b561d0c7-9b77-4672-9929-91db9c71ead6
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 30766 | report.consolidate | complete | 1 / 1 | 3 months ago |
| 75592 | artifact.fetch | complete | 1 / 3 | 2 weeks ago |
| 75593 | tool.cast_disasm | complete | 1 / 3 | 2 weeks ago |
| 75594 | analysis.bundle | complete | 1 / 3 | 2 weeks ago |
| 75595 | capability.graph | complete | 1 / 3 | 2 weeks ago |
| 75596 | detector.run | complete | 1 / 3 | 2 weeks ago |
| 75597 | validation.fork | complete | 1 / 3 | 2 weeks ago |
No slither job recorded yet.
[codex:1407898] OpenAI Codex v0.77.0 (research preview)
[codex:1407898] --------
[codex:1407898] workdir: /tmp/codex-multi-7pzbcidm
[codex:1407898] model: gpt-5.2-codex
[codex:1407898] provider: openai
[codex:1407898] approval: never
[codex:1407898] sandbox: read-only
[codex:1407898] reasoning effort: xhigh
[codex:1407898] reasoning summaries: auto
[codex:1407898] session id: 019b710e-ab1f-7932-bab0-5f19ea8f7010
[codex:1407898] --------
[codex:1407898] user
[codex:1407898] You are a security auditor. You are given EVM runtime bytecode (and possibly a disassembly) for a contract with NO verified source.
[codex:1407898] This is best-effort. Do not hallucinate: only flag issues when there's a concrete, explainable angle from bytecode/disasm patterns.
[codex:1407898]
[codex:1407898] You MUST read the full `BYTECODE_BUNDLE.txt` before concluding.
[codex:1407898]
[codex:1407898] Output MUST be valid JSON matching the provided schema.
[codex:1407898] - If you cannot identify a concrete issue from bytecode/disasm alone: set no_findings=true and findings=[].
[codex:1407898] - Otherwise: include findings with severity/category/title/evidence and point locations to BYTECODE_BUNDLE.txt line ranges when possible.
[codex:1407898]
[codex:1407898] Output constraints (IMPORTANT):
[codex:1407898] - severity MUST be exactly one of: info, low, medium, high, critical (lowercase).
[codex:1407898] - category MUST be exactly one of: access_control, reentrancy, math, oracle, upgradeability, auth, other.
[codex:1407898] mcp startup: no servers
[codex:1407898]
[codex:1407898] thinking
[codex:1407898] **Preparing to read file contents**
[codex:1407898] exec
[codex:1407898] /bin/bash -lc ls in /tmp/codex-multi-7pzbcidm succeeded in 5ms:
[codex:1407898] BYTECODE_BUNDLE.txt
[codex:1407898] codex-output-schema.json
[codex:1407898] exec
[codex:1407898] /bin/bash -lc 'cat BYTECODE_BUNDLE.txt' in /tmp/codex-multi-7pzbcidm succeeded in 5ms:
[codex:1407898] Runtime bytecode bundle for best-effort auditing.
[codex:1407898] Note: without verified source, conclusions are low-confidence unless a concrete pattern is visible.
[codex:1407898]
[codex:1407898] FILE: runtime_bytecode.hex
[codex:1407898] 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
[codex:1407898]
[codex:1407898] thinking
[codex:1407898] **Analyzing EVM bytecode manually**
[codex:1407898]
[codex:1407898] I'm preparing to parse the runtime bytecode by hand since no tools are available, aiming to identify function selectors and opcode patterns that reveal contract behavior and potential vulnerabilities. I'll write a simple Python disassembler inline to decode opcodes and help map functions and storage interactions, carefully working within the read-only sandbox constraints.
[codex:1407898] exec
[codex:1407898] /bin/bash -lc "python - <<'PY'
[codex:1407898] import re,sys
[codex:1407898] hexdata=open('BYTECODE_BUNDLE.txt').read()
[codex:1407898] # extract runtime bytecode after 'FILE: runtime_bytecode.hex'
[codex:1407898] import re
[codex:1407898] m=re.search(r'FILE: runtime_bytecode.hex\\n(0x[0-9a-fA-F]+)', hexdata)
[codex:1407898] if not m:
[codex:1407898] print('no runtime');sys.exit()
[codex:1407898] code=m.group(1)[2:]
[codex:1407898] # simple disasm
[codex:1407898] opcodes={
[codex:1407898] 0x00:'STOP',0x01:'ADD',0x02:'MUL',0x03:'SUB',0x04:'DIV',0x05:'SDIV',0x06:'MOD',0x07:'SMOD',0x08:'ADDMOD',0x09:'MULMOD',0x0a:'EXP',0x0b:'SIGNEXTEND',
[codex:1407898] 0x10:'LT',0x11:'GT',0x12:'SLT',0x13:'SGT',0x14:'EQ',0x15:'ISZERO',0x16:'AND',0x17:'OR',0x18:'XOR',0x19:'NOT',0x1a:'BYTE',0x1b:'SHL',0x1c:'SHR',0x1d:'SAR',
[codex:1407898] 0x20:'SHA3',
[codex:1407898] 0x30:'ADDRESS',0x31:'BALANCE',0x32:'ORIGIN',0x33:'CALLER',0x34:'CALLVALUE',0x35:'CALLDATALOAD',0x36:'CALLDATASIZE',0x37:'CALLDATACOPY',0x38:'CODESIZE',0x39:'CODECOPY',0x3a:'GASPRICE',0x3b:'EXTCODESIZE',0x3c:'EXTCODECOPY',0x3d:'RETURNDATASIZE',0x3e:'RETURNDATACOPY',0x3f:'EXTCODEHASH',
[codex:1407898] 0x40:'BLOCKHASH',0x41:'COINBASE',0x42:'TIMESTAMP',0x43:'NUMBER',0x44:'DIFFICULTY',0x45:'GASLIMIT',0x46:'CHAINID',0x47:'SELFBALANCE',0x48:'BASEFEE',
[codex:1407898] 0x50:'POP',0x51:'MLOAD',0x52:'MSTORE',0x53:'MSTORE8',0x54:'SLOAD',0x55:'SSTORE',0x56:'JUMP',0x57:'JUMPI',0x58:'PC',0x59:'MSIZE',0x5a:'GAS',0x5b:'JUMPDEST',0x5f:'PUSH0',
[codex:1407898] 0x60:'PUSH1',0x61:'PUSH2',0x62:'PUSH3',0x63:'PUSH4',0x64:'PUSH5',0x65:'PUSH6',0x66:'PUSH7',0x67:'PUSH8',0x68:'PUSH9',0x69:'PUSH10',0x6a:'PUSH11',0x6b:'PUSH12',0x6c:'PUSH13',0x6d:'PUSH14',0x6e:'PUSH15',0x6f:'PUSH16',
[codex:1407898] 0x70:'PUSH17',0x71:'PUSH18',0x72:'PUSH19',0x73:'PUSH20',0x74:'PUSH21',0x75:'PUSH22',0x76:'PUSH23',0x77:'PUSH24',0x78:'PUSH25',0x79:'PUSH26',0x7a:'PUSH27',0x7b:'PUSH28',0x7c:'PUSH29',0x7d:'PUSH30',0x7e:'PUSH31',0x7f:'PUSH32',
[codex:1407898] 0x80:'DUP1',0x81:'DUP2',0x82:'DUP3',0x83:'DUP4',0x84:'DUP5',0x85:'DUP6',0x86:'DUP7',0x87:'DUP8',0x88:'DUP9',0x89:'DUP10',0x8a:'DUP11',0x8b:'DUP12',0x8c:'DUP13',0x8d:'DUP14',0x8e:'DUP15',0x8f:'DUP16',
[codex:1407898] 0x90:'SWAP1',0x91:'SWAP2',0x92:'SWAP3',0x93:'SWAP4',0x94:'SWAP5',0x95:'SWAP6',0x96:'SWAP7',0x97:'SWAP8',0x98:'SWAP9',0x99:'SWAP10',0x9a:'SWAP11',0x9b:'SWAP12',0x9c:'SWAP13',0x9d:'SWAP14',0x9e:'SWAP15',0x9f:'SWAP16',
