351] user
[codex:429351] You are a profit-focused exploit hunter. Your ONLY goal is finding ways to extract value (ETH, tokens, NFTs) from this contract.
[codex:429351] 
[codex:429351] Read `AUDIT_BUNDLE.txt` completely before concluding. Treat `lib/` and `@openzeppelin/` as trusted unless misused.
[codex:429351] 
[codex:429351] ONLY REPORT if you find a CONCRETE, EXPLOITABLE path to profit. We do NOT care about:
[codex:429351] - Gas inefficiency, code quality, naming, or best practices
[codex:429351] - Theoretical vulnerabilities without a clear extraction path
[codex:429351] - Centralization risks (admin can rug) - assume admin keys are secure
[codex:429351] - Front-running unless it enables theft beyond MEV
[codex:429351] - DoS, griefing, or issues that don't result in attacker profit
[codex:429351] - Missing events, view function issues, or informational findings
[codex:429351] 
[codex:429351] HIGH-VALUE PATTERNS TO HUNT:
[codex:429351] - Reentrancy: external calls before state updates that allow double-withdrawal
[codex:429351] - Access control: missing/bypassable auth on withdraw, transfer, or mint functions
[codex:429351] - Flash loan attacks: borrow -> manipulate -> profit in single tx
[codex:429351] - Price oracle manipulation: TWAP with short window, spot price reads, stale prices
[codex:429351] - Signature replay: missing nonce, chainId, or deadline in permit/meta-tx
[codex:429351] - Proxy hijacking: unprotected initialize(), storage collision, UUPS without auth
[codex:429351] - Accounting errors: rounding that favors attacker, share inflation, first depositor attacks
[codex:429351] - Unchecked external calls: return value ignored on token transfers enabling fake tokens
[codex:429351] - Cross-function reentrancy: state read in function A, modified via reentrant call, used stale in A
[codex:429351] 
[codex:429351] For each finding, you MUST provide:
[codex:429351] 1. Exact file and line numbers of vulnerable code
[codex:429351] 2. Step-by-step exploit transaction sequence
[codex:429351] 3. Estimated profit potential (order of magnitude: contract balance, LP reserves, etc.)
[codex:429351] 
[codex:429351] If no concrete profit path exists: set no_findings=true. Do NOT pad with low-severity noise.
[codex:429351] 
[codex:429351] Output MUST be valid JSON matching the provided schema.
[codex:429351] - severity: info, low, medium, high, critical (use high/critical ONLY for clear extraction paths)
[codex:429351] - category: access_control, reentrancy, math, oracle, upgradeability, auth, other
[codex:429351] mcp startup: no servers
[codex:429351] 
[codex:429351] thinking
[codex:429351] **Preparing to read AUDIT_BUNDLE**
[codex:429351] exec
[codex:429351] /bin/bash -lc ls in /tmp/codex-multi-zk95m9ev succeeded in 5ms:
[codex:429351] AUDIT_BUNDLE.txt
[codex:429351] codex-output-schema.json
[codex:429351] contracts
[codex:429351] exec
[codex:429351] /bin/bash -lc 'cat AUDIT_BUNDLE.txt' in /tmp/codex-multi-zk95m9ev succeeded in 6ms:
[codex:429351] This file concatenates first-party Solidity sources only (lib/@openzeppelin excluded).
[codex:429351] 
[codex:429351] ================================================================================
[codex:429351] FILE: contracts/Contract.sol
[codex:429351] ================================================================================
[codex:429351] // File: contracts/EtherMiners/interfaces/IEmPool.sol
[codex:429351] 
[codex:429351] pragma solidity >=0.4.22 <0.6.0;
[codex:429351] 
[codex:429351] contract IEmPool {
[codex:429351]    function deposit() public payable;
[codex:429351]    function withdraw(uint256 _value) external;
[codex:429351]    function withdrawTo(address _to, uint256 _value) public;
[codex:429351] }
[codex:429351] 
[codex:429351] // File: contracts/EtherMiners/interfaces/IDebug.sol
[codex:429351] 
[codex:429351] pragma solidity >=0.4.22 <0.6.0;
[codex:429351] 
[codex:429351] contract IDebug {
[codex:429351] 
[codex:429351] thinking
[codex:429351] **Continuing file inspection**
[codex:429351] exec
[codex:429351] /bin/bash -lc 'cat contracts/Contract.sol' in /tmp/codex-multi-zk95m9ev succeeded in 5ms:
[codex:429351] // File: contracts/EtherMiners/interfaces/IEmPool.sol
[codex:429351] 
[codex:429351] pragma solidity >=0.4.22 <0.6.0;
[codex:429351] 
[codex:429351] contract IEmPool {
[codex:429351]    function deposit() public payable;
[codex:429351]    function withdraw(uint256 _value) external;
[codex:429351]    function withdrawTo(address _to, uint256 _value) public;
[codex:429351] }
[codex:429351] 
[codex:429351] // File: contracts/EtherMiners/interfaces/IDebug.sol
[codex:429351] 
[codex:429351] pragma solidity >=0.4.22 <0.6.0;
[codex:429351] 
[codex:429351] contract IDebug {
[codex:429351]     // this function isn't abstract since the compiler emits automatically generated getter functions as external
[codex:429351]     function debugger() public pure returns (address){}
[codex:429351]     
[codex:429351]     function disableDebug() external;
[codex:429351] }
[codex:429351] 
[codex:429351] thinking
[codex:429351] **Assessing exploit possibilities in EmPool**
[codex:429351] codex
[codex:429351] {"no_findings":true,"summary":"Reviewed AUDIT_BUNDLE.txt (contracts/Contract.sol). No concrete, exploitable path to extract ETH/tokens found under the stated assumptions (admin/debugger trusted, callers list controlled).","findings":[]}
[codex:429351] tokens used
[codex:429351] 12,711
[codex:429351] {"no_findings":true,"summary":"Reviewed AUDIT_BUNDLE.txt (contracts/Contract.sol). No concrete, exploitable path to extract ETH/tokens found under the stated assumptions (admin/debugger trusted, callers list controlled).","findings":[]}
Metadata
{
    "codex": {
        "ran_at": "2026-01-05T01:28:57.830845+00:00",
        "returncode": 0
    },
    "summary": "Reviewed AUDIT_BUNDLE.txt (contracts/Contract.sol). No concrete, exploitable path to extract ETH/tokens found under the stated assumptions (admin/debugger trusted, callers list controlled).",
    "raw_final": {
        "summary": "Reviewed AUDIT_BUNDLE.txt (contracts/Contract.sol). No concrete, exploitable path to extract ETH/tokens found under the stated assumptions (admin/debugger trusted, callers list controlled).",
        "findings": [],
        "no_findings": true
    },
    "no_findings": true,
    "schema_version": 1
}

Opcode Heuristics

tool.cast_disasm
Delegatecall
0
Selfdestruct
0
CREATE2
0
CALL-family (heavy)
4
EXT*/BALANCE
1
Total opcodes
1180
Flags
No heuristic flags raised.
