TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

b561d0c7-9b77-4672-9929-91db9c71ead6

complete
Chain ID
1
Address
Block Number
Created
Tue, Dec 30, 2025 9:03 PM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
0
Validated
0
Source
Bytecode only
Review Backing
Not yet
Best current signal
Untrusted CALL target/value reachable
crit 0 high 0 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
30766 report.consolidate complete 1 / 1 3 months ago
75592 artifact.fetch complete 1 / 3 2 weeks ago
75593 tool.cast_disasm complete 1 / 3 2 weeks ago
75594 analysis.bundle complete 1 / 3 2 weeks ago
75595 capability.graph complete 1 / 3 2 weeks ago
75596 detector.run complete 1 / 3 2 weeks ago
75597 validation.fork complete 1 / 3 2 weeks ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no
Implementation:
Verified Source: no

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate
Job Status
complete
Attempts
1 / 1
Findings
0
No findings?
yes
Summary
No concrete vulnerabilities identified from the provided runtime bytecode/disassembly; analysis is limited without verified source.
View stderr
[codex:1407898] OpenAI Codex v0.77.0 (research preview)
[codex:1407898] --------
[codex:1407898] workdir: /tmp/codex-multi-7pzbcidm
[codex:1407898] model: gpt-5.2-codex
[codex:1407898] provider: openai
[codex:1407898] approval: never
[codex:1407898] sandbox: read-only
[codex:1407898] reasoning effort: xhigh
[codex:1407898] reasoning summaries: auto
[codex:1407898] session id: 019b710e-ab1f-7932-bab0-5f19ea8f7010
[codex:1407898] --------
[codex:1407898] user
[codex:1407898] You are a security auditor. You are given EVM runtime bytecode (and possibly a disassembly) for a contract with NO verified source.
[codex:1407898] This is best-effort. Do not hallucinate: only flag issues when there's a concrete, explainable angle from bytecode/disasm patterns.
[codex:1407898] 
[codex:1407898] You MUST read the full `BYTECODE_BUNDLE.txt` before concluding.
[codex:1407898] 
[codex:1407898] Output MUST be valid JSON matching the provided schema.
[codex:1407898] - If you cannot identify a concrete issue from bytecode/disasm alone: set no_findings=true and findings=[].
[codex:1407898] - Otherwise: include findings with severity/category/title/evidence and point locations to BYTECODE_BUNDLE.txt line ranges when possible.
[codex:1407898] 
[codex:1407898] Output constraints (IMPORTANT):
[codex:1407898] - severity MUST be exactly one of: info, low, medium, high, critical (lowercase).
[codex:1407898] - category MUST be exactly one of: access_control, reentrancy, math, oracle, upgradeability, auth, other.
[codex:1407898] mcp startup: no servers
[codex:1407898] 
[codex:1407898] thinking
[codex:1407898] **Preparing to read file contents**
[codex:1407898] exec
[codex:1407898] /bin/bash -lc ls in /tmp/codex-multi-7pzbcidm succeeded in 5ms:
[codex:1407898] BYTECODE_BUNDLE.txt
[codex:1407898] codex-output-schema.json
[codex:1407898] exec
[codex:1407898] /bin/bash -lc 'cat BYTECODE_BUNDLE.txt' in /tmp/codex-multi-7pzbcidm succeeded in 5ms:
[codex:1407898] Runtime bytecode bundle for best-effort auditing.
[codex:1407898] Note: without verified source, conclusions are low-confidence unless a concrete pattern is visible.
[codex:1407898] 
[codex:1407898] FILE: runtime_bytecode.hex
[codex:1407898] 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
[codex:1407898] 
[codex:1407898] thinking
[codex:1407898] **Analyzing EVM bytecode manually**
[codex:1407898] 
[codex:1407898] I'm preparing to parse the runtime bytecode by hand since no tools are available, aiming to identify function selectors and opcode patterns that reveal contract behavior and potential vulnerabilities. I'll write a simple Python disassembler inline to decode opcodes and help map functions and storage interactions, carefully working within the read-only sandbox constraints.
[codex:1407898] exec
[codex:1407898] /bin/bash -lc "python - <<'PY'
[codex:1407898] import re,sys
[codex:1407898] hexdata=open('BYTECODE_BUNDLE.txt').read()
[codex:1407898] # extract runtime bytecode after 'FILE: runtime_bytecode.hex'
[codex:1407898] import re
[codex:1407898] m=re.search(r'FILE: runtime_bytecode.hex\\n(0x[0-9a-fA-F]+)', hexdata)
[codex:1407898] if not m:
[codex:1407898]     print('no runtime');sys.exit()
[codex:1407898] code=m.group(1)[2:]
[codex:1407898] # simple disasm
[codex:1407898] opcodes={
[codex:1407898] 0x00:'STOP',0x01:'ADD',0x02:'MUL',0x03:'SUB',0x04:'DIV',0x05:'SDIV',0x06:'MOD',0x07:'SMOD',0x08:'ADDMOD',0x09:'MULMOD',0x0a:'EXP',0x0b:'SIGNEXTEND',
[codex:1407898] 0x10:'LT',0x11:'GT',0x12:'SLT',0x13:'SGT',0x14:'EQ',0x15:'ISZERO',0x16:'AND',0x17:'OR',0x18:'XOR',0x19:'NOT',0x1a:'BYTE',0x1b:'SHL',0x1c:'SHR',0x1d:'SAR',
[codex:1407898] 0x20:'SHA3',
[codex:1407898] 0x30:'ADDRESS',0x31:'BALANCE',0x32:'ORIGIN',0x33:'CALLER',0x34:'CALLVALUE',0x35:'CALLDATALOAD',0x36:'CALLDATASIZE',0x37:'CALLDATACOPY',0x38:'CODESIZE',0x39:'CODECOPY',0x3a:'GASPRICE',0x3b:'EXTCODESIZE',0x3c:'EXTCODECOPY',0x3d:'RETURNDATASIZE',0x3e:'RETURNDATACOPY',0x3f:'EXTCODEHASH',
[codex:1407898] 0x40:'BLOCKHASH',0x41:'COINBASE',0x42:'TIMESTAMP',0x43:'NUMBER',0x44:'DIFFICULTY',0x45:'GASLIMIT',0x46:'CHAINID',0x47:'SELFBALANCE',0x48:'BASEFEE',
[codex:1407898] 0x50:'POP',0x51:'MLOAD',0x52:'MSTORE',0x53:'MSTORE8',0x54:'SLOAD',0x55:'SSTORE',0x56:'JUMP',0x57:'JUMPI',0x58:'PC',0x59:'MSIZE',0x5a:'GAS',0x5b:'JUMPDEST',0x5f:'PUSH0',
[codex:1407898] 0x60:'PUSH1',0x61:'PUSH2',0x62:'PUSH3',0x63:'PUSH4',0x64:'PUSH5',0x65:'PUSH6',0x66:'PUSH7',0x67:'PUSH8',0x68:'PUSH9',0x69:'PUSH10',0x6a:'PUSH11',0x6b:'PUSH12',0x6c:'PUSH13',0x6d:'PUSH14',0x6e:'PUSH15',0x6f:'PUSH16',
[codex:1407898] 0x70:'PUSH17',0x71:'PUSH18',0x72:'PUSH19',0x73:'PUSH20',0x74:'PUSH21',0x75:'PUSH22',0x76:'PUSH23',0x77:'PUSH24',0x78:'PUSH25',0x79:'PUSH26',0x7a:'PUSH27',0x7b:'PUSH28',0x7c:'PUSH29',0x7d:'PUSH30',0x7e:'PUSH31',0x7f:'PUSH32',
[codex:1407898] 0x80:'DUP1',0x81:'DUP2',0x82:'DUP3',0x83:'DUP4',0x84:'DUP5',0x85:'DUP6',0x86:'DUP7',0x87:'DUP8',0x88:'DUP9',0x89:'DUP10',0x8a:'DUP11',0x8b:'DUP12',0x8c:'DUP13',0x8d:'DUP14',0x8e:'DUP15',0x8f:'DUP16',
[codex:1407898] 0x90:'SWAP1',0x91:'SWAP2',0x92:'SWAP3',0x93:'SWAP4',0x94:'SWAP5',0x95:'SWAP6',0x96:'SWAP7',0x97:'SWAP8',0x98:'SWAP9',0x99:'SWAP10',0x9a:'SWAP11',0x9b:'SWAP12',0x9c:'SWAP13',0x9d:'SWAP14',0x9e:'SWAP15',0x9f:'SWAP16',