[codex:1407898] 0xa0:'LOG0',0xa1:'LOG1',0xa2:'LOG2',0xa3:'LOG3',0xa4:'LOG4',
[codex:1407898] 0xf0:'CREATE',0xf1:'CALL',0xf2:'CALLCODE',0xf3:'RETURN',0xf4:'DELEGATECALL',0xf5:'CREATE2',0xfa:'STATICCALL',0xfd:'REVERT',0xfe:'INVALID',0xff:'SELFDESTRUCT'
[codex:1407898] }
[codex:1407898]
[codex:1407898] b=bytes.fromhex(code)
[codex:1407898] # produce list of (pc, op, imm)
[codex:1407898] res=[]
[codex:1407898] pc=0
[codex:1407898] while pc < len(b):
[codex:1407898] op=b[pc]
[codex:1407898] name=opcodes.get(op, f'OP{op:02x}')
[codex:1407898] pc0=pc
[codex:1407898] pc+=1
[codex:1407898] imm=None
[codex:1407898] if 0x60 <= op <= 0x7f:
[codex:1407898] n=op-0x5f
[codex:1407898] imm=b[pc:pc+n]
[codex:1407898] pc+=n
[codex:1407898] res.append((pc0,name,imm))
[codex:1407898]
[codex:1407898] # print with pc and immediate
[codex:1407898] for pc,name,imm in res:
[codex:1407898] if imm is None:
[codex:1407898] print(f'{pc:04x}: {name}')
[codex:1407898] else:
[codex:1407898] print(f'{pc:04x}: {name} 0x{imm.hex()}')
[codex:1407898] PY" in /tmp/codex-multi-7pzbcidm succeeded in 34ms:
[codex:1407898] 0000: PUSH1 0x80
[codex:1407898] 0002: DUP1
[codex:1407898] 0003: PUSH1 0x40
[codex:1407898] 0005: MSTORE
[codex:1407898] 0006: PUSH1 0x04
[codex:1407898] 0008: CALLDATASIZE
[codex:1407898] 0009: LT
[codex:1407898] 000a: ISZERO
[codex:1407898] 000b: PUSH2 0x0012
[codex:1407898] 000e: JUMPI
[codex:1407898] 000f: PUSH0
[codex:1407898] 0010: DUP1
[codex:1407898] 0011: REVERT
[codex:1407898] 0012: JUMPDEST
[codex:1407898] 0013: PUSH0
[codex:1407898] 0014: CALLDATALOAD
[codex:1407898] 0015: PUSH1 0xe0
[codex:1407898] 0017: SHR
[codex:1407898] 0018: SWAP1
[codex:1407898] 0019: DUP2
[codex:1407898]
[codex:1407898]
[codex:1407898] thinking
[codex:1407898] **Performing detailed contract disassembly analysis**
[codex:1407898]
[codex:1407898] I’m carefully tracing the contract’s storage patterns, function selectors, and logic—spotting owner access checks, USDC token interactions, admin withdraw functions, time-gated conditions, and possible NFT-related string constants. There’s a complex minting function with signature verifications and ETH payment checks, plus access controls enforced via hardcoded addresses, all pointing toward a wallet or minting contract with layered controls and fees. This thorough breakdown helps me assess possible vulnerabilities and contract behavior.
[codex:1407898] thinking
[codex:1407898] **Examining complex token transfer and state update flows**
[codex:1407898]
[codex:1407898] I’m tracing how the contract verifies inputs, updates mappings to track usage, emits events, and handles USDC transfers via carefully constructed CALLs. There’s a time-locked withdraw function guarded by owner checks and timestamp constraints, plus logging for withdrawals. The contract uses bitmaps and timestamp storage with masking to control access and timing. I’m analyzing if external calls happen safely after state updates, how signature or Merkle proofs fit in, and whether any unchecked calls pose risks—all while trying to decode the interplay between ETH payments and USDC transfers in this multi-step logic.
[codex:1407898] exec
[codex:1407898] /bin/bash -lc "python - <<'PY'
[codex:1407898] import re
[codex:1407898] hexdata=open('BYTECODE_BUNDLE.txt').read()
[codex:1407898] import re
[codex:1407898] m=re.search(r'FILE: runtime_bytecode.hex\\n(0x[0-9a-fA-F]+)', hexdata)
[codex:1407898] code=m.group(1)[2:]
[codex:1407898]
[codex:1407898] b=bytes.fromhex(code)
[codex:1407898] opcodes={0x55:'SSTORE'}
[codex:1407898] pc=0
[codex:1407898] while pc < len(b):
[codex:1407898] op=b[pc]; pc0=pc; pc+=1
[codex:1407898] if 0x60 <= op <= 0x7f:
[codex:1407898] n=op-0x5f; pc+=n
[codex:1407898] if op==0x55:
[codex:1407898] print(f'{pc0:04x} SSTORE')
[codex:1407898] PY" in /tmp/codex-multi-7pzbcidm succeeded in 26ms:
[codex:1407898] 0341 SSTORE
[codex:1407898] 0708 SSTORE
[codex:1407898] 074f SSTORE
[codex:1407898]
[codex:1407898] thinking
[codex:1407898] **Analyzing bytecode for access control and vulnerabilities**
[codex:1407898] exec
[codex:1407898] /bin/bash -lc 'cat codex-output-schema.json' in /tmp/codex-multi-7pzbcidm succeeded in 5ms:
[codex:1407898] {"type": "object", "additionalProperties": false, "required": ["no_findings", "summary", "findings"], "properties": {"no_findings": {"type": "boolean"}, "summary": {"type": "string"}, "findings": {"type": "array", "items": {"type": "object", "additionalProperties": false, "required": ["severity", "category", "title", "evidence", "locations", "exploit_scenario", "recommendation"], "properties": {"severity": {"type": "string", "enum": ["info", "low", "medium", "high", "critical"]}, "category": {"type": "string", "enum": ["access_control", "reentrancy", "math", "oracle", "upgradeability", "auth", "other"]}, "title": {"type": "string"}, "exploit_scenario": {"type": "string"}, "recommendation": {"type": "string"}, "evidence": {"type": "string"}, "locations": {"type": "array", "items": {"type": "string"}}}}}}}
[codex:1407898]
[codex:1407898] thinking
[codex:1407898] **Finalizing vulnerability summary**
[codex:1407898] codex
[codex:1407898] {"no_findings":true,"summary":"No concrete vulnerabilities identified from the provided runtime bytecode/disassembly; analysis is limited without verified source.","findings":[]}
[codex:1407898] tokens used
[codex:1407898] 39,634
[codex:1407898] {"no_findings":true,"summary":"No concrete vulnerabilities identified from the provided runtime bytecode/disassembly; analysis is limited without verified source.","findings":[]}
{
"codex": {
"ran_at": "2025-12-30T21:03:53.624983+00:00",
"returncode": 0
},