View cast disassembly output
00000000: PUSH1 0x80
00000002: PUSH1 0x40
00000004: MSTORE
00000005: PUSH1 0x04
00000007: CALLDATASIZE
00000008: LT
00000009: PUSH2 0x00c4
0000000c: JUMPI
0000000d: PUSH4 0xffffffff
00000012: PUSH29 0x0100000000000000000000000000000000000000000000000000000000
00000030: PUSH1 0x00
00000032: CALLDATALOAD
00000033: DIV
00000034: AND
00000035: PUSH4 0x0c18865e
0000003a: DUP2
0000003b: EQ
0000003c: PUSH2 0x00ce
0000003f: JUMPI
00000040: DUP1
00000041: PUSH4 0x205c2878
00000046: EQ
00000047: PUSH2 0x00ef
0000004a: JUMPI
0000004b: DUP1
0000004c: PUSH4 0x2e1a7d4d
00000051: EQ
00000052: PUSH2 0x0113
00000055: JUMPI
00000056: DUP1
00000057: PUSH4 0x70cfaa8d
0000005c: EQ
0000005d: PUSH2 0x012b
00000060: JUMPI
00000061: DUP1
00000062: PUSH4 0x73d4a13a
00000067: EQ
00000068: PUSH2 0x0152
0000006b: JUMPI
0000006c: DUP1
0000006d: PUSH4 0x7bbf4a3f
00000072: EQ
00000073: PUSH2 0x0183
00000076: JUMPI
00000077: DUP1
00000078: PUSH4 0xa6f2fd5c
0000007d: EQ
0000007e: PUSH2 0x01b8
00000081: JUMPI
00000082: DUP1
00000083: PUSH4 0xb0f545ba
00000088: EQ
00000089: PUSH2 0x01d2
0000008c: JUMPI
0000008d: DUP1
0000008e: PUSH4 0xb8b34132
00000093: EQ
00000094: PUSH2 0x01e7
00000097: JUMPI
00000098: DUP1
00000099: PUSH4 0xd0e30db0
0000009e: EQ
0000009f: PUSH2 0x00c4
000000a2: JUMPI
000000a3: DUP1
000000a4: PUSH4 0xee070805
000000a9: EQ
000000aa: PUSH2 0x01fc
000000ad: JUMPI
000000ae: DUP1
000000af: PUSH4 0xeef21cd2
000000b4: EQ
000000b5: PUSH2 0x0211
000000b8: JUMPI
000000b9: DUP1
000000ba: PUSH4 0xf359e65f
000000bf: EQ
000000c0: PUSH2 0x0232
000000c3: JUMPI
000000c4: JUMPDEST
000000c5: PUSH2 0x00cc
000000c8: PUSH2 0x025e
000000cb: JUMP
000000cc: JUMPDEST
000000cd: STOP
000000ce: JUMPDEST
000000cf: CALLVALUE
000000d0: DUP1
000000d1: ISZERO
000000d2: PUSH2 0x00da
000000d5: JUMPI
000000d6: PUSH1 0x00
000000d8: DUP1
000000d9: REVERT
000000da: JUMPDEST
000000db: POP
000000dc: PUSH2 0x00cc
000000df: PUSH1 0x01
000000e1: PUSH1 0xa0
000000e3: PUSH1 0x02
000000e5: EXP
000000e6: SUB
000000e7: PUSH1 0x04
000000e9: CALLDATALOAD
000000ea: AND
000000eb: PUSH2 0x0296
000000ee: JUMP
000000ef: JUMPDEST
000000f0: CALLVALUE
000000f1: DUP1
000000f2: ISZERO
000000f3: PUSH2 0x00fb
000000f6: JUMPI
000000f7: PUSH1 0x00
000000f9: DUP1
000000fa: REVERT
000000fb: JUMPDEST
000000fc: POP
000000fd: PUSH2 0x00cc
00000100: PUSH1 0x01
00000102: PUSH1 0xa0
00000104: PUSH1 0x02
00000106: EXP
00000107: SUB
00000108: PUSH1 0x04
0000010a: CALLDATALOAD
0000010b: AND
0000010c: PUSH1 0x24
0000010e: CALLDATALOAD
0000010f: PUSH2 0x0306
00000112: JUMP
00000113: JUMPDEST
00000114: CALLVALUE
00000115: DUP1
00000116: ISZERO
00000117: PUSH2 0x011f
0000011a: JUMPI
0000011b: PUSH1 0x00
0000011d: DUP1
0000011e: REVERT
0000011f: JUMPDEST
00000120: POP
00000121: PUSH2 0x00cc
00000124: PUSH1 0x04
00000126: CALLDATALOAD
00000127: PUSH2 0x03e5
0000012a: JUMP
0000012b: JUMPDEST
0000012c: CALLVALUE
0000012d: DUP1
0000012e: ISZERO
0000012f: PUSH2 0x0137
00000132: JUMPI
00000133: PUSH1 0x00
00000135: DUP1
00000136: REVERT
00000137: JUMPDEST
00000138: POP
00000139: PUSH2 0x00cc
0000013c: PUSH1 0x01
0000013e: PUSH1 0xa0
00000140: PUSH1 0x02
00000142: EXP
00000143: SUB
00000144: PUSH1 0x04
00000146: CALLDATALOAD
00000147: DUP2
00000148: AND
00000149: SWAP1
0000014a: PUSH1 0x24
0000014c: CALLDATALOAD
0000014d: AND
0000014e: PUSH2 0x03f2
00000151: JUMP
00000152: JUMPDEST
00000153: CALLVALUE
00000154: DUP1
00000155: ISZERO
00000156: PUSH2 0x015e
00000159: JUMPI
0000015a: PUSH1 0x00
0000015c: DUP1
0000015d: REVERT
0000015e: JUMPDEST
0000015f: POP
00000160: PUSH2 0x0167
00000163: PUSH2 0x048a
00000166: JUMP
00000167: JUMPDEST
00000168: PUSH1 0x40
0000016a: DUP1
0000016b: MLOAD
0000016c: PUSH1 0x01
0000016e: PUSH1 0xa0