[codex:1407898] 0xa0:'LOG0',0xa1:'LOG1',0xa2:'LOG2',0xa3:'LOG3',0xa4:'LOG4',
[codex:1407898] 0xf0:'CREATE',0xf1:'CALL',0xf2:'CALLCODE',0xf3:'RETURN',0xf4:'DELEGATECALL',0xf5:'CREATE2',0xfa:'STATICCALL',0xfd:'REVERT',0xfe:'INVALID',0xff:'SELFDESTRUCT'
[codex:1407898] }
[codex:1407898] 
[codex:1407898] b=bytes.fromhex(code)
[codex:1407898] # produce list of (pc, op, imm)
[codex:1407898] res=[]
[codex:1407898] pc=0
[codex:1407898] while pc < len(b):
[codex:1407898]     op=b[pc]
[codex:1407898]     name=opcodes.get(op, f'OP{op:02x}')
[codex:1407898]     pc0=pc
[codex:1407898]     pc+=1
[codex:1407898]     imm=None
[codex:1407898]     if 0x60 <= op <= 0x7f:
[codex:1407898]         n=op-0x5f
[codex:1407898]         imm=b[pc:pc+n]
[codex:1407898]         pc+=n
[codex:1407898]     res.append((pc0,name,imm))
[codex:1407898] 
[codex:1407898] # print with pc and immediate
[codex:1407898] for pc,name,imm in res:
[codex:1407898]     if imm is None:
[codex:1407898]         print(f'{pc:04x}: {name}')
[codex:1407898]     else:
[codex:1407898]         print(f'{pc:04x}: {name} 0x{imm.hex()}')
[codex:1407898] PY" in /tmp/codex-multi-7pzbcidm succeeded in 34ms:
[codex:1407898] 0000: PUSH1 0x80
[codex:1407898] 0002: DUP1
[codex:1407898] 0003: PUSH1 0x40
[codex:1407898] 0005: MSTORE
[codex:1407898] 0006: PUSH1 0x04
[codex:1407898] 0008: CALLDATASIZE
[codex:1407898] 0009: LT
[codex:1407898] 000a: ISZERO
[codex:1407898] 000b: PUSH2 0x0012
[codex:1407898] 000e: JUMPI
[codex:1407898] 000f: PUSH0
[codex:1407898] 0010: DUP1
[codex:1407898] 0011: REVERT
[codex:1407898] 0012: JUMPDEST
[codex:1407898] 0013: PUSH0
[codex:1407898] 0014: CALLDATALOAD
[codex:1407898] 0015: PUSH1 0xe0
[codex:1407898] 0017: SHR
[codex:1407898] 0018: SWAP1
[codex:1407898] 0019: DUP2
[codex:1407898] 
[codex:1407898] 
[codex:1407898] thinking
[codex:1407898] **Performing detailed contract disassembly analysis**
[codex:1407898] 
[codex:1407898] I’m carefully tracing the contract’s storage patterns, function selectors, and logic—spotting owner access checks, USDC token interactions, admin withdraw functions, time-gated conditions, and possible NFT-related string constants. There’s a complex minting function with signature verifications and ETH payment checks, plus access controls enforced via hardcoded addresses, all pointing toward a wallet or minting contract with layered controls and fees. This thorough breakdown helps me assess possible vulnerabilities and contract behavior.
[codex:1407898] thinking
[codex:1407898] **Examining complex token transfer and state update flows**
[codex:1407898] 
[codex:1407898] I’m tracing how the contract verifies inputs, updates mappings to track usage, emits events, and handles USDC transfers via carefully constructed CALLs. There’s a time-locked withdraw function guarded by owner checks and timestamp constraints, plus logging for withdrawals. The contract uses bitmaps and timestamp storage with masking to control access and timing. I’m analyzing if external calls happen safely after state updates, how signature or Merkle proofs fit in, and whether any unchecked calls pose risks—all while trying to decode the interplay between ETH payments and USDC transfers in this multi-step logic.
[codex:1407898] exec
[codex:1407898] /bin/bash -lc "python - <<'PY'
[codex:1407898] import re
[codex:1407898] hexdata=open('BYTECODE_BUNDLE.txt').read()
[codex:1407898] import re
[codex:1407898] m=re.search(r'FILE: runtime_bytecode.hex\\n(0x[0-9a-fA-F]+)', hexdata)
[codex:1407898] code=m.group(1)[2:]
[codex:1407898] 
[codex:1407898] b=bytes.fromhex(code)
[codex:1407898] opcodes={0x55:'SSTORE'}
[codex:1407898] pc=0
[codex:1407898] while pc < len(b):
[codex:1407898]     op=b[pc]; pc0=pc; pc+=1
[codex:1407898]     if 0x60 <= op <= 0x7f:
[codex:1407898]         n=op-0x5f; pc+=n
[codex:1407898]     if op==0x55:
[codex:1407898]         print(f'{pc0:04x} SSTORE')
[codex:1407898] PY" in /tmp/codex-multi-7pzbcidm succeeded in 26ms:
[codex:1407898] 0341 SSTORE
[codex:1407898] 0708 SSTORE
[codex:1407898] 074f SSTORE
[codex:1407898] 
[codex:1407898] thinking
[codex:1407898] **Analyzing bytecode for access control and vulnerabilities**
[codex:1407898] exec
[codex:1407898] /bin/bash -lc 'cat codex-output-schema.json' in /tmp/codex-multi-7pzbcidm succeeded in 5ms:
[codex:1407898] {"type": "object", "additionalProperties": false, "required": ["no_findings", "summary", "findings"], "properties": {"no_findings": {"type": "boolean"}, "summary": {"type": "string"}, "findings": {"type": "array", "items": {"type": "object", "additionalProperties": false, "required": ["severity", "category", "title", "evidence", "locations", "exploit_scenario", "recommendation"], "properties": {"severity": {"type": "string", "enum": ["info", "low", "medium", "high", "critical"]}, "category": {"type": "string", "enum": ["access_control", "reentrancy", "math", "oracle", "upgradeability", "auth", "other"]}, "title": {"type": "string"}, "exploit_scenario": {"type": "string"}, "recommendation": {"type": "string"}, "evidence": {"type": "string"}, "locations": {"type": "array", "items": {"type": "string"}}}}}}}
[codex:1407898] 
[codex:1407898] thinking
[codex:1407898] **Finalizing vulnerability summary**
[codex:1407898] codex
[codex:1407898] {"no_findings":true,"summary":"No concrete vulnerabilities identified from the provided runtime bytecode/disassembly; analysis is limited without verified source.","findings":[]}
[codex:1407898] tokens used
[codex:1407898] 39,634
[codex:1407898] {"no_findings":true,"summary":"No concrete vulnerabilities identified from the provided runtime bytecode/disassembly; analysis is limited without verified source.","findings":[]}
Metadata
{
    "codex": {
        "ran_at": "2025-12-30T21:03:53.624983+00:00",
        "returncode": 0
    },
    "summary": "No concrete vulnerabilities identified from the provided runtime bytecode/disassembly; analysis is limited without verified source.",
    "raw_final": {
        "summary": "No concrete vulnerabilities identified from the provided runtime bytecode/disassembly; analysis is limited without verified source.",
        "findings": [],
        "no_findings": true
    },
    "no_findings": true,
    "schema_version": 1
}

Opcode Heuristics

tool.cast_disasm
Delegatecall
0
Selfdestruct
0
CREATE2
0
CALL-family (heavy)
2
EXT*/BALANCE
1
Total opcodes
1573
Flags
No heuristic flags raised.