"summary": "No concrete vulnerabilities identified from the provided runtime bytecode/disassembly; analysis is limited without verified source.",
"raw_final": {
"summary": "No concrete vulnerabilities identified from the provided runtime bytecode/disassembly; analysis is limited without verified source.",
"findings": [],
"no_findings": true
},
"no_findings": true,
"schema_version": 1
}
00000000: PUSH1 0x80 00000002: DUP1 00000003: PUSH1 0x40 00000005: MSTORE 00000006: PUSH1 0x04 00000008: CALLDATASIZE 00000009: LT 0000000a: ISZERO 0000000b: PUSH2 0x0012 0000000e: JUMPI 0000000f: PUSH0 00000010: DUP1 00000011: REVERT 00000012: JUMPDEST 00000013: PUSH0 00000014: CALLDATALOAD 00000015: PUSH1 0xe0 00000017: SHR 00000018: SWAP1 00000019: DUP2 0000001a: PUSH4 0x0724fda9 0000001f: EQ 00000020: PUSH2 0x0a39 00000023: JUMPI 00000024: POP 00000025: DUP1 00000026: PUSH4 0x0f7514a2 0000002b: EQ 0000002c: PUSH2 0x09ee 0000002f: JUMPI 00000030: DUP1 00000031: PUSH4 0x1686c909 00000036: EQ 00000037: PUSH2 0x0882 0000003a: JUMPI 0000003b: DUP1 0000003c: PUSH4 0x2dd31000 00000041: EQ 00000042: PUSH2 0x083f 00000045: JUMPI 00000046: DUP1 00000047: PUSH4 0x3f31ae3f 0000004c: EQ 0000004d: PUSH2 0x04f9 00000050: JUMPI 00000051: DUP1 00000052: PUSH4 0x49fc73dd 00000057: EQ 00000058: PUSH2 0x03f5 0000005b: JUMPI 0000005c: DUP1 0000005d: PUSH4 0x4e390d3e 00000062: EQ 00000063: PUSH2 0x03d1 00000066: JUMPI 00000067: DUP1 00000068: PUSH4 0x51e75e8b 0000006d: EQ 0000006e: PUSH2 0x0397 00000071: JUMPI 00000072: DUP1 00000073: PUSH4 0x75829def 00000078: EQ 00000079: PUSH2 0x02e2 0000007c: JUMPI 0000007d: DUP1 0000007e: PUSH4 0x82bfefc8 00000083: EQ 00000084: PUSH2 0x029f 00000087: JUMPI 00000088: DUP1 00000089: PUSH4 0x90e64d13 0000008e: EQ 0000008f: PUSH2 0x0285 00000092: JUMPI 00000093: DUP1 00000094: PUSH4 0xa480ca79 00000099: EQ 0000009a: PUSH2 0x01b0 0000009d: JUMPI 0000009e: DUP1 0000009f: PUSH4 0xbb4b5734 000000a4: EQ 000000a5: PUSH2 0x016f 000000a8: JUMPI 000000a9: DUP1 000000aa: PUSH4 0xc57981b5 000000af: EQ 000000b0: PUSH2 0x0135 000000b3: JUMPI 000000b4: DUP1 000000b5: PUSH4 0xce516507 000000ba: EQ 000000bb: PUSH2 0x00f5 000000be: JUMPI 000000bf: PUSH4 0xf851a440 000000c4: EQ 000000c5: PUSH2 0x00cc 000000c8: JUMPI 000000c9: PUSH0 000000ca: DUP1 000000cb: REVERT 000000cc: JUMPDEST 000000cd: CALLVALUE 000000ce: PUSH2 0x00f1 000000d1: JUMPI 000000d2: PUSH0 000000d3: CALLDATASIZE 000000d4: PUSH1 0x03 000000d6: NOT 000000d7: ADD 000000d8: SLT 000000d9: PUSH2 0x00f1 000000dc: JUMPI 000000dd: PUSH1 0x20 000000df: PUSH1 0x01 000000e1: PUSH1 0x01 000000e3: PUSH1 0xa0 000000e5: SHL 000000e6: SUB 000000e7: PUSH0 000000e8: SLOAD 000000e9: AND 000000ea: PUSH1 0x40 000000ec: MLOAD 000000ed: SWAP1 000000ee: DUP2 000000ef: MSTORE 000000f0: RETURN 000000f1: JUMPDEST 000000f2: PUSH0 000000f3: DUP1 000000f4: REVERT 000000f5: JUMPDEST 000000f6: CALLVALUE 000000f7: PUSH2 0x00f1 000000fa: JUMPI 000000fb: PUSH1 0x20 000000fd: CALLDATASIZE 000000fe: PUSH1 0x03 00000100: NOT 00000101: ADD 00000102: SLT 00000103: PUSH2 0x00f1 00000106: JUMPI 00000107: PUSH1 0x20 00000109: PUSH2 0x012b 0000010c: PUSH1 0x04 0000010e: CALLDATALOAD 0000010f: PUSH1 0xff 00000111: PUSH1 0x01 00000113: SWAP2 00000114: DUP1 00000115: PUSH1 0x08 00000117: SHR 00000118: PUSH0 00000119: MSTORE 0000011a: PUSH1 0x02 0000011c: PUSH1 0x20 0000011e: MSTORE 0000011f: AND 00000120: SHL 00000121: PUSH1 0x40 00000123: PUSH0 00000124: KECCAK256 00000125: SLOAD 00000126: AND 00000127: ISZERO 00000128: ISZERO 00000129: SWAP1 0000012a: JUMP 0000012b: JUMPDEST 0000012c: PUSH1 0x40 0000012e: MLOAD 0000012f: SWAP1 00000130: ISZERO 00000131: ISZERO 00000132: DUP2 00000133: MSTORE 00000134: RETURN 00000135: JUMPDEST 00000136: CALLVALUE 00000137: PUSH2 0x00f1 0000013a: JUMPI 0000013b: PUSH0 0000013c: CALLDATASIZE 0000013d: PUSH1 0x03 0000013f: NOT 00000140: ADD 00000141: SLT 00000142: PUSH2 0x00f1 00000145: JUMPI 00000146: PUSH1 0x20 00000148: PUSH1 0x40 0000014a: MLOAD 0000014b: PUSH32 0x0000000000000000000000000000000000000000000000000001476b081e8000 0000016c: DUP2 0000016d: MSTORE 0000016e: RETURN 0000016f: JUMPDEST 00000170: CALLVALUE 00000171: PUSH2 0x00f1 00000174: JUMPI 00000175: PUSH0 00000176: CALLDATASIZE 00000177: PUSH1 0x03 00000179: NOT 0000017a: ADD 0000017b: SLT 0000017c: PUSH2 0x00f1 0000017f: JUMPI 00000180: PUSH1 0x20 00000182: PUSH1 0x40 00000184: MLOAD 00000185: PUSH5 0xffffffffff 0000018b: PUSH32 0x000000000000000000000000000000000000000000000000000000006997ea50 000001ac: AND 000001ad: DUP2 000001ae: MSTORE 000001af: RETURN 000001b0: JUMPDEST 000001b1: CALLVALUE 000001b2: PUSH2 0x00f1 000001b5: JUMPI 000001b6: PUSH1 0x20 000001b8: CALLDATASIZE 000001b9: PUSH1 0x03 000001bb: NOT 000001bc: ADD 000001bd: SLT 000001be: PUSH2 0x00f1 000001c1: JUMPI 000001c2: PUSH2 0x01c9 000001c5: PUSH2 0x0ac9 000001c8: JUMP 000001c9: JUMPDEST 000001ca: PUSH1 0x01 000001cc: PUSH1 0x01 000001ce: PUSH1 0xa0 000001d0: SHL 000001d1: SUB 000001d2: PUSH32 0x00000000000000000000000071dd3ca88e7564416e5c2e350090c12bf8f6144a 000001f3: AND 000001f4: DUP1 000001f5: CALLER 000001f6: SUB 000001f7: PUSH2 0x0256 000001fa: JUMPI 000001fb: POP 000001fc: SELFBALANCE 000001fd: SWAP1 000001fe: PUSH0 000001ff: DUP1 00000200: DUP1 00000201: DUP1 00000202: DUP6 00000203: DUP6 00000204: GAS 00000205: CALL 00000206: PUSH2 0x020d 00000209: PUSH2 0x0b52 0000020c: JUMP 0000020d: JUMPDEST 0000020e: POP 0000020f: ISZERO 00000210: PUSH2 0x021e 00000213: JUMPI 00000214: PUSH1 0x20 00000216: DUP3 00000217: PUSH1 0x40 00000219: MLOAD 0000021a: SWAP1 0000021b: DUP2 0000021c: MSTORE 0000021d: RETURN 0000021e: JUMPDEST 0000021f: PUSH1 0x01 00000221: PUSH1 0x01 00000223: PUSH1 0xa0 00000225: SHL 00000226: SUB 00000227: SWAP1 00000228: PUSH32 