00000170: PUSH1 0x02
00000172: EXP
00000173: SUB
00000174: SWAP1
00000175: SWAP3
00000176: AND
00000177: DUP3
00000178: MSTORE
00000179: MLOAD
0000017a: SWAP1
0000017b: DUP2
0000017c: SWAP1
0000017d: SUB
0000017e: PUSH1 0x20
00000180: ADD
00000181: SWAP1
00000182: RETURN
00000183: JUMPDEST
00000184: CALLVALUE
00000185: DUP1
00000186: ISZERO
00000187: PUSH2 0x018f
0000018a: JUMPI
0000018b: PUSH1 0x00
0000018d: DUP1
0000018e: REVERT
0000018f: JUMPDEST
00000190: POP
00000191: PUSH2 0x01a4
00000194: PUSH1 0x01
00000196: PUSH1 0xa0
00000198: PUSH1 0x02
0000019a: EXP
0000019b: SUB
0000019c: PUSH1 0x04
0000019e: CALLDATALOAD
0000019f: AND
000001a0: PUSH2 0x0499
000001a3: JUMP
000001a4: JUMPDEST
000001a5: PUSH1 0x40
000001a7: DUP1
000001a8: MLOAD
000001a9: SWAP2
000001aa: ISZERO
000001ab: ISZERO
000001ac: DUP3
000001ad: MSTORE
000001ae: MLOAD
000001af: SWAP1
000001b0: DUP2
000001b1: SWAP1
000001b2: SUB
000001b3: PUSH1 0x20
000001b5: ADD
000001b6: SWAP1
000001b7: RETURN
000001b8: JUMPDEST
000001b9: CALLVALUE
000001ba: DUP1
000001bb: ISZERO
000001bc: PUSH2 0x01c4
000001bf: JUMPI
000001c0: PUSH1 0x00
000001c2: DUP1
000001c3: REVERT
000001c4: JUMPDEST
000001c5: POP
000001c6: PUSH2 0x00cc
000001c9: PUSH1 0x04
000001cb: CALLDATALOAD
000001cc: ISZERO
000001cd: ISZERO
000001ce: PUSH2 0x04ae
000001d1: JUMP
000001d2: JUMPDEST
000001d3: CALLVALUE
000001d4: DUP1
000001d5: ISZERO
000001d6: PUSH2 0x01de
000001d9: JUMPI
000001da: PUSH1 0x00
000001dc: DUP1
000001dd: REVERT
000001de: JUMPDEST
000001df: POP
000001e0: PUSH2 0x0167
000001e3: PUSH2 0x0502
000001e6: JUMP
000001e7: JUMPDEST
000001e8: CALLVALUE
000001e9: DUP1
000001ea: ISZERO
000001eb: PUSH2 0x01f3
000001ee: JUMPI
000001ef: PUSH1 0x00
000001f1: DUP1
000001f2: REVERT
000001f3: JUMPDEST
000001f4: POP
000001f5: PUSH2 0x00cc
000001f8: PUSH2 0x0511
000001fb: JUMP
000001fc: JUMPDEST
000001fd: CALLVALUE
000001fe: DUP1
000001ff: ISZERO
00000200: PUSH2 0x0208
00000203: JUMPI
00000204: PUSH1 0x00
00000206: DUP1
00000207: REVERT
00000208: JUMPDEST
00000209: POP
0000020a: PUSH2 0x01a4
0000020d: PUSH2 0x0544
00000210: JUMP
00000211: JUMPDEST
00000212: CALLVALUE
00000213: DUP1
00000214: ISZERO
00000215: PUSH2 0x021d
00000218: JUMPI
00000219: PUSH1 0x00
0000021b: DUP1
0000021c: REVERT
0000021d: JUMPDEST
0000021e: POP
0000021f: PUSH2 0x00cc
00000222: PUSH1 0x01
00000224: PUSH1 0xa0
00000226: PUSH1 0x02
00000228: EXP
00000229: SUB
0000022a: PUSH1 0x04
0000022c: CALLDATALOAD
0000022d: AND
0000022e: PUSH2 0x0565
00000231: JUMP
00000232: JUMPDEST
00000233: CALLVALUE
00000234: DUP1
00000235: ISZERO
00000236: PUSH2 0x023e
00000239: JUMPI
0000023a: PUSH1 0x00
0000023c: DUP1
0000023d: REVERT
0000023e: JUMPDEST
0000023f: POP
00000240: PUSH2 0x00cc
00000243: PUSH1 0x24
00000245: PUSH1 0x04
00000247: DUP1
00000248: CALLDATALOAD
00000249: DUP3
0000024a: DUP2
0000024b: ADD
0000024c: SWAP3
0000024d: SWAP1
0000024e: DUP3
0000024f: ADD
00000250: CALLDATALOAD
00000251: SWAP2
00000252: DUP2
00000253: CALLDATALOAD
00000254: SWAP2
00000255: DUP3
00000256: ADD
00000257: SWAP2
00000258: ADD
00000259: CALLDATALOAD
0000025a: PUSH2 0x05d1
0000025d: JUMP
0000025e: JUMPDEST
0000025f: PUSH1 0x40
00000261: DUP1
00000262: MLOAD
00000263: CALLVALUE
00000264: DUP2
00000265: MSTORE
00000266: SWAP1
00000267: MLOAD
00000268: CALLER
00000269: SWAP2
0000026a: PUSH32 0xe1fffcc4923d04b559f4d29a8bfc6cda04eb5b0d3c460751c2402c5c5cc9109c
0000028b: SWAP2
0000028c: SWAP1
0000028d: DUP2
0000028e: SWAP1
0000028f: SUB
00000290: PUSH1 0x20
00000292: ADD
00000293: SWAP1
00000294: LOG2
00000295: JUMP
00000296: JUMPDEST
00000297: PUSH1 0x00
00000299: SLOAD
0000029a: PUSH1 0x01
0000029c: PUSH1 0xa0
0000029e: PUSH1 0x02
000002a0: EXP
000002a1: SUB
000002a2: AND
000002a3: CALLER