View cast disassembly output
00000000: PUSH1 0x80
00000002: DUP1
00000003: PUSH1 0x40
00000005: MSTORE
00000006: PUSH1 0x04
00000008: CALLDATASIZE
00000009: LT
0000000a: ISZERO
0000000b: PUSH2 0x0012
0000000e: JUMPI
0000000f: PUSH0
00000010: DUP1
00000011: REVERT
00000012: JUMPDEST
00000013: PUSH0
00000014: CALLDATALOAD
00000015: PUSH1 0xe0
00000017: SHR
00000018: SWAP1
00000019: DUP2
0000001a: PUSH4 0x0724fda9
0000001f: EQ
00000020: PUSH2 0x0a39
00000023: JUMPI
00000024: POP
00000025: DUP1
00000026: PUSH4 0x0f7514a2
0000002b: EQ
0000002c: PUSH2 0x09ee
0000002f: JUMPI
00000030: DUP1
00000031: PUSH4 0x1686c909
00000036: EQ
00000037: PUSH2 0x0882
0000003a: JUMPI
0000003b: DUP1
0000003c: PUSH4 0x2dd31000
00000041: EQ
00000042: PUSH2 0x083f
00000045: JUMPI
00000046: DUP1
00000047: PUSH4 0x3f31ae3f
0000004c: EQ
0000004d: PUSH2 0x04f9
00000050: JUMPI
00000051: DUP1
00000052: PUSH4 0x49fc73dd
00000057: EQ
00000058: PUSH2 0x03f5
0000005b: JUMPI
0000005c: DUP1
0000005d: PUSH4 0x4e390d3e
00000062: EQ
00000063: PUSH2 0x03d1
00000066: JUMPI
00000067: DUP1
00000068: PUSH4 0x51e75e8b
0000006d: EQ
0000006e: PUSH2 0x0397
00000071: JUMPI
00000072: DUP1
00000073: PUSH4 0x75829def
00000078: EQ
00000079: PUSH2 0x02e2
0000007c: JUMPI
0000007d: DUP1
0000007e: PUSH4 0x82bfefc8
00000083: EQ
00000084: PUSH2 0x029f
00000087: JUMPI
00000088: DUP1
00000089: PUSH4 0x90e64d13
0000008e: EQ
0000008f: PUSH2 0x0285
00000092: JUMPI
00000093: DUP1
00000094: PUSH4 0xa480ca79
00000099: EQ
0000009a: PUSH2 0x01b0
0000009d: JUMPI
0000009e: DUP1
0000009f: PUSH4 0xbb4b5734
000000a4: EQ
000000a5: PUSH2 0x016f
000000a8: JUMPI
000000a9: DUP1
000000aa: PUSH4 0xc57981b5
000000af: EQ
000000b0: PUSH2 0x0135
000000b3: JUMPI
000000b4: DUP1
000000b5: PUSH4 0xce516507
000000ba: EQ
000000bb: PUSH2 0x00f5
000000be: JUMPI
000000bf: PUSH4 0xf851a440
000000c4: EQ
000000c5: PUSH2 0x00cc
000000c8: JUMPI
000000c9: PUSH0
000000ca: DUP1
000000cb: REVERT
000000cc: JUMPDEST
000000cd: CALLVALUE
000000ce: PUSH2 0x00f1
000000d1: JUMPI
000000d2: PUSH0
000000d3: CALLDATASIZE
000000d4: PUSH1 0x03
000000d6: NOT
000000d7: ADD
000000d8: SLT
000000d9: PUSH2 0x00f1
000000dc: JUMPI
000000dd: PUSH1 0x20
000000df: PUSH1 0x01
000000e1: PUSH1 0x01
000000e3: PUSH1 0xa0
000000e5: SHL
000000e6: SUB
000000e7: PUSH0
000000e8: SLOAD
000000e9: AND
000000ea: PUSH1 0x40
000000ec: MLOAD
000000ed: SWAP1
000000ee: DUP2
000000ef: MSTORE
000000f0: RETURN
000000f1: JUMPDEST
000000f2: PUSH0
000000f3: DUP1
000000f4: REVERT
000000f5: JUMPDEST
000000f6: CALLVALUE
000000f7: PUSH2 0x00f1
000000fa: JUMPI
000000fb: PUSH1 0x20
000000fd: CALLDATASIZE
000000fe: PUSH1 0x03
00000100: NOT
00000101: ADD
00000102: SLT
00000103: PUSH2 0x00f1
00000106: JUMPI
00000107: PUSH1 0x20
00000109: PUSH2 0x012b
0000010c: PUSH1 0x04
0000010e: CALLDATALOAD
0000010f: PUSH1 0xff
00000111: PUSH1 0x01
00000113: SWAP2
00000114: DUP1
00000115: PUSH1 0x08
00000117: SHR
00000118: PUSH0
00000119: MSTORE
0000011a: PUSH1 0x02
0000011c: PUSH1 0x20
0000011e: MSTORE
0000011f: AND
00000120: SHL
00000121: PUSH1 0x40
00000123: PUSH0
00000124: KECCAK256
00000125: SLOAD
00000126: AND
00000127: ISZERO
00000128: ISZERO
00000129: SWAP1
0000012a: JUMP
0000012b: JUMPDEST
0000012c: PUSH1 0x40
0000012e: MLOAD
0000012f: SWAP1
00000130: ISZERO
00000131: ISZERO
00000132: DUP2
00000133: MSTORE
00000134: RETURN
00000135: JUMPDEST
00000136: CALLVALUE
00000137: PUSH2 0x00f1
0000013a: JUMPI
0000013b: PUSH0
0000013c: CALLDATASIZE
0000013d: PUSH1 0x03
0000013f: NOT
00000140: ADD
00000141: SLT
00000142: PUSH2 0x00f1
00000145: JUMPI
00000146: PUSH1 0x20
00000148: PUSH1 0x40
0000014a: MLOAD
0000014b: PUSH32 0x0000000000000000000000000000000000000000000000000001476b081e8000
0000016c: DUP2
0000016d: MSTORE
0000016e: RETURN
0000016f: JUMPDEST
00000170: CALLVALUE
00000171: PUSH2 0x00f1
00000174: JUMPI
00000175: PUSH0
00000176: CALLDATASIZE
00000177: PUSH1 0x03
00000179: NOT
0000017a: ADD
0000017b: SLT
0000017c: PUSH2 0x00f1
0000017f: JUMPI
00000180: PUSH1 0x20
00000182: PUSH1 0x40
00000184: MLOAD
00000185: PUSH5 0xffffffffff
0000018b: PUSH32 0x000000000000000000000000000000000000000000000000000000006997ea50
000001ac: AND
000001ad: DUP2
000001ae: MSTORE
000001af: RETURN
000001b0: JUMPDEST
000001b1: CALLVALUE
000001b2: PUSH2 0x00f1
000001b5: JUMPI
000001b6: PUSH1 0x20
000001b8: CALLDATASIZE
000001b9: PUSH1 0x03
000001bb: NOT
000001bc: ADD
000001bd: SLT
000001be: PUSH2 0x00f1
000001c1: JUMPI
000001c2: PUSH2 0x01c9
000001c5: PUSH2 0x0ac9
000001c8: JUMP
000001c9: JUMPDEST
000001ca: PUSH1 0x01
000001cc: PUSH1 0x01
000001ce: PUSH1 0xa0
000001d0: SHL
000001d1: SUB
000001d2: PUSH32 0x00000000000000000000000071dd3ca88e7564416e5c2e350090c12bf8f6144a
000001f3: AND
000001f4: DUP1
000001f5: CALLER
000001f6: SUB
000001f7: PUSH2 0x0256
000001fa: JUMPI
000001fb: POP
000001fc: SELFBALANCE
000001fd: SWAP1
000001fe: PUSH0
000001ff: DUP1
00000200: DUP1
00000201: DUP1
00000202: DUP6
00000203: DUP6
00000204: GAS
00000205: CALL
00000206: PUSH2 0x020d
00000209: PUSH2 0x0b52
0000020c: JUMP
0000020d: JUMPDEST
0000020e: POP
0000020f: ISZERO
00000210: PUSH2 0x021e
00000213: JUMPI
00000214: PUSH1 0x20
00000216: DUP3
00000217: PUSH1 0x40