0x245bf0c000000000000000000000000000000000000000000000000000000000 00000249: PUSH0 0000024a: MSTORE 0000024b: AND 0000024c: PUSH1 0x04 0000024e: MSTORE 0000024f: PUSH1 0x24 00000251: MSTORE 00000252: PUSH1 0x44 00000254: PUSH0 00000255: REVERT 00000256: JUMPDEST 00000257: PUSH32 0x4e3ddeed00000000000000000000000000000000000000000000000000000000 00000278: PUSH0 00000279: MSTORE 0000027a: PUSH1 0x04 0000027c: MSTORE 0000027d: CALLER 0000027e: PUSH1 0x24 00000280: MSTORE 00000281: PUSH1 0x44 00000283: PUSH0 00000284: REVERT 00000285: JUMPDEST 00000286: CALLVALUE 00000287: PUSH2 0x00f1 0000028a: JUMPI 0000028b: PUSH0 0000028c: CALLDATASIZE 0000028d: PUSH1 0x03 0000028f: NOT 00000290: ADD 00000291: SLT 00000292: PUSH2 0x00f1 00000295: JUMPI 00000296: PUSH1 0x20 00000298: PUSH2 0x012b 0000029b: PUSH2 0x0b15 0000029e: JUMP 0000029f: JUMPDEST 000002a0: CALLVALUE 000002a1: PUSH2 0x00f1 000002a4: JUMPI 000002a5: PUSH0 000002a6: CALLDATASIZE 000002a7: PUSH1 0x03 000002a9: NOT 000002aa: ADD 000002ab: SLT 000002ac: PUSH2 0x00f1 000002af: JUMPI 000002b0: PUSH1 0x20 000002b2: PUSH1 0x40 000002b4: MLOAD 000002b5: PUSH1 0x01 000002b7: PUSH1 0x01 000002b9: PUSH1 0xa0 000002bb: SHL 000002bc: SUB 000002bd: PUSH32 0x000000000000000000000000a0b86991c6218b36c1d19d4a2e9eb0ce3606eb48 000002de: AND 000002df: DUP2 000002e0: MSTORE 000002e1: RETURN 000002e2: JUMPDEST 000002e3: CALLVALUE 000002e4: PUSH2 0x00f1 000002e7: JUMPI 000002e8: PUSH1 0x20 000002ea: CALLDATASIZE 000002eb: PUSH1 0x03 000002ed: NOT 000002ee: ADD 000002ef: SLT 000002f0: PUSH2 0x00f1 000002f3: JUMPI 000002f4: PUSH2 0x02fb 000002f7: PUSH2 0x0ac9 000002fa: JUMP 000002fb: JUMPDEST 000002fc: PUSH0 000002fd: SLOAD 000002fe: PUSH1 0x01 00000300: PUSH1 0x01 00000302: PUSH1 0xa0 00000304: SHL 00000305: SUB 00000306: DUP2 00000307: AND 00000308: CALLER 00000309: DUP2 0000030a: SUB 0000030b: PUSH2 0x0368 0000030e: JUMPI 0000030f: POP 00000310: PUSH1 0x01 00000312: PUSH1 0x01 00000314: PUSH1 0xa0 00000316: SHL 00000317: SUB 00000318: PUSH32 0xffffffffffffffffffffffff0000000000000000000000000000000000000000 00000339: SWAP3 0000033a: AND 0000033b: SWAP2 0000033c: DUP3 0000033d: SWAP2 0000033e: AND 0000033f: OR 00000340: PUSH0 00000341: SSTORE 00000342: CALLER 00000343: PUSH32 0xbdd36143ee09de60bdefca70680e0f71189b2ed7acee364b53917ad433fdaf80 00000364: PUSH0 00000365: DUP1 00000366: LOG3 00000367: STOP 00000368: JUMPDEST 00000369: PUSH32 0xc6cce6a400000000000000000000000000000000000000000000000000000000 0000038a: PUSH0 0000038b: MSTORE 0000038c: PUSH1 0x04 0000038e: MSTORE 0000038f: CALLER 00000390: PUSH1 0x24 00000392: MSTORE 00000393: PUSH1 0x44 00000395: PUSH0 00000396: REVERT 00000397: JUMPDEST 00000398: CALLVALUE 00000399: PUSH2 0x00f1 0000039c: JUMPI 0000039d: PUSH0 0000039e: CALLDATASIZE 0000039f: PUSH1 0x03 000003a1: NOT 000003a2: ADD 000003a3: SLT 000003a4: PUSH2 0x00f1 000003a7: JUMPI 000003a8: PUSH1 0x20 000003aa: PUSH1 0x40 000003ac: MLOAD 000003ad: PUSH32 0x29f3fb247ca9801ac426ac637d5fcf2fe4ef8a53f78931d7a5a3ea45b03e4d51 000003ce: DUP2 000003cf: MSTORE 000003d0: RETURN 000003d1: JUMPDEST 000003d2: CALLVALUE 000003d3: PUSH2 0x00f1 000003d6: JUMPI 000003d7: PUSH0 000003d8: CALLDATASIZE 000003d9: PUSH1 0x03 000003db: NOT 000003dc: ADD 000003dd: SLT 000003de: PUSH2 0x00f1 000003e1: JUMPI 000003e2: PUSH1 0x20 000003e4: PUSH5 0xffffffffff 000003ea: PUSH1 0x03 000003ec: SLOAD 000003ed: AND 000003ee: PUSH1 0x40 000003f0: MLOAD 000003f1: SWAP1 000003f2: DUP2 000003f3: MSTORE 000003f4: RETURN 000003f5: JUMPDEST 000003f6: CALLVALUE 000003f7: PUSH2 0x00f1 000003fa: JUMPI 000003fb: PUSH0 000003fc: CALLDATASIZE 000003fd: PUSH1 0x03 000003ff: NOT 00000400: ADD 00000401: SLT 00000402: PUSH2 0x00f1 00000405: JUMPI 00000406: PUSH1 0x40 00000408: MLOAD 00000409: PUSH0 0000040a: PUSH1 0x01 0000040c: SLOAD 0000040d: DUP1 0000040e: PUSH1 0x01 00000410: SHR 00000411: SWAP1 00000412: PUSH1 0x01 00000414: DUP2 00000415: AND 00000416: DUP1 00000417: ISZERO 00000418: PUSH2 0x04ef 0000041b: JUMPI 0000041c: JUMPDEST 0000041d: PUSH1 0x20 0000041f: DUP4 00000420: LT 00000421: DUP2 00000422: EQ 00000423: PUSH2 0x04db 00000426: JUMPI 00000427: DUP3 00000428: DUP6 00000429: MSTORE 0000042a: SWAP1 0000042b: DUP2 0000042c: ISZERO 0000042d: PUSH2 0x04b7 00000430: JUMPI 00000431: POP 00000432: PUSH1 0x01 00000434: EQ 00000435: PUSH2 0x0459 00000438: JUMPI 00000439: JUMPDEST 0000043a: PUSH2 0x0455 0000043d: DUP4 0000043e: PUSH2 0x0449 00000441: DUP2 00000442: DUP6 00000443: SUB 00000444: DUP3 00000445: PUSH2 0x0adf 00000448: JUMP 00000449: JUMPDEST 0000044a: PUSH1 0x40 0000044c: MLOAD 0000044d: SWAP2 0000044e: DUP3 0000044f: SWAP2 00000450: DUP3 00000451: PUSH2 0x0a82 00000454: JUMP 00000455: JUMPDEST 00000456: SUB 00000457: SWAP1 00000458: RETURN 00000459: JUMPDEST 0000045a: SWAP2 0000045b: SWAP1 0000045c: POP 0000045d: PUSH1 0x01 0000045f: PUSH0 00000460: MSTORE 00000461: PUSH32 0xb10e2d527612073b26eecdfd717e6a320cf44b4afac2b0732d9fcbe2b7fa0cf6 00000482: SWAP2 00000483: PUSH0 00000484: SWAP1 00000485: JUMPDEST 00000486: DUP1 00000487: DUP3 00000488: LT 00000489: PUSH2 0x049d 0000048c: JUMPI 0000048d: POP 0000048e: SWAP1 0000048f: SWAP2 00000490: POP 00000491: DUP2 00000492: ADD 00000493: PUSH1 0x20 00000495: ADD 00000496: PUSH2 0x0449 00000499: PUSH2 0x0439 0000049c: JUMP 0000049d: JUMPDEST 0000049e: SWAP2 0000049f: SWAP3 000004a0: PUSH1 0x01 000004a2: DUP2 000004a3: PUSH1 0x20 000004a5: SWAP3 000004a6: SLOAD 000004a7: DUP4 000004a8: DUP6 000004a9: DUP9 000004aa: ADD 000004ab: ADD 000004ac: MSTORE 000004ad: ADD 000004ae: SWAP2 000004af: ADD 000004b0: SWAP1 000004b1: SWAP3 000004b2: SWAP2 000004b3: PUSH2 0x0485 000004b6: JUMP 000004b7: JUMPDEST 000004b8: PUSH1 0xff 000004ba: NOT 000004bb: AND 000004bc: PUSH1 0x20 000004be: DUP1 000004bf: DUP7 000004c0: ADD 000004c1: SWAP2 000004c2: SWAP1 000004c3: SWAP2 000004c4: MSTORE 000004c5: SWAP2 000004c6: ISZERO 000004c7: ISZERO 000004c8: PUSH1 0x05 000004ca: SHL 000004cb: DUP5 000004cc: ADD 000004cd: SWAP1 000004ce: SWAP2 000004cf: ADD 000004d0: SWAP2 000004d1: POP 000004d2: PUSH2 0x0449 000004d5: SWAP1 000004d6: POP 000004d7: PUSH2 0x0439 000004da: JUMP 000004db: JUMPDEST 000004dc: PUSH4 0x4e487b71 000004e1: PUSH1 0xe0 000004e3: SHL 000004e4: PUSH0 000004e5: MSTORE 000004e6: PUSH1 0x22 000004e8: PUSH1 0x04 000004ea: MSTORE 000004eb: PUSH1 0x24 000004ed: PUSH0 000004ee: REVERT 000004ef: JUMPDEST 000004f0: SWAP2 000004f1: PUSH1 0x7f 000004f3: AND 000004f4: SWAP2 000004f5: PUSH2 0x041c 000004f8: JUMP 000004f9: JUMPDEST 000004fa: PUSH1 0x80 000004fc: CALLDATASIZE 000004fd: PUSH1 0x03 000004ff: NOT 00000500: ADD 00000501: SLT 00000502: PUSH2 0x00f1 00000505: JUMPI 00000506: PUSH1 0x04 00000508: CALLDATALOAD 00000509: PUSH1 0x24 0000050b: CALLDATALOAD 0000050c: SWAP1 0000050d: PUSH1 0x01 0000050f: PUSH1 0x01 00000511: PUSH1 0xa0 00000513: SHL 00000514: SUB 00000515: DUP3 00000516: AND 00000517: SWAP2 00000518: DUP3 00000519: DUP2 0000051a: SUB 0000051b: PUSH2 0x00f1 0000051e: JUMPI 0000051f: PUSH1 0x44 00000521: CALLDATALOAD 00000522: SWAP3 00000523: PUSH16 0xffffffffffffffffffffffffffffffff 00000534: DUP5 00000535: AND 00000536: DUP1 00000537: SWAP5 00000538: SUB 00000539: PUSH2 0x00f1 0000053c: JUMPI 0000053d: PUSH1 0x64 0000053f: CALLDATALOAD 00000540: SWAP4 00000541: PUSH8 0xffffffffffffffff 0000054a: DUP6 0000054b: GT 0000054c: PUSH2 0x00f1 0000054f: JUMPI 00000550: CALLDATASIZE 00000551: PUSH1 0x23 00000553: DUP7 00000554: ADD 00000555: SLT 00000556: ISZERO 00000557: PUSH2 0x00f1 0000055a: JUMPI 0000055b: DUP5 0000055c: PUSH1 0x04 0000055e: ADD 0000055f: CALLDATALOAD 00000560: PUSH8 0xffffffffffffffff 00000569: DUP2 0000056a: GT 0000056b: PUSH2 0x00f1 0000056e: JUMPI 0000056f: DUP1 00000570: PUSH1 0x05 00000572: SHL 00000573: SWAP6 00000574: PUSH1 0x24 00000576: DUP8 00000577: DUP3 00000578: ADD 00000579: ADD 0000057a: SWAP1 0000057b: CALLDATASIZE 0000057c: DUP3 0000057d: GT 0000057e: PUSH2 0x00f1 00000581: JUMPI 00000582: PUSH2 0x0589 00000585: PUSH2 0x0b15 00000588: JUMP 00000589: JUMPDEST 0000058a: PUSH2 0x07e8 0000058d: JUMPI 0000058e: PUSH32 0x0000000000000000000000000000000000000000000000000001476b081e8000 000005af: DUP1 000005b0: CALLVALUE 000005b1: LT 000005b2: PUSH2 0x07b9 000005b5: JUMPI 000005b6: POP 000005b7: PUSH2 0x05d7 000005ba: DUP8 000005bb: PUSH1 0xff 000005bd: PUSH1 0x01 000005bf: SWAP2 000005c0: DUP1 000005c1: PUSH1 0x08 000005c3: SHR 000005c4: PUSH0 000005c5: MSTORE 000005c6: PUSH1 0x02 000005c8: PUSH1 0x20 000005ca: MSTORE 000005cb: AND 000005cc: SHL 000005cd: PUSH1 0x40 000005cf: PUSH0 000005d0: KECCAK256 000005d1: SLOAD 000005d2: AND 000005d3: ISZERO 000005d4: ISZERO 000005d5: SWAP1 000005d6: JUMP 000005d7: JUMPDEST 000005d8: PUSH2 0x078d 000005db: JUMPI 000005dc: PUSH1 0x40 000005de: MLOAD 000005df: PUSH1 0x20 000005e1: DUP2 000005e2: ADD 000005e3: SWAP1 000005e4: DUP9 000005e5: DUP3 000005e6: MSTORE 000005e7: DUP7 000005e8: PUSH1 0x40 000005ea: DUP3 000005eb: ADD 000005ec: MSTORE 000005ed: DUP6 000005ee: PUSH1 0x60 000005f0: DUP3 000005f1: ADD 000005f2: MSTORE 000005f3: PUSH1 0x60 000005f5: DUP2 000005f6: MSTORE 000005f7: PUSH2 0x0601 000005fa: PUSH1 0x80 000005fc: DUP3 000005fd: PUSH2 0x0adf 00000600: JUMP 00000601: JUMPDEST 00000602: MLOAD 00000603: SWAP1 00000604: KECCAK256 00000605: PUSH1 0x40 00000607: MLOAD 00000608: PUSH1 0x20 0000060a: DUP2 0000060b: ADD 0000060c: SWAP2 0000060d: DUP3 0000060e: MSTORE 0000060f: PUSH1 0x20 00000611: DUP2 00000612: MSTORE 00000613: PUSH2 0x061d 00000616: PUSH1 0x40 00000618: DUP3 00000619: PUSH2 0x0adf 0000061c: JUMP 0000061d: JUMPDEST 0000061e: MLOAD 0000061f: SWAP1 00000620: KECCAK256 00000621: SWAP3 00000622: PUSH2 0x0631 00000625: PUSH1 0x20 00000627: PUSH1 0x40 00000629: MLOAD 0000062a: SWAP11 0000062b: ADD 0000062c: DUP11 0000062d: PUSH2 0x0adf 00000630: JUMP 00000631: JUMPDEST 00000632: DUP9 00000633: MSTORE 00000634: PUSH1 0x24 00000636: ADD 00000637: PUSH1 0x20 00000639: DUP9 0000063a: ADD 0000063b: JUMPDEST 0000063c: DUP3 0000063d: DUP3 0000063e: LT 0000063f: PUSH2 0x077d 00000642: JUMPI 00000643: POP 00000644: POP 00000645: POP 00000646: SWAP3 00000647: PUSH0 00000648: SWAP4 00000649: JUMPDEST 0000064a: DUP7 0000064b: MLOAD 0000064c: DUP6 0000064d: LT 0000064e: ISZERO 0000064f: PUSH2 0x068b 00000652: JUMPI 00000653: PUSH1 0x20 00000655: DUP6 00000656: PUSH1 0x05 00000658: SHL 00000659: DUP9 0000065a: ADD 0000065b: ADD 0000065c: MLOAD 0000065d: SWAP1 0000065e: DUP2 0000065f: DUP2 00000660: LT 00000661: PUSH0 00000662: EQ 00000663: PUSH2 0x067a 00000666: JUMPI 00000667: PUSH0 00000668: MSTORE 00000669: PUSH1 0x20 0000066b: MSTORE 0000066c: PUSH1 0x01 0000066e: PUSH1 0x40 00000670: PUSH0 00000671: KECCAK256 00000672: JUMPDEST 00000673: SWAP5 00000674: ADD 00000675: SWAP4 00000676: PUSH2 0x0649 00000679: JUMP 0000067a: JUMPDEST 0000067b: SWAP1 0000067c: PUSH0 0000067d: MSTORE 0000067e: PUSH1 0x20 00000680: MSTORE 00000681: PUSH1 0x01 00000683: PUSH1 0x40 00000685: PUSH0 00000686: KECCAK256 00000687: PUSH2 0x0672 0000068a: JUMP 0000068b: JUMPDEST 0000068c: DUP6 0000068d: SWAP1 0000068e: PUSH32 0x29f3fb247ca9801ac426ac637d5fcf2fe4ef8a53f78931d7a5a3ea45b03e4d51 000006af: SUB 000006b0: PUSH2 0x0755 000006b3: JUMPI 000006b4: DUP3 000006b5: PUSH2 0x072e 000006b8: PUSH32 0x1dcd2362ae467d43bf31cbcac0526c0958b23eb063e011ab49a5179c839ed9a9 000006d9: SWAP5 000006da: PUSH1 0x40 000006dc: SWAP5 000006dd: PUSH1 0x03 000006df: SLOAD 000006e0: PUSH5 0xffffffffff 000006e6: DUP2 000006e7: AND 000006e8: ISZERO 000006e9: PUSH2 0x073b 000006ec: JUMPI 000006ed: JUMPDEST 000006ee: POP 000006ef: DUP5 000006f0: PUSH1 0x08 000006f2: SHR 000006f3: PUSH0 000006f4: MSTORE 000006f5: PUSH1 0x02 000006f7: PUSH1 0x20 000006f9: MSTORE 000006fa: DUP6 000006fb: PUSH0 000006fc: KECCAK256 000006fd: PUSH1 0x01 000006ff: PUSH1 0xff 00000701: DUP8 00000702: AND 00000703: SHL 00000704: DUP2 00000705: SLOAD 00000706: OR 00000707: SWAP1 00000708: SSTORE 00000709: PUSH32 0x000000000000000000000000a0b86991c6218b36c1d19d4a2e9eb0ce3606eb48 0000072a: PUSH2 0x0b91 0000072d: JUMP 0000072e: JUMPDEST 0000072f: DUP3 00000730: MLOAD 00000731: SWAP2 00000732: DUP3 00000733: MSTORE 00000734: PUSH1 0x20 00000736: DUP3 00000737: ADD 00000738: MSTORE 00000739: LOG2 0000073a: STOP 0000073b: JUMPDEST 0000073c: PUSH5 0xffffffffff 00000742: NOT 00000743: AND 00000744: TIMESTAMP 00000745: PUSH5 0xffffffffff 0000074b: AND 0000074c: OR 0000074d: PUSH1 0x03 0000074f: SSTORE 00000750: DUP9 00000751: PUSH2 0x06ed 00000754: JUMP 00000755: JUMPDEST 00000756: PUSH32 0xb4f0678700000000000000000000000000000000000000000000000000000000 00000777: PUSH0 00000778: MSTORE 00000779: PUSH1 0x04 0000077b: PUSH0 0000077c: REVERT 0000077d: JUMPDEST 0000077e: DUP2 0000077f: CALLDATALOAD 00000780: DUP2 00000781: MSTORE 00000782: PUSH1 0x20 00000784: SWAP2 00000785: DUP3 00000786: ADD 00000787: SWAP2 00000788: ADD 00000789: PUSH2 0x063b 0000078c: JUMP 0000078d: JUMPDEST 0000078e: DUP7 0000078f: PUSH32 0xebe6f30d00000000000000000000000000000000000000000000000000000000 000007b0: PUSH0 000007b1: MSTORE 000007b2: PUSH1 0x04 000007b4: MSTORE 000007b5: PUSH1 0x24 000007b7: PUSH0 000007b8: REVERT 000007b9: JUMPDEST 000007ba: PUSH32 0xa164c6b400000000000000000000000000000000000000000000000000000000 000007db: PUSH0 000007dc: MSTORE 000007dd: CALLVALUE 000007de: PUSH1 0x04 000007e0: MSTORE 000007e1: PUSH1 0x24 000007e3: MSTORE 000007e4: PUSH1 0x44 000007e6: PUSH0 000007e7: REVERT 000007e8: JUMPDEST 000007e9: PUSH32 0xdf4bae0500000000000000000000000000000000000000000000000000000000 0000080a: PUSH0 0000080b: MSTORE 0000080c: TIMESTAMP 0000080d: PUSH1 0x04 0000080f: MSTORE 00000810: PUSH5 0xffffffffff 00000816: PUSH32 0x000000000000000000000000000000000000000000000000000000006997ea50 00000837: AND 00000838: PUSH1 0x24 0000083a: MSTORE 0000083b: PUSH1 0x44 0000083d: PUSH0 0000083e: REVERT 0000083f: JUMPDEST 00000840: CALLVALUE 00000841: PUSH2 0x00f1 00000844: JUMPI 00000845: PUSH0 00000846: CALLDATASIZE 00000847: PUSH1 0x03 00000849: NOT 0000084a: ADD 0000084b: SLT 0000084c: PUSH2 0x00f1 0000084f: JUMPI 00000850: PUSH1 0x20 00000852: PUSH1 0x40 00000854: MLOAD 00000855: PUSH1 0x01 00000857: PUSH1 0x01 00000859: PUSH1 0xa0 0000085b: SHL 0000085c: SUB 0000085d: PUSH32 0x00000000000000000000000071dd3ca88e7564416e5c2e350090c12bf8f6144a 0000087e: AND 0000087f: DUP2 00000880: MSTORE 00000881: RETURN 00000882: JUMPDEST 00000883: CALLVALUE 00000884: PUSH2 0x00f1 00000887: JUMPI 00000888: PUSH1 0x40 0000088a: CALLDATASIZE 0000088b: PUSH1 0x03 0000088d: NOT 0000088e: ADD 0000088f: SLT 00000890: PUSH2 0x00f1 00000893: JUMPI 00000894: PUSH2 0x089b 00000897: PUSH2 0x0ac9 0000089a: JUMP 0000089b: JUMPDEST 0000089c: PUSH1 0x24 0000089e: CALLDATALOAD 0000089f: SWAP1 000008a0: PUSH16 0xffffffffffffffffffffffffffffffff 000008b1: DUP3 000008b2: AND 000008b3: DUP1 000008b4: SWAP3 000008b5: SUB 000008b6: PUSH2 0x00f1 000008b9: JUMPI 000008ba: PUSH1 0x01 000008bc: PUSH1 0x01 000008be: PUSH1 0xa0 000008c0: SHL 000008c1: SUB 000008c2: PUSH0 000008c3: SLOAD 000008c4: AND 000008c5: CALLER 000008c6: DUP2 000008c7: SUB 000008c8: PUSH2 0x0368 000008cb: JUMPI 000008cc: POP 000008cd: PUSH5 0xffffffffff 000008d3: PUSH1 0x03 000008d5: SLOAD 000008d6: AND 000008d7: DUP1 000008d8: ISZERO 000008d9: ISZERO 000008da: DUP1 000008db: PUSH2 0x09b9 000008de: JUMPI 000008df: JUMPDEST 000008e0: DUP1 000008e1: PUSH2 0x09aa 000008e4: JUMPI 000008e5: JUMPDEST 000008e6: PUSH2 0x0950 000008e9: JUMPI 000008ea: POP 000008eb: PUSH2 0x0915 000008ee: DUP3 000008ef: DUP3 000008f0: PUSH32 0x000000000000000000000000a0b86991c6218b36c1d19d4a2e9eb0ce3606eb48 00000911: PUSH2 0x0b91 00000914: JUMP 00000915: JUMPDEST 00000916: PUSH32 0x2e9d425ba8b27655048400b366d7b6a1f7180ebdb088e06bb7389704860ffe1f 00000937: PUSH1 0x20 00000939: PUSH1 0x01 0000093b: PUSH1 0x01 0000093d: PUSH1 0xa0 0000093f: SHL 00000940: SUB 00000941: DUP1 00000942: PUSH0 00000943: SLOAD 00000944: AND 00000945: SWAP4 00000946: PUSH1 0x40 00000948: MLOAD 00000949: SWAP6 0000094a: DUP7 0000094b: MSTORE 0000094c: AND 0000094d: SWAP4 0000094e: LOG3 0000094f: STOP 00000950: JUMPDEST 00000951: PUSH32 0xe2e40a0c00000000000000000000000000000000000000000000000000000000 00000972: PUSH0 00000973: MSTORE 00000974: TIMESTAMP 00000975: PUSH1 0x04 00000977: MSTORE 00000978: PUSH5 0xffffffffff 0000097e: PUSH32 0x000000000000000000000000000000000000000000000000000000006997ea50 0000099f: AND 000009a0: PUSH1 0x24 000009a2: MSTORE 000009a3: PUSH1 0x44 000009a5: MSTORE 000009a6: PUSH1 0x64 000009a8: PUSH0 000009a9: REVERT 000009aa: JUMPDEST 000009ab: POP 000009ac: PUSH2 0x09b3 000009af: PUSH2 0x0b15 000009b2: JUMP 000009b3: JUMPDEST 000009b4: ISZERO 000009b5: PUSH2 0x08e5 000009b8: JUMP 000009b9: JUMPDEST 000009ba: POP 000009bb: PUSH3 0x093a80 000009bf: DUP2 000009c0: ADD 000009c1: PUSH5 0xffffffffff 000009c7: DUP2 000009c8: GT 000009c9: PUSH2 0x09da 000009cc: JUMPI 000009cd: PUSH5 0xffffffffff 000009d3: AND 000009d4: TIMESTAMP 000009d5: GT 000009d6: PUSH2 0x08df 000009d9: JUMP 000009da: JUMPDEST 000009db: PUSH4 0x4e487b71 000009e0: PUSH1 0xe0 000009e2: SHL 000009e3: PUSH0 000009e4: MSTORE 000009e5: PUSH1 0x11 000009e7: PUSH1 0x04 000009e9: MSTORE 000009ea: PUSH1 0x24 000009ec: PUSH0 000009ed: REVERT 000009ee: JUMPDEST 000009ef: CALLVALUE 