000002a4: EQ
000002a5: PUSH2 0x02aa
000002a8: JUMPI
000002a9: INVALID
000002aa: JUMPDEST
000002ab: PUSH1 0x01
000002ad: PUSH1 0xa0
000002af: PUSH1 0x02
000002b1: EXP
000002b2: SUB
000002b3: DUP2
000002b4: AND
000002b5: PUSH1 0x00
000002b7: DUP2
000002b8: DUP2
000002b9: MSTORE
000002ba: PUSH1 0x01
000002bc: PUSH1 0x20
000002be: DUP2
000002bf: DUP2
000002c0: MSTORE
000002c1: PUSH1 0x40
000002c3: SWAP3
000002c4: DUP4
000002c5: SWAP1
000002c6: KECCAK256
000002c7: DUP1
000002c8: SLOAD
000002c9: PUSH1 0xff
000002cb: NOT
000002cc: AND
000002cd: SWAP1
000002ce: SWAP3
000002cf: OR
000002d0: SWAP1
000002d1: SWAP2
000002d2: SSTORE
000002d3: DUP2
000002d4: MLOAD
000002d5: SWAP3
000002d6: DUP4
000002d7: MSTORE
000002d8: SWAP1
000002d9: MLOAD
000002da: PUSH32 0x735c128e3c049ff88e71ee4712b6e7096d53089462c09dd6b3c310f68ea44f8a
000002fb: SWAP3
000002fc: DUP2
000002fd: SWAP1
000002fe: SUB
000002ff: SWAP1
00000300: SWAP2
00000301: ADD
00000302: SWAP1
00000303: LOG1
00000304: POP
00000305: JUMP
00000306: JUMPDEST
00000307: PUSH1 0x00
00000309: SLOAD
0000030a: PUSH21 0x010000000000000000000000000000000000000000
00000320: SWAP1
00000321: DIV
00000322: PUSH1 0xff
00000324: AND
00000325: ISZERO
00000326: PUSH2 0x032e
00000329: JUMPI
0000032a: PUSH1 0x00
0000032c: DUP1
0000032d: REVERT
0000032e: JUMPDEST
0000032f: PUSH2 0x0357
00000332: PUSH32 0x456d517565756500000000000000000000000000000000000000000000000000
00000353: PUSH2 0x0731
00000356: JUMP
00000357: JUMPDEST
00000358: PUSH1 0x01
0000035a: PUSH1 0xa0
0000035c: PUSH1 0x02
0000035e: EXP
0000035f: SUB
00000360: AND
00000361: CALLER
00000362: EQ
00000363: PUSH2 0x036b
00000366: JUMPI
00000367: PUSH1 0x00
00000369: DUP1
0000036a: REVERT
0000036b: JUMPDEST
0000036c: PUSH1 0x40
0000036e: MLOAD
0000036f: PUSH1 0x01
00000371: PUSH1 0xa0
00000373: PUSH1 0x02
00000375: EXP
00000376: SUB
00000377: DUP4
00000378: AND
00000379: SWAP1
0000037a: DUP3
0000037b: ISZERO
0000037c: PUSH2 0x08fc
0000037f: MUL
00000380: SWAP1
00000381: DUP4
00000382: SWAP1
00000383: PUSH1 0x00
00000385: DUP2
00000386: DUP2
00000387: DUP2
00000388: DUP6
00000389: DUP9
0000038a: DUP9
0000038b: CALL
0000038c: SWAP4
0000038d: POP
0000038e: POP
0000038f: POP
00000390: POP
00000391: ISZERO
00000392: DUP1
00000393: ISZERO
00000394: PUSH2 0x03a1
00000397: JUMPI
00000398: RETURNDATASIZE
00000399: PUSH1 0x00
0000039b: DUP1
0000039c: RETURNDATACOPY
0000039d: RETURNDATASIZE
0000039e: PUSH1 0x00
000003a0: REVERT
000003a1: JUMPDEST
000003a2: POP
000003a3: PUSH1 0x40
000003a5: DUP1
000003a6: MLOAD
000003a7: DUP3
000003a8: DUP2
000003a9: MSTORE
000003aa: SWAP1
000003ab: MLOAD
000003ac: PUSH1 0x01
000003ae: PUSH1 0xa0
000003b0: PUSH1 0x02
000003b2: EXP
000003b3: SUB
000003b4: DUP5
000003b5: AND
000003b6: SWAP2
000003b7: PUSH32 0x884edad9ce6fa2440d8a54cc123490eb96d2768479d49ff9c7366125a9424364
000003d8: SWAP2
000003d9: SWAP1
000003da: DUP2
000003db: SWAP1
000003dc: SUB
000003dd: PUSH1 0x20
000003df: ADD
000003e0: SWAP1
000003e1: LOG2
000003e2: POP
000003e3: POP
000003e4: JUMP
000003e5: JUMPDEST
000003e6: PUSH2 0x03ef
000003e9: CALLER
000003ea: DUP3
000003eb: PUSH2 0x0306
000003ee: JUMP
000003ef: JUMPDEST
000003f0: POP
000003f1: JUMP
000003f2: JUMPDEST
000003f3: PUSH1 0x00
000003f5: SLOAD
000003f6: PUSH1 0x01
000003f8: PUSH1 0xa0
000003fa: PUSH1 0x02
000003fc: EXP
000003fd: SUB
000003fe: AND
000003ff: CALLER
00000400: EQ
00000401: PUSH2 0x0406
00000404: JUMPI
00000405: INVALID
00000406: JUMPDEST
00000407: PUSH1 0x02
00000409: SLOAD
0000040a: PUSH1 0x01
0000040c: PUSH1 0xa0
0000040e: PUSH1 0x02
00000410: EXP
00000411: SUB
00000412: DUP4
00000413: DUP2
00000414: AND
00000415: SWAP2
00000416: AND
00000417: EQ
00000418: ISZERO
00000419: PUSH2 0x0486
0000041c: JUMPI
0000041d: PUSH1 0x02