00000219: MLOAD
0000021a: SWAP1
0000021b: DUP2
0000021c: MSTORE
0000021d: RETURN
0000021e: JUMPDEST
0000021f: PUSH1 0x01
00000221: PUSH1 0x01
00000223: PUSH1 0xa0
00000225: SHL
00000226: SUB
00000227: SWAP1
00000228: PUSH32 0x245bf0c000000000000000000000000000000000000000000000000000000000
00000249: PUSH0
0000024a: MSTORE
0000024b: AND
0000024c: PUSH1 0x04
0000024e: MSTORE
0000024f: PUSH1 0x24
00000251: MSTORE
00000252: PUSH1 0x44
00000254: PUSH0
00000255: REVERT
00000256: JUMPDEST
00000257: PUSH32 0x4e3ddeed00000000000000000000000000000000000000000000000000000000
00000278: PUSH0
00000279: MSTORE
0000027a: PUSH1 0x04
0000027c: MSTORE
0000027d: CALLER
0000027e: PUSH1 0x24
00000280: MSTORE
00000281: PUSH1 0x44
00000283: PUSH0
00000284: REVERT
00000285: JUMPDEST
00000286: CALLVALUE
00000287: PUSH2 0x00f1
0000028a: JUMPI
0000028b: PUSH0
0000028c: CALLDATASIZE
0000028d: PUSH1 0x03
0000028f: NOT
00000290: ADD
00000291: SLT
00000292: PUSH2 0x00f1
00000295: JUMPI
00000296: PUSH1 0x20
00000298: PUSH2 0x012b
0000029b: PUSH2 0x0b15
0000029e: JUMP
0000029f: JUMPDEST
000002a0: CALLVALUE
000002a1: PUSH2 0x00f1
000002a4: JUMPI
000002a5: PUSH0
000002a6: CALLDATASIZE
000002a7: PUSH1 0x03
000002a9: NOT
000002aa: ADD
000002ab: SLT
000002ac: PUSH2 0x00f1
000002af: JUMPI
000002b0: PUSH1 0x20
000002b2: PUSH1 0x40
000002b4: MLOAD
000002b5: PUSH1 0x01
000002b7: PUSH1 0x01
000002b9: PUSH1 0xa0
000002bb: SHL
000002bc: SUB
000002bd: PUSH32 0x000000000000000000000000a0b86991c6218b36c1d19d4a2e9eb0ce3606eb48
000002de: AND
000002df: DUP2
000002e0: MSTORE
000002e1: RETURN
000002e2: JUMPDEST
000002e3: CALLVALUE
000002e4: PUSH2 0x00f1
000002e7: JUMPI
000002e8: PUSH1 0x20
000002ea: CALLDATASIZE
000002eb: PUSH1 0x03
000002ed: NOT
000002ee: ADD
000002ef: SLT
000002f0: PUSH2 0x00f1
000002f3: JUMPI
000002f4: PUSH2 0x02fb
000002f7: PUSH2 0x0ac9
000002fa: JUMP
000002fb: JUMPDEST
000002fc: PUSH0
000002fd: SLOAD
000002fe: PUSH1 0x01
00000300: PUSH1 0x01
00000302: PUSH1 0xa0
00000304: SHL
00000305: SUB
00000306: DUP2
00000307: AND
00000308: CALLER
00000309: DUP2
0000030a: SUB
0000030b: PUSH2 0x0368
0000030e: JUMPI
0000030f: POP
00000310: PUSH1 0x01
00000312: PUSH1 0x01
00000314: PUSH1 0xa0
00000316: SHL
00000317: SUB
00000318: PUSH32 0xffffffffffffffffffffffff0000000000000000000000000000000000000000
00000339: SWAP3
0000033a: AND
0000033b: SWAP2
0000033c: DUP3
0000033d: SWAP2
0000033e: AND
0000033f: OR
00000340: PUSH0
00000341: SSTORE
00000342: CALLER
00000343: PUSH32 0xbdd36143ee09de60bdefca70680e0f71189b2ed7acee364b53917ad433fdaf80
00000364: PUSH0
00000365: DUP1
00000366: LOG3
00000367: STOP
00000368: JUMPDEST
00000369: PUSH32 0xc6cce6a400000000000000000000000000000000000000000000000000000000
0000038a: PUSH0
0000038b: MSTORE
0000038c: PUSH1 0x04
0000038e: MSTORE
0000038f: CALLER
00000390: PUSH1 0x24
00000392: MSTORE
00000393: PUSH1 0x44
00000395: PUSH0
00000396: REVERT
00000397: JUMPDEST
00000398: CALLVALUE
00000399: PUSH2 0x00f1
0000039c: JUMPI
0000039d: PUSH0
0000039e: CALLDATASIZE
0000039f: PUSH1 0x03
000003a1: NOT
000003a2: ADD
000003a3: SLT
000003a4: PUSH2 0x00f1
000003a7: JUMPI
000003a8: PUSH1 0x20
000003aa: PUSH1 0x40
000003ac: MLOAD
000003ad: PUSH32 0x29f3fb247ca9801ac426ac637d5fcf2fe4ef8a53f78931d7a5a3ea45b03e4d51
000003ce: DUP2
000003cf: MSTORE
000003d0: RETURN
000003d1: JUMPDEST
000003d2: CALLVALUE
000003d3: PUSH2 0x00f1
000003d6: JUMPI
000003d7: PUSH0
000003d8: CALLDATASIZE
000003d9: PUSH1 0x03
000003db: NOT
000003dc: ADD
000003dd: SLT
000003de: PUSH2 0x00f1
000003e1: JUMPI
000003e2: PUSH1 0x20
000003e4: PUSH5 0xffffffffff
000003ea: PUSH1 0x03
000003ec: SLOAD
000003ed: AND
000003ee: PUSH1 0x40
000003f0: MLOAD
000003f1: SWAP1
000003f2: DUP2
000003f3: MSTORE
000003f4: RETURN
000003f5: JUMPDEST
000003f6: CALLVALUE
000003f7: PUSH2 0x00f1
000003fa: JUMPI
000003fb: PUSH0
000003fc: CALLDATASIZE
000003fd: PUSH1 0x03
000003ff: NOT
00000400: ADD
00000401: SLT
00000402: PUSH2 0x00f1
00000405: JUMPI
00000406: PUSH1 0x40
00000408: MLOAD
00000409: PUSH0
0000040a: PUSH1 0x01
0000040c: SLOAD
0000040d: DUP1
0000040e: PUSH1 0x01
00000410: SHR
00000411: SWAP1
00000412: PUSH1 0x01
00000414: DUP2
00000415: AND
00000416: DUP1
00000417: ISZERO
00000418: PUSH2 0x04ef
0000041b: JUMPI
0000041c: JUMPDEST
0000041d: PUSH1 0x20
0000041f: DUP4
00000420: LT
00000421: DUP2
00000422: EQ
00000423: PUSH2 0x04db
00000426: JUMPI
00000427: DUP3
00000428: DUP6
00000429: MSTORE
0000042a: SWAP1
0000042b: DUP2
0000042c: ISZERO
0000042d: PUSH2 0x04b7
00000430: JUMPI
00000431: POP
00000432: PUSH1 0x01
00000434: EQ
00000435: PUSH2 0x0459
00000438: JUMPI
00000439: JUMPDEST
0000043a: PUSH2 0x0455
0000043d: DUP4
0000043e: PUSH2 0x0449
00000441: DUP2
00000442: DUP6
00000443: SUB
00000444: DUP3
00000445: PUSH2 0x0adf
00000448: JUMP
00000449: JUMPDEST
0000044a: PUSH1 0x40
0000044c: MLOAD
0000044d: SWAP2
0000044e: DUP3
0000044f: SWAP2
00000450: DUP3
00000451: PUSH2 0x0a82
00000454: JUMP
00000455: JUMPDEST
00000456: SUB
00000457: SWAP1
00000458: RETURN
00000459: JUMPDEST
0000045a: SWAP2
0000045b: SWAP1
0000045c: POP
0000045d: PUSH1 0x01
0000045f: PUSH0
00000460: MSTORE