000009f0: PUSH2 0x00f1 000009f3: JUMPI 000009f4: PUSH0 000009f5: CALLDATASIZE 000009f6: PUSH1 0x03 000009f8: NOT 000009f9: ADD 000009fa: SLT 000009fb: PUSH2 0x00f1 000009fe: JUMPI 000009ff: PUSH2 0x0455 00000a02: PUSH1 0x40 00000a04: MLOAD 00000a05: PUSH32 0x696e7374616e7400000000000000000000000000000000000000000000000000 00000a26: PUSH1 0x20 00000a28: DUP3 00000a29: ADD 00000a2a: MSTORE 00000a2b: PUSH1 0x20 00000a2d: DUP2 00000a2e: MSTORE 00000a2f: PUSH2 0x0449 00000a32: PUSH1 0x40 00000a34: DUP3 00000a35: PUSH2 0x0adf 00000a38: JUMP 00000a39: JUMPDEST 00000a3a: CALLVALUE 00000a3b: PUSH2 0x00f1 00000a3e: JUMPI 00000a3f: PUSH0 00000a40: CALLDATASIZE 00000a41: PUSH1 0x03 00000a43: NOT 00000a44: ADD 00000a45: SLT 00000a46: PUSH2 0x00f1 00000a49: JUMPI 00000a4a: PUSH2 0x0455 00000a4d: SWAP1 00000a4e: PUSH32 0x5468652047726561742d65722043617665204573636170650000000000000000 00000a6f: PUSH1 0x20 00000a71: DUP3 00000a72: ADD 00000a73: MSTORE 00000a74: PUSH1 0x20 00000a76: DUP2 00000a77: MSTORE 00000a78: PUSH2 0x0449 00000a7b: PUSH1 0x40 00000a7d: DUP3 00000a7e: PUSH2 0x0adf 00000a81: JUMP 00000a82: JUMPDEST 00000a83: SWAP2 00000a84: SWAP1 00000a85: SWAP2 00000a86: PUSH1 0x20 00000a88: DUP2 00000a89: MSTORE 00000a8a: DUP3 00000a8b: MLOAD 00000a8c: DUP1 00000a8d: PUSH1 0x20 00000a8f: DUP4 00000a90: ADD 00000a91: MSTORE 00000a92: PUSH0 00000a93: JUMPDEST 00000a94: DUP2 00000a95: DUP2 00000a96: LT 00000a97: PUSH2 0x0ab3 00000a9a: JUMPI 00000a9b: POP 00000a9c: PUSH1 0x40 00000a9e: SWAP3 00000a9f: SWAP4 00000aa0: POP 00000aa1: PUSH0 00000aa2: DUP4 00000aa3: DUP3 00000aa4: DUP5 00000aa5: ADD 00000aa6: ADD 00000aa7: MSTORE 00000aa8: PUSH1 0x1f 00000aaa: DUP1 00000aab: NOT 00000aac: SWAP2 00000aad: ADD 00000aae: AND 00000aaf: ADD 00000ab0: ADD 00000ab1: SWAP1 00000ab2: JUMP 00000ab3: JUMPDEST 00000ab4: DUP1 00000ab5: PUSH1 0x20 00000ab7: DUP1 00000ab8: SWAP3 00000ab9: DUP8 00000aba: ADD 00000abb: ADD 00000abc: MLOAD 00000abd: PUSH1 0x40 00000abf: DUP3 00000ac0: DUP7 00000ac1: ADD 00000ac2: ADD 00000ac3: MSTORE 00000ac4: ADD 00000ac5: PUSH2 0x0a93 00000ac8: JUMP 00000ac9: JUMPDEST 00000aca: PUSH1 0x04 00000acc: CALLDATALOAD 00000acd: SWAP1 00000ace: PUSH1 0x01 00000ad0: PUSH1 0x01 00000ad2: PUSH1 0xa0 00000ad4: SHL 00000ad5: SUB 00000ad6: DUP3 00000ad7: AND 00000ad8: DUP3 00000ad9: SUB 00000ada: PUSH2 0x00f1 00000add: JUMPI 00000ade: JUMP 00000adf: JUMPDEST 00000ae0: SWAP1 00000ae1: PUSH1 0x1f 00000ae3: DUP1 00000ae4: NOT 00000ae5: SWAP2 00000ae6: ADD 00000ae7: AND 00000ae8: DUP2 00000ae9: ADD 00000aea: SWAP1 00000aeb: DUP2 00000aec: LT 00000aed: PUSH8 0xffffffffffffffff 00000af6: DUP3 00000af7: GT 00000af8: OR 00000af9: PUSH2 0x0b01 00000afc: JUMPI 00000afd: PUSH1 0x40 00000aff: MSTORE 00000b00: JUMP 00000b01: JUMPDEST 00000b02: PUSH4 0x4e487b71 00000b07: PUSH1 0xe0 00000b09: SHL 00000b0a: PUSH0 00000b0b: MSTORE 00000b0c: PUSH1 0x41 00000b0e: PUSH1 0x04 00000b10: MSTORE 00000b11: PUSH1 0x24 00000b13: PUSH0 00000b14: REVERT 00000b15: JUMPDEST 00000b16: PUSH5 0xffffffffff 00000b1c: PUSH32 0x000000000000000000000000000000000000000000000000000000006997ea50 00000b3d: AND 00000b3e: DUP1 00000b3f: ISZERO 00000b40: ISZERO 00000b41: SWAP1 00000b42: DUP2 00000b43: PUSH2 0x0b4a 00000b46: JUMPI 00000b47: POP 00000b48: SWAP1 00000b49: JUMP 00000b4a: JUMPDEST 00000b4b: SWAP1 00000b4c: POP 00000b4d: TIMESTAMP 00000b4e: LT 00000b4f: ISZERO 00000b50: SWAP1 00000b51: JUMP 00000b52: JUMPDEST 00000b53: RETURNDATASIZE 00000b54: ISZERO 00000b55: PUSH2 0x0b8c 00000b58: JUMPI 00000b59: RETURNDATASIZE 00000b5a: SWAP1 00000b5b: PUSH8 0xffffffffffffffff 00000b64: DUP3 00000b65: GT 00000b66: PUSH2 0x0b01 00000b69: JUMPI 00000b6a: PUSH1 0x40 00000b6c: MLOAD 00000b6d: SWAP2 00000b6e: PUSH2 0x0b81 00000b71: PUSH1 0x1f 00000b73: DUP3 00000b74: ADD 00000b75: PUSH1 0x1f 00000b77: NOT 00000b78: AND 00000b79: PUSH1 0x20 00000b7b: ADD 00000b7c: DUP5 00000b7d: PUSH2 0x0adf 00000b80: JUMP 00000b81: JUMPDEST 00000b82: DUP3 00000b83: MSTORE 00000b84: RETURNDATASIZE 00000b85: PUSH0 00000b86: PUSH1 0x20 00000b88: DUP5 00000b89: ADD 00000b8a: RETURNDATACOPY 00000b8b: JUMP 00000b8c: JUMPDEST 00000b8d: PUSH1 0x60 00000b8f: SWAP1 00000b90: JUMP 00000b91: JUMPDEST 00000b92: PUSH0 00000b93: PUSH2 0x0bfe 00000b96: SWAP3 00000b97: PUSH1 0x01 00000b99: PUSH1 0x01 00000b9b: PUSH1 0xa0 00000b9d: SHL 00000b9e: SUB 00000b9f: DUP3 00000ba0: SWAP4 00000ba1: PUSH1 0x40 00000ba3: MLOAD 00000ba4: SWAP7 00000ba5: DUP3 00000ba6: PUSH1 0x20 00000ba8: DUP10 00000ba9: ADD 00000baa: SWAP5 00000bab: PUSH32 0xa9059cbb00000000000000000000000000000000000000000000000000000000 00000bcc: DUP7 00000bcd: MSTORE 00000bce: AND 00000bcf: PUSH1 0x24 00000bd1: DUP10 00000bd2: ADD 00000bd3: MSTORE 00000bd4: PUSH1 0x44 00000bd6: DUP9 00000bd7: ADD 00000bd8: MSTORE 00000bd9: PUSH1 0x44 00000bdb: DUP8 00000bdc: MSTORE 00000bdd: PUSH2 0x0be7 00000be0: PUSH1 0x64 00000be2: DUP9 00000be3: PUSH2 0x0adf 00000be6: JUMP 00000be7: JUMPDEST 00000be8: AND 00000be9: SWAP5 00000bea: MLOAD 00000beb: SWAP1 00000bec: DUP3 00000bed: DUP7 00000bee: GAS 00000bef: CALL 00000bf0: PUSH2 0x0bf7 00000bf3: PUSH2 0x0b52 00000bf6: JUMP 00000bf7: JUMPDEST 00000bf8: SWAP1 00000bf9: DUP4 00000bfa: PUSH2 0x0c63 00000bfd: JUMP 00000bfe: JUMPDEST 00000bff: DUP1 00000c00: MLOAD 00000c01: SWAP1 00000c02: DUP2 00000c03: ISZERO 00000c04: ISZERO 00000c05: SWAP2 00000c06: DUP3 00000c07: PUSH2 0x0c3f 00000c0a: JUMPI 00000c0b: JUMPDEST 00000c0c: POP 00000c0d: POP 00000c0e: PUSH2 0x0c14 00000c11: JUMPI 00000c12: POP 00000c13: JUMP 00000c14: JUMPDEST 00000c15: PUSH32 0x5274afe700000000000000000000000000000000000000000000000000000000 00000c36: PUSH0 00000c37: MSTORE 00000c38: PUSH1 0x04 00000c3a: MSTORE 00000c3b: PUSH1 0x24 00000c3d: PUSH0 00000c3e: REVERT 00000c3f: JUMPDEST 00000c40: DUP2 00000c41: SWAP3 00000c42: POP 00000c43: SWAP1 00000c44: PUSH1 0x20 00000c46: SWAP2 00000c47: DUP2 00000c48: ADD 00000c49: SUB 00000c4a: SLT 00000c4b: PUSH2 0x00f1 00000c4e: JUMPI 00000c4f: PUSH1 0x20 00000c51: ADD 00000c52: MLOAD 00000c53: DUP1 00000c54: ISZERO 00000c55: SWAP1 00000c56: DUP2 00000c57: ISZERO 00000c58: SUB 00000c59: PUSH2 0x00f1 00000c5c: JUMPI 00000c5d: PUSH0 00000c5e: DUP1 00000c5f: PUSH2 0x0c0b 00000c62: JUMP 00000c63: JUMPDEST 00000c64: SWAP1 00000c65: PUSH2 0x0ca0 00000c68: JUMPI 00000c69: POP 00000c6a: DUP1 00000c6b: MLOAD 00000c6c: ISZERO 00000c6d: PUSH2 0x0c78 00000c70: JUMPI 00000c71: DUP1 00000c72: MLOAD 00000c73: SWAP1 00000c74: PUSH1 0x20 00000c76: ADD 00000c77: REVERT 00000c78: JUMPDEST 00000c79: PUSH32 0x1425ea4200000000000000000000000000000000000000000000000000000000 00000c9a: PUSH0 00000c9b: MSTORE 00000c9c: PUSH1 0x04 00000c9e: PUSH0 00000c9f: REVERT 00000ca0: JUMPDEST 00000ca1: DUP2 00000ca2: MLOAD 00000ca3: ISZERO 00000ca4: DUP1 00000ca5: PUSH2 0x0ce6 00000ca8: JUMPI 00000ca9: JUMPDEST 00000caa: PUSH2 0x0cb1 00000cad: JUMPI 00000cae: POP 00000caf: SWAP1 00000cb0: JUMP 00000cb1: JUMPDEST 00000cb2: PUSH1 0x01 00000cb4: PUSH1 0x01 00000cb6: PUSH1 0xa0 00000cb8: SHL 00000cb9: SUB 00000cba: SWAP1 00000cbb: PUSH32 0x9996b31500000000000000000000000000000000000000000000000000000000 00000cdc: PUSH0 00000cdd: MSTORE 00000cde: AND 00000cdf: PUSH1 0x04 00000ce1: MSTORE 00000ce2: PUSH1 0x24 00000ce4: PUSH0 00000ce5: REVERT 00000ce6: JUMPDEST 00000ce7: POP 00000ce8: DUP1 00000ce9: EXTCODESIZE 00000cea: ISZERO 00000ceb: PUSH2 0x0ca9 00000cee: JUMP 00000cef: INVALID 00000cf0: LOG1 00000cf1: PUSH5 0x736f6c6343 00000cf7: STOP 00000cf8: ADDMOD 00000cf9: BYTE 00000cfa: STOP 00000cfb: EXP
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| high | other | detector | Untrusted CALL target/value reachable | 60 | no | no |
viewtrace_id: 0xd7852c8041742b453852ef37b878cf3e6d815bbe1e0d21b69d5c60925b84c4e5
call_targets:
0x7b2700f30f2bad7de2602eb2f911c1ce2e01108b
target_varies:
no
classification:
constant_target
validation_json{
"sink": "CALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0xd7852c8041742b453852ef37b878cf3e6d815bbe1e0d21b69d5c60925b84c4e5",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x7b2700f30f2bad7de2602eb2f911c1ce2e01108b"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x0724fda9",
"selector": "0x0724fda9",
"calldata_variants": [
"0x0724fda9",
"0x0724fda90000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x0f7514a2",
"selector": "0x0f7514a2",
"calldata_variants": [
"0x0f7514a2",
"0x0f7514a20000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x1686c909",
"selector": "0x1686c909",
"calldata_variants": [
"0x1686c909",
"0x1686c9090000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x2dd31000",
"selector": "0x2dd31000",
"calldata_variants": [
"0x2dd31000",
"0x2dd310000000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x3f31ae3f",
"selector": "0x3f31ae3f",
"calldata_variants": [
"0x3f31ae3f",
"0x3f31ae3f0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x49fc73dd",
"selector": "0x49fc73dd",
"calldata_variants": [
"0x49fc73dd",
"0x49fc73dd0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x4e390d3e",
"selector": "0x4e390d3e",
"calldata_variants": [
"0x4e390d3e",
"0x4e390d3e0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x51e75e8b",
"selector": "0x51e75e8b",
"calldata_variants": [
"0x51e75e8b",
"0x51e75e8b0000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 517,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
},
{
"pc": 3055,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"call_count": 2,
"guards_detected": [],
"untrusted_call_count": 2
}
|
| high | other | detector | ETH value transfer possible | 55 | no | no |
viewtrace_id: 0xd7852c8041742b453852ef37b878cf3e6d815bbe1e0d21b69d5c60925b84c4e5
call_targets:
0x7b2700f30f2bad7de2602eb2f911c1ce2e01108b
target_varies:
no
classification:
constant_target
validation_json{
"sink": "CALL",
"errors": 0,
"status": "sink_reached",
"attempts": 1,
"trace_id": "0xd7852c8041742b453852ef37b878cf3e6d815bbe1e0d21b69d5c60925b84c4e5",
"confirmed": false,
"trace_mode": "callTracer",
"call_targets": [
"0x7b2700f30f2bad7de2602eb2f911c1ce2e01108b"
],
"matched_probe": null,
"target_varies": false,
"classification": "constant_target"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x0724fda9",
"selector": "0x0724fda9",
"calldata_variants": [
"0x0724fda9",
"0x0724fda90000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x0f7514a2",
"selector": "0x0f7514a2",
"calldata_variants": [
"0x0f7514a2",
"0x0f7514a20000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x1686c909",
"selector": "0x1686c909",
"calldata_variants": [
"0x1686c909",
"0x1686c9090000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x2dd31000",
"selector": "0x2dd31000",
"calldata_variants": [
"0x2dd31000",
"0x2dd310000000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x3f31ae3f",
"selector": "0x3f31ae3f",
"calldata_variants": [
"0x3f31ae3f",
"0x3f31ae3f0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x49fc73dd",
"selector": "0x49fc73dd",
"calldata_variants": [
"0x49fc73dd",
"0x49fc73dd0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x4e390d3e",
"selector": "0x4e390d3e",
"calldata_variants": [
"0x4e390d3e",
"0x4e390d3e0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x51e75e8b",
"selector": "0x51e75e8b",
"calldata_variants": [
"0x51e75e8b",
"0x51e75e8b0000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 517,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
},
{
"pc": 3055,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"eth_value_calls": 2,
"guards_detected": []
}
|