0000041f: DUP1
00000420: SLOAD
00000421: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000436: NOT
00000437: AND
00000438: PUSH1 0x01
0000043a: PUSH1 0xa0
0000043c: PUSH1 0x02
0000043e: EXP
0000043f: SUB
00000440: DUP4
00000441: DUP2
00000442: AND
00000443: SWAP2
00000444: DUP3
00000445: OR
00000446: SWAP1
00000447: SWAP3
00000448: SSTORE
00000449: PUSH1 0x40
0000044b: DUP1
0000044c: MLOAD
0000044d: SWAP3
0000044e: DUP6
0000044f: AND
00000450: DUP4
00000451: MSTORE
00000452: PUSH1 0x20
00000454: DUP4
00000455: ADD
00000456: SWAP2
00000457: SWAP1
00000458: SWAP2
00000459: MSTORE
0000045a: DUP1
0000045b: MLOAD
0000045c: PUSH32 0x1229c7500af0aab73d8c1cc0ea6c7d65249ebf050e292ce3bdf096fddec699a9
0000047d: SWAP3
0000047e: DUP2
0000047f: SWAP1
00000480: SUB
00000481: SWAP1
00000482: SWAP2
00000483: ADD
00000484: SWAP1
00000485: LOG1
00000486: JUMPDEST
00000487: POP
00000488: POP
00000489: JUMP
0000048a: JUMPDEST
0000048b: PUSH1 0x02
0000048d: SLOAD
0000048e: PUSH1 0x01
00000490: PUSH1 0xa0
00000492: PUSH1 0x02
00000494: EXP
00000495: SUB
00000496: AND
00000497: DUP2
00000498: JUMP
00000499: JUMPDEST
0000049a: PUSH1 0x01
0000049c: PUSH1 0x20
0000049e: MSTORE
0000049f: PUSH1 0x00
000004a1: SWAP1
000004a2: DUP2
000004a3: MSTORE
000004a4: PUSH1 0x40
000004a6: SWAP1
000004a7: KECCAK256
000004a8: SLOAD
000004a9: PUSH1 0xff
000004ab: AND
000004ac: DUP2
000004ad: JUMP
000004ae: JUMPDEST
000004af: PUSH1 0x00
000004b1: SLOAD
000004b2: PUSH1 0x01
000004b4: PUSH1 0xa0
000004b6: PUSH1 0x02
000004b8: EXP
000004b9: SUB
000004ba: AND
000004bb: CALLER
000004bc: EQ
000004bd: PUSH2 0x04c2
000004c0: JUMPI
000004c1: INVALID
000004c2: JUMPDEST
000004c3: PUSH1 0x00
000004c5: DUP1
000004c6: SLOAD
000004c7: SWAP2
000004c8: ISZERO
000004c9: ISZERO
000004ca: PUSH21 0x010000000000000000000000000000000000000000
000004e0: MUL
000004e1: PUSH21 0xff0000000000000000000000000000000000000000
000004f7: NOT
000004f8: SWAP1
000004f9: SWAP3
000004fa: AND
000004fb: SWAP2
000004fc: SWAP1
000004fd: SWAP2
000004fe: OR
000004ff: SWAP1
00000500: SSTORE
00000501: JUMP
00000502: JUMPDEST
00000503: PUSH1 0x00
00000505: SLOAD
00000506: PUSH1 0x01
00000508: PUSH1 0xa0
0000050a: PUSH1 0x02
0000050c: EXP
0000050d: SUB
0000050e: AND
0000050f: DUP2
00000510: JUMP
00000511: JUMPDEST
00000512: PUSH1 0x00
00000514: SLOAD
00000515: PUSH1 0x01
00000517: PUSH1 0xa0
00000519: PUSH1 0x02
0000051b: EXP
0000051c: SUB
0000051d: AND
0000051e: CALLER
0000051f: EQ
00000520: PUSH2 0x0525
00000523: JUMPI
00000524: INVALID
00000525: JUMPDEST
00000526: PUSH1 0x00
00000528: DUP1
00000529: SLOAD
0000052a: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000053f: NOT
00000540: AND
00000541: SWAP1
00000542: SSTORE
00000543: JUMP
00000544: JUMPDEST
00000545: PUSH1 0x00
00000547: SLOAD
00000548: PUSH21 0x010000000000000000000000000000000000000000
0000055e: SWAP1
0000055f: DIV
00000560: PUSH1 0xff
00000562: AND
00000563: DUP2
00000564: JUMP
00000565: JUMPDEST
00000566: PUSH1 0x00
00000568: SLOAD
00000569: PUSH1 0x01
0000056b: PUSH1 0xa0
0000056d: PUSH1 0x02
0000056f: EXP
00000570: SUB
00000571: AND
00000572: CALLER
00000573: EQ
00000574: PUSH2 0x0579
00000577: JUMPI
00000578: INVALID
00000579: JUMPDEST
0000057a: PUSH1 0x01
0000057c: PUSH1 0xa0
0000057e: PUSH1 0x02
00000580: EXP
00000581: SUB
00000582: DUP2
00000583: AND
00000584: PUSH1 0x00
00000586: DUP2
00000587: DUP2
00000588: MSTORE
00000589: PUSH1 0x01
0000058b: PUSH1 0x20
0000058d: SWAP1
0000058e: DUP2
0000058f: MSTORE
00000590: PUSH1 0x40
00000592: SWAP2
00000593: DUP3
00000594: SWAP1
00000595: KECCAK256
00000596: DUP1
00000597: SLOAD
00000598: PUSH1 0xff
0000059a: NOT
0000059b: AND
0000059c: SWAP1
0000059d: SSTORE
0000059e: DUP2
0000059f: MLOAD
000005a0: SWAP3