00000461: PUSH32 0xb10e2d527612073b26eecdfd717e6a320cf44b4afac2b0732d9fcbe2b7fa0cf6
00000482: SWAP2
00000483: PUSH0
00000484: SWAP1
00000485: JUMPDEST
00000486: DUP1
00000487: DUP3
00000488: LT
00000489: PUSH2 0x049d
0000048c: JUMPI
0000048d: POP
0000048e: SWAP1
0000048f: SWAP2
00000490: POP
00000491: DUP2
00000492: ADD
00000493: PUSH1 0x20
00000495: ADD
00000496: PUSH2 0x0449
00000499: PUSH2 0x0439
0000049c: JUMP
0000049d: JUMPDEST
0000049e: SWAP2
0000049f: SWAP3
000004a0: PUSH1 0x01
000004a2: DUP2
000004a3: PUSH1 0x20
000004a5: SWAP3
000004a6: SLOAD
000004a7: DUP4
000004a8: DUP6
000004a9: DUP9
000004aa: ADD
000004ab: ADD
000004ac: MSTORE
000004ad: ADD
000004ae: SWAP2
000004af: ADD
000004b0: SWAP1
000004b1: SWAP3
000004b2: SWAP2
000004b3: PUSH2 0x0485
000004b6: JUMP
000004b7: JUMPDEST
000004b8: PUSH1 0xff
000004ba: NOT
000004bb: AND
000004bc: PUSH1 0x20
000004be: DUP1
000004bf: DUP7
000004c0: ADD
000004c1: SWAP2
000004c2: SWAP1
000004c3: SWAP2
000004c4: MSTORE
000004c5: SWAP2
000004c6: ISZERO
000004c7: ISZERO
000004c8: PUSH1 0x05
000004ca: SHL
000004cb: DUP5
000004cc: ADD
000004cd: SWAP1
000004ce: SWAP2
000004cf: ADD
000004d0: SWAP2
000004d1: POP
000004d2: PUSH2 0x0449
000004d5: SWAP1
000004d6: POP
000004d7: PUSH2 0x0439
000004da: JUMP
000004db: JUMPDEST
000004dc: PUSH4 0x4e487b71
000004e1: PUSH1 0xe0
000004e3: SHL
000004e4: PUSH0
000004e5: MSTORE
000004e6: PUSH1 0x22
000004e8: PUSH1 0x04
000004ea: MSTORE
000004eb: PUSH1 0x24
000004ed: PUSH0
000004ee: REVERT
000004ef: JUMPDEST
000004f0: SWAP2
000004f1: PUSH1 0x7f
000004f3: AND
000004f4: SWAP2
000004f5: PUSH2 0x041c
000004f8: JUMP
000004f9: JUMPDEST
000004fa: PUSH1 0x80
000004fc: CALLDATASIZE
000004fd: PUSH1 0x03
000004ff: NOT
00000500: ADD
00000501: SLT
00000502: PUSH2 0x00f1
00000505: JUMPI
00000506: PUSH1 0x04
00000508: CALLDATALOAD
00000509: PUSH1 0x24
0000050b: CALLDATALOAD
0000050c: SWAP1
0000050d: PUSH1 0x01
0000050f: PUSH1 0x01
00000511: PUSH1 0xa0
00000513: SHL
00000514: SUB
00000515: DUP3
00000516: AND
00000517: SWAP2
00000518: DUP3
00000519: DUP2
0000051a: SUB
0000051b: PUSH2 0x00f1
0000051e: JUMPI
0000051f: PUSH1 0x44
00000521: CALLDATALOAD
00000522: SWAP3
00000523: PUSH16 0xffffffffffffffffffffffffffffffff
00000534: DUP5
00000535: AND
00000536: DUP1
00000537: SWAP5
00000538: SUB
00000539: PUSH2 0x00f1
0000053c: JUMPI
0000053d: PUSH1 0x64
0000053f: CALLDATALOAD
00000540: SWAP4
00000541: PUSH8 0xffffffffffffffff
0000054a: DUP6
0000054b: GT
0000054c: PUSH2 0x00f1
0000054f: JUMPI
00000550: CALLDATASIZE
00000551: PUSH1 0x23
00000553: DUP7
00000554: ADD
00000555: SLT
00000556: ISZERO
00000557: PUSH2 0x00f1
0000055a: JUMPI
0000055b: DUP5
0000055c: PUSH1 0x04
0000055e: ADD
0000055f: CALLDATALOAD
00000560: PUSH8 0xffffffffffffffff
00000569: DUP2
0000056a: GT
0000056b: PUSH2 0x00f1
0000056e: JUMPI
0000056f: DUP1
00000570: PUSH1 0x05
00000572: SHL
00000573: SWAP6
00000574: PUSH1 0x24
00000576: DUP8
00000577: DUP3
00000578: ADD
00000579: ADD
0000057a: SWAP1
0000057b: CALLDATASIZE
0000057c: DUP3
0000057d: GT
0000057e: PUSH2 0x00f1
00000581: JUMPI
00000582: PUSH2 0x0589
00000585: PUSH2 0x0b15
00000588: JUMP
00000589: JUMPDEST
0000058a: PUSH2 0x07e8
0000058d: JUMPI
0000058e: PUSH32 0x0000000000000000000000000000000000000000000000000001476b081e8000
000005af: DUP1
000005b0: CALLVALUE
000005b1: LT
000005b2: PUSH2 0x07b9
000005b5: JUMPI
000005b6: POP
000005b7: PUSH2 0x05d7
000005ba: DUP8
000005bb: PUSH1 0xff
000005bd: PUSH1 0x01
000005bf: SWAP2
000005c0: DUP1
000005c1: PUSH1 0x08
000005c3: SHR
000005c4: PUSH0
000005c5: MSTORE
000005c6: PUSH1 0x02
000005c8: PUSH1 0x20
000005ca: MSTORE
000005cb: AND
000005cc: SHL
000005cd: PUSH1 0x40
000005cf: PUSH0
000005d0: KECCAK256
000005d1: SLOAD
000005d2: AND
000005d3: ISZERO
000005d4: ISZERO
000005d5: SWAP1
000005d6: JUMP
000005d7: JUMPDEST
000005d8: PUSH2 0x078d
000005db: JUMPI
000005dc: PUSH1 0x40
000005de: MLOAD
000005df: PUSH1 0x20
000005e1: DUP2
000005e2: ADD
000005e3: SWAP1
000005e4: DUP9
000005e5: DUP3
000005e6: MSTORE
000005e7: DUP7
000005e8: PUSH1 0x40
000005ea: DUP3
000005eb: ADD
000005ec: MSTORE
000005ed: DUP6
000005ee: PUSH1 0x60
000005f0: DUP3
000005f1: ADD
000005f2: MSTORE
000005f3: PUSH1 0x60
000005f5: DUP2
000005f6: MSTORE
000005f7: PUSH2 0x0601
000005fa: PUSH1 0x80
000005fc: DUP3
000005fd: PUSH2 0x0adf
00000600: JUMP
00000601: JUMPDEST
00000602: MLOAD
00000603: SWAP1
00000604: KECCAK256
00000605: PUSH1 0x40
00000607: MLOAD
00000608: PUSH1 0x20
0000060a: DUP2
0000060b: ADD
0000060c: SWAP2
0000060d: DUP3
0000060e: MSTORE
0000060f: PUSH1 0x20
00000611: DUP2
00000612: MSTORE
00000613: PUSH2 0x061d
00000616: PUSH1 0x40
00000618: DUP3
00000619: PUSH2 0x0adf
0000061c: JUMP
0000061d: JUMPDEST
0000061e: MLOAD
0000061f: SWAP1
00000620: KECCAK256
00000621: SWAP3
00000622: PUSH2 0x0631
00000625: PUSH1 0x20
00000627: PUSH1 0x40
00000629: MLOAD
0000062a: SWAP11
0000062b: ADD
0000062c: DUP11
0000062d: PUSH2 0x0adf
00000630: JUMP
00000631: JUMPDEST
00000632: DUP9
00000633: MSTORE
00000634: PUSH1 0x24
00000636: ADD
00000637: PUSH1 0x20
00000639: DUP9
0000063a: ADD
0000063b: JUMPDEST
0000063c: DUP3
0000063d: DUP3
0000063e: LT
0000063f: PUSH2 0x077d
00000642: JUMPI
00000643: POP
00000644: POP