000005a1: DUP4
000005a2: MSTORE
000005a3: SWAP1
000005a4: MLOAD
000005a5: PUSH32 0x3227fe2c42ad401fbb958a2a3205bb30289aa16ca66612b693cad680206b30e8
000005c6: SWAP3
000005c7: DUP2
000005c8: SWAP1
000005c9: SUB
000005ca: SWAP1
000005cb: SWAP2
000005cc: ADD
000005cd: SWAP1
000005ce: LOG1
000005cf: POP
000005d0: JUMP
000005d1: JUMPDEST
000005d2: PUSH1 0x00
000005d4: DUP1
000005d5: SLOAD
000005d6: PUSH1 0x01
000005d8: PUSH1 0xa0
000005da: PUSH1 0x02
000005dc: EXP
000005dd: SUB
000005de: AND
000005df: CALLER
000005e0: EQ
000005e1: PUSH2 0x05e6
000005e4: JUMPI
000005e5: INVALID
000005e6: JUMPDEST
000005e7: POP
000005e8: PUSH1 0x00
000005ea: JUMPDEST
000005eb: DUP4
000005ec: DUP2
000005ed: LT
000005ee: ISZERO
000005ef: PUSH2 0x0684
000005f2: JUMPI
000005f3: PUSH1 0x01
000005f5: PUSH1 0x00
000005f7: DUP7
000005f8: DUP7
000005f9: DUP5
000005fa: DUP2
000005fb: DUP2
000005fc: LT
000005fd: PUSH2 0x0602
00000600: JUMPI
00000601: INVALID
00000602: JUMPDEST
00000603: PUSH1 0x20
00000605: SWAP1
00000606: DUP2
00000607: MUL
00000608: SWAP3
00000609: SWAP1
0000060a: SWAP3
0000060b: ADD
0000060c: CALLDATALOAD
0000060d: PUSH1 0x01
0000060f: PUSH1 0xa0
00000611: PUSH1 0x02
00000613: EXP
00000614: SUB
00000615: AND
00000616: DUP4
00000617: MSTORE
00000618: POP
00000619: DUP2
0000061a: ADD
0000061b: SWAP2
0000061c: SWAP1
0000061d: SWAP2
0000061e: MSTORE
0000061f: PUSH1 0x40
00000621: ADD
00000622: PUSH1 0x00
00000624: KECCAK256
00000625: DUP1
00000626: SLOAD
00000627: PUSH1 0xff
00000629: NOT
0000062a: AND
0000062b: SWAP1
0000062c: SSTORE
0000062d: PUSH32 0x3227fe2c42ad401fbb958a2a3205bb30289aa16ca66612b693cad680206b30e8
0000064e: DUP6
0000064f: DUP6
00000650: DUP4
00000651: DUP2
00000652: DUP2
00000653: LT
00000654: PUSH2 0x0659
00000657: JUMPI
00000658: INVALID
00000659: JUMPDEST
0000065a: PUSH1 0x40
0000065c: DUP1
0000065d: MLOAD
0000065e: PUSH1 0x20
00000660: SWAP3
00000661: DUP4
00000662: MUL
00000663: SWAP5
00000664: SWAP1
00000665: SWAP5
00000666: ADD
00000667: CALLDATALOAD
00000668: PUSH1 0x01
0000066a: PUSH1 0xa0
0000066c: PUSH1 0x02
0000066e: EXP
0000066f: SUB
00000670: AND
00000671: DUP5
00000672: MSTORE
00000673: MLOAD
00000674: SWAP3
00000675: DUP4
00000676: SWAP1
00000677: SUB
00000678: ADD
00000679: SWAP2
0000067a: SWAP1
0000067b: POP
0000067c: LOG1
0000067d: PUSH1 0x01
0000067f: ADD
00000680: PUSH2 0x05ea
00000683: JUMP
00000684: JUMPDEST
00000685: POP
00000686: PUSH1 0x00
00000688: JUMPDEST
00000689: DUP2
0000068a: DUP2
0000068b: LT
0000068c: ISZERO
0000068d: PUSH2 0x072a
00000690: JUMPI
00000691: PUSH1 0x01
00000693: DUP1
00000694: PUSH1 0x00
00000696: DUP6
00000697: DUP6
00000698: DUP6
00000699: DUP2
0000069a: DUP2
0000069b: LT
0000069c: PUSH2 0x06a1
0000069f: JUMPI
000006a0: INVALID
000006a1: JUMPDEST
000006a2: PUSH1 0x20
000006a4: SWAP1
000006a5: DUP2
000006a6: MUL
000006a7: SWAP3
000006a8: SWAP1
000006a9: SWAP3
000006aa: ADD
000006ab: CALLDATALOAD
000006ac: PUSH1 0x01
000006ae: PUSH1 0xa0
000006b0: PUSH1 0x02
000006b2: EXP
000006b3: SUB
000006b4: AND
000006b5: DUP4
000006b6: MSTORE
000006b7: POP
000006b8: DUP2
000006b9: ADD
000006ba: SWAP2
000006bb: SWAP1
000006bc: SWAP2
000006bd: MSTORE
000006be: PUSH1 0x40
000006c0: ADD
000006c1: PUSH1 0x00
000006c3: KECCAK256
000006c4: DUP1
000006c5: SLOAD
000006c6: PUSH1 0xff
000006c8: NOT
000006c9: AND
000006ca: SWAP2
000006cb: ISZERO
000006cc: ISZERO
000006cd: SWAP2
000006ce: SWAP1
000006cf: SWAP2
000006d0: OR
000006d1: SWAP1
000006d2: SSTORE
000006d3: PUSH32 0x735c128e3c049ff88e71ee4712b6e7096d53089462c09dd6b3c310f68ea44f8a
000006f4: DUP4
000006f5: DUP4
000006f6: DUP4
000006f7: DUP2
000006f8: DUP2
000006f9: LT
000006fa: PUSH2 0x06ff
000006fd: JUMPI
000006fe: INVALID
000006ff: JUMPDEST
00000700: PUSH1 0x40
00000702: DUP1
00000703: MLOAD
00000704: PUSH1 0x20
00000706: SWAP3
00000707: DUP4
00000708: MUL
00000709: SWAP5
0000070a: SWAP1
0000070b: SWAP5
0000070c: ADD
0000070d: CALLDATALOAD
0000070e: PUSH1 0x01
00000710: PUSH1 0xa0
00000712: PUSH1 0x02
00000714: EXP
00000715: SUB
00000716: AND
00000717: DUP5
00000718: MSTORE
00000719: MLOAD
0000071a: SWAP3
0000071b: DUP4
0000071c: SWAP1
0000071d: SUB
0000071e: ADD
0000071f: SWAP2
00000720: SWAP1
00000721: POP
00000722: LOG1
00000723: PUSH1 0x01
00000725: ADD
00000726: PUSH2 0x0688
00000729: JUMP
0000072a: JUMPDEST
0000072b: POP
0000072c: POP
0000072d: POP
0000072e: POP
0000072f: POP
00000730: JUMP
00000731: JUMPDEST
00000732: PUSH1 0x02
00000734: SLOAD
00000735: PUSH1 0x40
00000737: DUP1
00000738: MLOAD
00000739: PUSH32 0x0f75243000000000000000000000000000000000000000000000000000000000
0000075a: DUP2
0000075b: MSTORE
0000075c: PUSH1 0x04
0000075e: DUP2
0000075f: ADD
00000760: DUP5
00000761: SWAP1
00000762: MSTORE
00000763: SWAP1
00000764: MLOAD
00000765: PUSH1 0x00
00000767: SWAP3
00000768: PUSH1 0x01
0000076a: PUSH1 0xa0
0000076c: PUSH1 0x02
0000076e: EXP
0000076f: SUB
00000770: AND
00000771: SWAP2
00000772: PUSH4 0x0f752430
00000777: SWAP2
00000778: PUSH1 0x24
0000077a: DUP1
0000077b: DUP4
0000077c: ADD
0000077d: SWAP3
0000077e: PUSH1 0x20
00000780: SWAP3
00000781: SWAP2
00000782: SWAP1
00000783: DUP3
00000784: SWAP1
00000785: SUB
00000786: ADD
00000787: DUP2
00000788: DUP8
00000789: DUP8
0000078a: DUP1
0000078b: EXTCODESIZE
0000078c: ISZERO
0000078d: DUP1
0000078e: ISZERO
0000078f: PUSH2 0x0797
00000792: JUMPI
00000793: PUSH1 0x00
00000795: DUP1
00000796: REVERT
00000797: JUMPDEST
00000798: POP
00000799: GAS
0000079a: CALL
0000079b: ISZERO
0000079c: DUP1
0000079d: ISZERO
0000079e: PUSH2 0x07ab
000007a1: JUMPI
000007a2: RETURNDATASIZE
000007a3: PUSH1 0x00
000007a5: DUP1
000007a6: RETURNDATACOPY
000007a7: RETURNDATASIZE
000007a8: PUSH1 0x00
000007aa: REVERT
000007ab: JUMPDEST
000007ac: POP
000007ad: POP
000007ae: POP
000007af: POP
000007b0: PUSH1 0x40
000007b2: MLOAD
000007b3: RETURNDATASIZE
000007b4: PUSH1 0x20
000007b6: DUP2
000007b7: LT
000007b8: ISZERO
000007b9: PUSH2 0x07c1
000007bc: JUMPI
000007bd: PUSH1 0x00
000007bf: DUP1
000007c0: REVERT
000007c1: JUMPDEST
000007c2: POP
000007c3: MLOAD
000007c4: SWAP3
000007c5: SWAP2
000007c6: POP
000007c7: POP
000007c8: JUMP
000007c9: STOP
000007ca: LOG1
000007cb: PUSH6 0x627a7a723058
000007d2: KECCAK256
000007d3: UNKNOWN(0xB8)
000007d4: JUMPDEST
000007d5: STATICCALL
000007d6: ADDMOD
000007d7: UNKNOWN(0x27)
000007d8: UNKNOWN(0xCD)
000007d9: UNKNOWN(0x24)
000007da: SWAP6
000007db: SWAP14
000007dc: SWAP7
000007dd: STOP
000007de: SWAP14
000007df: SWAP11
000007e0: PUSH10 0x45170e1fa06320830be4
000007eb: LOG1
000007ec: UNKNOWN(0xC2)
000007ed: SWAP2
000007ee: UNKNOWN(0x2C)
000007ef: STATICCALL
000007f0: UNKNOWN(0xBE)
000007f1: UNKNOWN(0x2B)
000007f2: UNKNOWN(0xB4)
000007f3: STOP
000007f4: UNKNOWN(0x29)

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
high other detector Untrusted CALL target/value reachable 60 no no
view
trace_id: 0x7bc2621b331cbdd1af4dc17f83957357095452b533283c079ac06b429e6028c3
call_targets: 0x18639f44f946983bf3413d9b51322d05c29d269e
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0x7bc2621b331cbdd1af4dc17f83957357095452b533283c079ac06b429e6028c3",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x18639f44f946983bf3413d9b51322d05c29d269e"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x0c18865e",
            "selector": "0x0c18865e",
            "calldata_variants": [
                "0x0c18865e",
                "0x0c18865e0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x205c2878",
            "selector": "0x205c2878",