00000645: POP
00000646: SWAP3
00000647: PUSH0
00000648: SWAP4
00000649: JUMPDEST
0000064a: DUP7
0000064b: MLOAD
0000064c: DUP6
0000064d: LT
0000064e: ISZERO
0000064f: PUSH2 0x068b
00000652: JUMPI
00000653: PUSH1 0x20
00000655: DUP6
00000656: PUSH1 0x05
00000658: SHL
00000659: DUP9
0000065a: ADD
0000065b: ADD
0000065c: MLOAD
0000065d: SWAP1
0000065e: DUP2
0000065f: DUP2
00000660: LT
00000661: PUSH0
00000662: EQ
00000663: PUSH2 0x067a
00000666: JUMPI
00000667: PUSH0
00000668: MSTORE
00000669: PUSH1 0x20
0000066b: MSTORE
0000066c: PUSH1 0x01
0000066e: PUSH1 0x40
00000670: PUSH0
00000671: KECCAK256
00000672: JUMPDEST
00000673: SWAP5
00000674: ADD
00000675: SWAP4
00000676: PUSH2 0x0649
00000679: JUMP
0000067a: JUMPDEST
0000067b: SWAP1
0000067c: PUSH0
0000067d: MSTORE
0000067e: PUSH1 0x20
00000680: MSTORE
00000681: PUSH1 0x01
00000683: PUSH1 0x40
00000685: PUSH0
00000686: KECCAK256
00000687: PUSH2 0x0672
0000068a: JUMP
0000068b: JUMPDEST
0000068c: DUP6
0000068d: SWAP1
0000068e: PUSH32 0x29f3fb247ca9801ac426ac637d5fcf2fe4ef8a53f78931d7a5a3ea45b03e4d51
000006af: SUB
000006b0: PUSH2 0x0755
000006b3: JUMPI
000006b4: DUP3
000006b5: PUSH2 0x072e
000006b8: PUSH32 0x1dcd2362ae467d43bf31cbcac0526c0958b23eb063e011ab49a5179c839ed9a9
000006d9: SWAP5
000006da: PUSH1 0x40
000006dc: SWAP5
000006dd: PUSH1 0x03
000006df: SLOAD
000006e0: PUSH5 0xffffffffff
000006e6: DUP2
000006e7: AND
000006e8: ISZERO
000006e9: PUSH2 0x073b
000006ec: JUMPI
000006ed: JUMPDEST
000006ee: POP
000006ef: DUP5
000006f0: PUSH1 0x08
000006f2: SHR
000006f3: PUSH0
000006f4: MSTORE
000006f5: PUSH1 0x02
000006f7: PUSH1 0x20
000006f9: MSTORE
000006fa: DUP6
000006fb: PUSH0
000006fc: KECCAK256
000006fd: PUSH1 0x01
000006ff: PUSH1 0xff
00000701: DUP8
00000702: AND
00000703: SHL
00000704: DUP2
00000705: SLOAD
00000706: OR
00000707: SWAP1
00000708: SSTORE
00000709: PUSH32 0x000000000000000000000000a0b86991c6218b36c1d19d4a2e9eb0ce3606eb48
0000072a: PUSH2 0x0b91
0000072d: JUMP
0000072e: JUMPDEST
0000072f: DUP3
00000730: MLOAD
00000731: SWAP2
00000732: DUP3
00000733: MSTORE
00000734: PUSH1 0x20
00000736: DUP3
00000737: ADD
00000738: MSTORE
00000739: LOG2
0000073a: STOP
0000073b: JUMPDEST
0000073c: PUSH5 0xffffffffff
00000742: NOT
00000743: AND
00000744: TIMESTAMP
00000745: PUSH5 0xffffffffff
0000074b: AND
0000074c: OR
0000074d: PUSH1 0x03
0000074f: SSTORE
00000750: DUP9
00000751: PUSH2 0x06ed
00000754: JUMP
00000755: JUMPDEST
00000756: PUSH32 0xb4f0678700000000000000000000000000000000000000000000000000000000
00000777: PUSH0
00000778: MSTORE
00000779: PUSH1 0x04
0000077b: PUSH0
0000077c: REVERT
0000077d: JUMPDEST
0000077e: DUP2
0000077f: CALLDATALOAD
00000780: DUP2
00000781: MSTORE
00000782: PUSH1 0x20
00000784: SWAP2
00000785: DUP3
00000786: ADD
00000787: SWAP2
00000788: ADD
00000789: PUSH2 0x063b
0000078c: JUMP
0000078d: JUMPDEST
0000078e: DUP7
0000078f: PUSH32 0xebe6f30d00000000000000000000000000000000000000000000000000000000
000007b0: PUSH0
000007b1: MSTORE
000007b2: PUSH1 0x04
000007b4: MSTORE
000007b5: PUSH1 0x24
000007b7: PUSH0
000007b8: REVERT
000007b9: JUMPDEST
000007ba: PUSH32 0xa164c6b400000000000000000000000000000000000000000000000000000000
000007db: PUSH0
000007dc: MSTORE
000007dd: CALLVALUE
000007de: PUSH1 0x04
000007e0: MSTORE
000007e1: PUSH1 0x24
000007e3: MSTORE
000007e4: PUSH1 0x44
000007e6: PUSH0
000007e7: REVERT
000007e8: JUMPDEST
000007e9: PUSH32 0xdf4bae0500000000000000000000000000000000000000000000000000000000
0000080a: PUSH0
0000080b: MSTORE
0000080c: TIMESTAMP
0000080d: PUSH1 0x04
0000080f: MSTORE
00000810: PUSH5 0xffffffffff
00000816: PUSH32 0x000000000000000000000000000000000000000000000000000000006997ea50
00000837: AND
00000838: PUSH1 0x24
0000083a: MSTORE
0000083b: PUSH1 0x44
0000083d: PUSH0
0000083e: REVERT
0000083f: JUMPDEST
00000840: CALLVALUE
00000841: PUSH2 0x00f1
00000844: JUMPI
00000845: PUSH0
00000846: CALLDATASIZE
00000847: PUSH1 0x03
00000849: NOT
0000084a: ADD
0000084b: SLT
0000084c: PUSH2 0x00f1
0000084f: JUMPI
00000850: PUSH1 0x20
00000852: PUSH1 0x40
00000854: MLOAD
00000855: PUSH1 0x01
00000857: PUSH1 0x01
00000859: PUSH1 0xa0
0000085b: SHL
0000085c: SUB
0000085d: PUSH32 0x00000000000000000000000071dd3ca88e7564416e5c2e350090c12bf8f6144a
0000087e: AND
0000087f: DUP2
00000880: MSTORE
00000881: RETURN
00000882: JUMPDEST
00000883: CALLVALUE
00000884: PUSH2 0x00f1
00000887: JUMPI
00000888: PUSH1 0x40
0000088a: CALLDATASIZE
0000088b: PUSH1 0x03
0000088d: NOT
0000088e: ADD
0000088f: SLT
00000890: PUSH2 0x00f1
00000893: JUMPI
00000894: PUSH2 0x089b
00000897: PUSH2 0x0ac9
0000089a: JUMP
0000089b: JUMPDEST
0000089c: PUSH1 0x24
0000089e: CALLDATALOAD
0000089f: SWAP1
000008a0: PUSH16 0xffffffffffffffffffffffffffffffff
000008b1: DUP3
000008b2: AND
000008b3: DUP1
000008b4: SWAP3
000008b5: SUB
000008b6: PUSH2 0x00f1
000008b9: JUMPI
000008ba: PUSH1 0x01
000008bc: PUSH1 0x01
000008be: PUSH1 0xa0
000008c0: SHL
000008c1: SUB
000008c2: PUSH0
000008c3: SLOAD
000008c4: AND
000008c5: CALLER
000008c6: DUP2
000008c7: SUB
000008c8: PUSH2 0x0368
000008cb: JUMPI
000008cc: POP
000008cd: PUSH5 0xffffffffff
000008d3: PUSH1 0x03
000008d5: SLOAD
000008d6: AND
000008d7: DUP1
000008d8: ISZERO