            "calldata_variants": [
                "0x205c2878",
                "0x205c28780000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x2e1a7d4d",
            "selector": "0x2e1a7d4d",
            "calldata_variants": [
                "0x2e1a7d4d",
                "0x2e1a7d4d0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x70cfaa8d",
            "selector": "0x70cfaa8d",
            "calldata_variants": [
                "0x70cfaa8d",
                "0x70cfaa8d0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x73d4a13a",
            "selector": "0x73d4a13a",
            "calldata_variants": [
                "0x73d4a13a",
                "0x73d4a13a0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x7bbf4a3f",
            "selector": "0x7bbf4a3f",
            "calldata_variants": [
                "0x7bbf4a3f",
                "0x7bbf4a3f0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xa6f2fd5c",
            "selector": "0xa6f2fd5c",
            "calldata_variants": [
                "0xa6f2fd5c",
                "0xa6f2fd5c0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xb0f545ba",
            "selector": "0xb0f545ba",
            "calldata_variants": [
                "0xb0f545ba",
                "0xb0f545ba0000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 907,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 1946,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "call_count": 2,
    "guards_detected": [],
    "untrusted_call_count": 2
}
high other detector ETH value transfer possible 55 no no
view
trace_id: 0x7bc2621b331cbdd1af4dc17f83957357095452b533283c079ac06b429e6028c3
call_targets: 0x18639f44f946983bf3413d9b51322d05c29d269e
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0x7bc2621b331cbdd1af4dc17f83957357095452b533283c079ac06b429e6028c3",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x18639f44f946983bf3413d9b51322d05c29d269e"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x0c18865e",
            "selector": "0x0c18865e",
            "calldata_variants": [
                "0x0c18865e",
                "0x0c18865e0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x205c2878",
            "selector": "0x205c2878",
            "calldata_variants": [
                "0x205c2878",
                "0x205c28780000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x2e1a7d4d",
            "selector": "0x2e1a7d4d",
            "calldata_variants": [
                "0x2e1a7d4d",
                "0x2e1a7d4d0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x70cfaa8d",
            "selector": "0x70cfaa8d",
            "calldata_variants": [
                "0x70cfaa8d",
                "0x70cfaa8d0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x73d4a13a",
            "selector": "0x73d4a13a",
            "calldata_variants": [
                "0x73d4a13a",
                "0x73d4a13a0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x7bbf4a3f",
            "selector": "0x7bbf4a3f",
            "calldata_variants": [
                "0x7bbf4a3f",
                "0x7bbf4a3f0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xa6f2fd5c",
            "selector": "0xa6f2fd5c",
            "calldata_variants": [
                "0xa6f2fd5c",
                "0xa6f2fd5c0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xb0f545ba",
            "selector": "0xb0f545ba",
            "calldata_variants": [
                "0xb0f545ba",
                "0xb0f545ba0000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 907,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 1946,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "eth_value_calls": 2,
    "guards_detected": []
}