000008d9: ISZERO
000008da: DUP1
000008db: PUSH2 0x09b9
000008de: JUMPI
000008df: JUMPDEST
000008e0: DUP1
000008e1: PUSH2 0x09aa
000008e4: JUMPI
000008e5: JUMPDEST
000008e6: PUSH2 0x0950
000008e9: JUMPI
000008ea: POP
000008eb: PUSH2 0x0915
000008ee: DUP3
000008ef: DUP3
000008f0: PUSH32 0x000000000000000000000000a0b86991c6218b36c1d19d4a2e9eb0ce3606eb48
00000911: PUSH2 0x0b91
00000914: JUMP
00000915: JUMPDEST
00000916: PUSH32 0x2e9d425ba8b27655048400b366d7b6a1f7180ebdb088e06bb7389704860ffe1f
00000937: PUSH1 0x20
00000939: PUSH1 0x01
0000093b: PUSH1 0x01
0000093d: PUSH1 0xa0
0000093f: SHL
00000940: SUB
00000941: DUP1
00000942: PUSH0
00000943: SLOAD
00000944: AND
00000945: SWAP4
00000946: PUSH1 0x40
00000948: MLOAD
00000949: SWAP6
0000094a: DUP7
0000094b: MSTORE
0000094c: AND
0000094d: SWAP4
0000094e: LOG3
0000094f: STOP
00000950: JUMPDEST
00000951: PUSH32 0xe2e40a0c00000000000000000000000000000000000000000000000000000000
00000972: PUSH0
00000973: MSTORE
00000974: TIMESTAMP
00000975: PUSH1 0x04
00000977: MSTORE
00000978: PUSH5 0xffffffffff
0000097e: PUSH32 0x000000000000000000000000000000000000000000000000000000006997ea50
0000099f: AND
000009a0: PUSH1 0x24
000009a2: MSTORE
000009a3: PUSH1 0x44
000009a5: MSTORE
000009a6: PUSH1 0x64
000009a8: PUSH0
000009a9: REVERT
000009aa: JUMPDEST
000009ab: POP
000009ac: PUSH2 0x09b3
000009af: PUSH2 0x0b15
000009b2: JUMP
000009b3: JUMPDEST
000009b4: ISZERO
000009b5: PUSH2 0x08e5
000009b8: JUMP
000009b9: JUMPDEST
000009ba: POP
000009bb: PUSH3 0x093a80
000009bf: DUP2
000009c0: ADD
000009c1: PUSH5 0xffffffffff
000009c7: DUP2
000009c8: GT
000009c9: PUSH2 0x09da
000009cc: JUMPI
000009cd: PUSH5 0xffffffffff
000009d3: AND
000009d4: TIMESTAMP
000009d5: GT
000009d6: PUSH2 0x08df
000009d9: JUMP
000009da: JUMPDEST
000009db: PUSH4 0x4e487b71
000009e0: PUSH1 0xe0
000009e2: SHL
000009e3: PUSH0
000009e4: MSTORE
000009e5: PUSH1 0x11
000009e7: PUSH1 0x04
000009e9: MSTORE
000009ea: PUSH1 0x24
000009ec: PUSH0
000009ed: REVERT
000009ee: JUMPDEST
000009ef: CALLVALUE
000009f0: PUSH2 0x00f1
000009f3: JUMPI
000009f4: PUSH0
000009f5: CALLDATASIZE
000009f6: PUSH1 0x03
000009f8: NOT
000009f9: ADD
000009fa: SLT
000009fb: PUSH2 0x00f1
000009fe: JUMPI
000009ff: PUSH2 0x0455
00000a02: PUSH1 0x40
00000a04: MLOAD
00000a05: PUSH32 0x696e7374616e7400000000000000000000000000000000000000000000000000
00000a26: PUSH1 0x20
00000a28: DUP3
00000a29: ADD
00000a2a: MSTORE
00000a2b: PUSH1 0x20
00000a2d: DUP2
00000a2e: MSTORE
00000a2f: PUSH2 0x0449
00000a32: PUSH1 0x40
00000a34: DUP3
00000a35: PUSH2 0x0adf
00000a38: JUMP
00000a39: JUMPDEST
00000a3a: CALLVALUE
00000a3b: PUSH2 0x00f1
00000a3e: JUMPI
00000a3f: PUSH0
00000a40: CALLDATASIZE
00000a41: PUSH1 0x03
00000a43: NOT
00000a44: ADD
00000a45: SLT
00000a46: PUSH2 0x00f1
00000a49: JUMPI
00000a4a: PUSH2 0x0455
00000a4d: SWAP1
00000a4e: PUSH32 0x5468652047726561742d65722043617665204573636170650000000000000000
00000a6f: PUSH1 0x20
00000a71: DUP3
00000a72: ADD
00000a73: MSTORE
00000a74: PUSH1 0x20
00000a76: DUP2
00000a77: MSTORE
00000a78: PUSH2 0x0449
00000a7b: PUSH1 0x40
00000a7d: DUP3
00000a7e: PUSH2 0x0adf
00000a81: JUMP
00000a82: JUMPDEST
00000a83: SWAP2
00000a84: SWAP1
00000a85: SWAP2
00000a86: PUSH1 0x20
00000a88: DUP2
00000a89: MSTORE
00000a8a: DUP3
00000a8b: MLOAD
00000a8c: DUP1
00000a8d: PUSH1 0x20
00000a8f: DUP4
00000a90: ADD
00000a91: MSTORE
00000a92: PUSH0
00000a93: JUMPDEST
00000a94: DUP2
00000a95: DUP2
00000a96: LT
00000a97: PUSH2 0x0ab3
00000a9a: JUMPI
00000a9b: POP
00000a9c: PUSH1 0x40
00000a9e: SWAP3
00000a9f: SWAP4
00000aa0: POP
00000aa1: PUSH0
00000aa2: DUP4
00000aa3: DUP3
00000aa4: DUP5
00000aa5: ADD
00000aa6: ADD
00000aa7: MSTORE
00000aa8: PUSH1 0x1f
00000aaa: DUP1
00000aab: NOT
00000aac: SWAP2
00000aad: ADD
00000aae: AND
00000aaf: ADD
00000ab0: ADD
00000ab1: SWAP1
00000ab2: JUMP
00000ab3: JUMPDEST
00000ab4: DUP1
00000ab5: PUSH1 0x20
00000ab7: DUP1
00000ab8: SWAP3
00000ab9: DUP8
00000aba: ADD
00000abb: ADD
00000abc: MLOAD
00000abd: PUSH1 0x40
00000abf: DUP3
00000ac0: DUP7
00000ac1: ADD
00000ac2: ADD
00000ac3: MSTORE
00000ac4: ADD
00000ac5: PUSH2 0x0a93
00000ac8: JUMP
00000ac9: JUMPDEST
00000aca: PUSH1 0x04
00000acc: CALLDATALOAD
00000acd: SWAP1
00000ace: PUSH1 0x01
00000ad0: PUSH1 0x01
00000ad2: PUSH1 0xa0
00000ad4: SHL
00000ad5: SUB
00000ad6: DUP3
00000ad7: AND
00000ad8: DUP3
00000ad9: SUB
00000ada: PUSH2 0x00f1
00000add: JUMPI
00000ade: JUMP
00000adf: JUMPDEST
00000ae0: SWAP1
00000ae1: PUSH1 0x1f
00000ae3: DUP1
00000ae4: NOT
00000ae5: SWAP2
00000ae6: ADD
00000ae7: AND
00000ae8: DUP2
00000ae9: ADD
00000aea: SWAP1
00000aeb: DUP2
00000aec: LT
00000aed: PUSH8 0xffffffffffffffff
00000af6: DUP3
00000af7: GT
00000af8: OR
00000af9: PUSH2 0x0b01
00000afc: JUMPI
00000afd: PUSH1 0x40
00000aff: MSTORE
00000b00: JUMP
00000b01: JUMPDEST
00000b02: PUSH4 0x4e487b71
00000b07: PUSH1 0xe0
00000b09: SHL
00000b0a: PUSH0
00000b0b: MSTORE
00000b0c: PUSH1 0x41
00000b0e: PUSH1 0x04
00000b10: MSTORE
00000b11: PUSH1 0x24
00000b13: PUSH0
00000b14: REVERT
00000b15: JUMPDEST
00000b16: PUSH5 0xffffffffff
00000b1c: PUSH32 0x000000000000000000000000000000000000000000000000000000006997ea50
00000b3d: AND
00000b3e: DUP1
00000b3f: ISZERO
00000b40: ISZERO
00000b41: SWAP1
00000b42: DUP2
00000b43: PUSH2 0x0b4a
00000b46: JUMPI
00000b47: POP
00000b48: SWAP1
00000b49: JUMP
00000b4a: JUMPDEST
00000b4b: SWAP1
00000b4c: POP
00000b4d: TIMESTAMP
00000b4e: LT
00000b4f: ISZERO
00000b50: SWAP1
00000b51: JUMP
00000b52: JUMPDEST
00000b53: RETURNDATASIZE
00000b54: ISZERO
00000b55: PUSH2 0x0b8c
00000b58: JUMPI
00000b59: RETURNDATASIZE
00000b5a: SWAP1
00000b5b: PUSH8 0xffffffffffffffff
00000b64: DUP3
00000b65: GT
00000b66: PUSH2 0x0b01
00000b69: JUMPI
00000b6a: PUSH1 0x40
00000b6c: MLOAD
00000b6d: SWAP2
00000b6e: PUSH2 0x0b81
00000b71: PUSH1 0x1f
00000b73: DUP3
00000b74: ADD
00000b75: PUSH1 0x1f
00000b77: NOT
00000b78: AND
00000b79: PUSH1 0x20
00000b7b: ADD
00000b7c: DUP5
00000b7d: PUSH2 0x0adf
00000b80: JUMP
00000b81: JUMPDEST
00000b82: DUP3
00000b83: MSTORE
00000b84: RETURNDATASIZE
00000b85: PUSH0
00000b86: PUSH1 0x20
00000b88: DUP5
00000b89: ADD
00000b8a: RETURNDATACOPY
00000b8b: JUMP
00000b8c: JUMPDEST
00000b8d: PUSH1 0x60
00000b8f: SWAP1
00000b90: JUMP
00000b91: JUMPDEST
00000b92: PUSH0
00000b93: PUSH2 0x0bfe
00000b96: SWAP3
00000b97: PUSH1 0x01
00000b99: PUSH1 0x01
00000b9b: PUSH1 0xa0
00000b9d: SHL
00000b9e: SUB
00000b9f: DUP3
00000ba0: SWAP4
00000ba1: PUSH1 0x40
00000ba3: MLOAD
00000ba4: SWAP7
00000ba5: DUP3
00000ba6: PUSH1 0x20
00000ba8: DUP10
00000ba9: ADD
00000baa: SWAP5
00000bab: PUSH32 0xa9059cbb00000000000000000000000000000000000000000000000000000000
00000bcc: DUP7
00000bcd: MSTORE
00000bce: AND
00000bcf: PUSH1 0x24
00000bd1: DUP10
00000bd2: ADD
00000bd3: MSTORE
00000bd4: PUSH1 0x44
00000bd6: DUP9
00000bd7: ADD
00000bd8: MSTORE
00000bd9: PUSH1 0x44
00000bdb: DUP8
00000bdc: MSTORE
00000bdd: PUSH2 0x0be7
00000be0: PUSH1 0x64
00000be2: DUP9
00000be3: PUSH2 0x0adf
00000be6: JUMP
00000be7: JUMPDEST
00000be8: AND
00000be9: SWAP5
00000bea: MLOAD
00000beb: SWAP1
00000bec: DUP3
00000bed: DUP7
00000bee: GAS
00000bef: CALL
00000bf0: PUSH2 0x0bf7
00000bf3: PUSH2 0x0b52
00000bf6: JUMP
00000bf7: JUMPDEST
00000bf8: SWAP1
00000bf9: DUP4
00000bfa: PUSH2 0x0c63
00000bfd: JUMP
00000bfe: JUMPDEST
00000bff: DUP1
00000c00: MLOAD
00000c01: SWAP1
00000c02: DUP2
00000c03: ISZERO
00000c04: ISZERO
00000c05: SWAP2
00000c06: DUP3
00000c07: PUSH2 0x0c3f
00000c0a: JUMPI
00000c0b: JUMPDEST
00000c0c: POP
00000c0d: POP
00000c0e: PUSH2 0x0c14
00000c11: JUMPI
00000c12: POP
00000c13: JUMP
00000c14: JUMPDEST
00000c15: PUSH32 0x5274afe700000000000000000000000000000000000000000000000000000000
00000c36: PUSH0
00000c37: MSTORE
00000c38: PUSH1 0x04
00000c3a: MSTORE
00000c3b: PUSH1 0x24
00000c3d: PUSH0
00000c3e: REVERT
00000c3f: JUMPDEST
00000c40: DUP2
00000c41: SWAP3
00000c42: POP
00000c43: SWAP1
00000c44: PUSH1 0x20
00000c46: SWAP2
00000c47: DUP2
00000c48: ADD
00000c49: SUB
00000c4a: SLT
00000c4b: PUSH2 0x00f1
00000c4e: JUMPI
00000c4f: PUSH1 0x20
00000c51: ADD
00000c52: MLOAD
00000c53: DUP1
00000c54: ISZERO
00000c55: SWAP1
00000c56: DUP2
00000c57: ISZERO
00000c58: SUB
00000c59: PUSH2 0x00f1
00000c5c: JUMPI
00000c5d: PUSH0
00000c5e: DUP1
00000c5f: PUSH2 0x0c0b
00000c62: JUMP
00000c63: JUMPDEST
00000c64: SWAP1
00000c65: PUSH2 0x0ca0
00000c68: JUMPI
00000c69: POP
00000c6a: DUP1
00000c6b: MLOAD
00000c6c: ISZERO
00000c6d: PUSH2 0x0c78
00000c70: JUMPI
00000c71: DUP1
00000c72: MLOAD
00000c73: SWAP1
00000c74: PUSH1 0x20
00000c76: ADD
00000c77: REVERT
00000c78: JUMPDEST
00000c79: PUSH32 0x1425ea4200000000000000000000000000000000000000000000000000000000
00000c9a: PUSH0
00000c9b: MSTORE
00000c9c: PUSH1 0x04
00000c9e: PUSH0
00000c9f: REVERT
00000ca0: JUMPDEST
00000ca1: DUP2
00000ca2: MLOAD
00000ca3: ISZERO
00000ca4: DUP1
00000ca5: PUSH2 0x0ce6
00000ca8: JUMPI
00000ca9: JUMPDEST
00000caa: PUSH2 0x0cb1
00000cad: JUMPI
00000cae: POP
00000caf: SWAP1
00000cb0: JUMP
00000cb1: JUMPDEST
00000cb2: PUSH1 0x01
00000cb4: PUSH1 0x01
00000cb6: PUSH1 0xa0
00000cb8: SHL
00000cb9: SUB
00000cba: SWAP1
00000cbb: PUSH32 0x9996b31500000000000000000000000000000000000000000000000000000000
00000cdc: PUSH0
00000cdd: MSTORE
00000cde: AND
00000cdf: PUSH1 0x04
00000ce1: MSTORE
00000ce2: PUSH1 0x24
00000ce4: PUSH0
00000ce5: REVERT
00000ce6: JUMPDEST
00000ce7: POP
00000ce8: DUP1
00000ce9: EXTCODESIZE
00000cea: ISZERO
00000ceb: PUSH2 0x0ca9
00000cee: JUMP
00000cef: INVALID
00000cf0: LOG1
00000cf1: PUSH5 0x736f6c6343
00000cf7: STOP
00000cf8: ADDMOD
00000cf9: BYTE
00000cfa: STOP
00000cfb: EXP

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
high other detector Untrusted CALL target/value reachable 60 no no
view
trace_id: 0xd7852c8041742b453852ef37b878cf3e6d815bbe1e0d21b69d5c60925b84c4e5
call_targets: 0x7b2700f30f2bad7de2602eb2f911c1ce2e01108b
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0xd7852c8041742b453852ef37b878cf3e6d815bbe1e0d21b69d5c60925b84c4e5",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x7b2700f30f2bad7de2602eb2f911c1ce2e01108b"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x0724fda9",
            "selector": "0x0724fda9",
            "calldata_variants": [
                "0x0724fda9",
                "0x0724fda90000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x0f7514a2",
            "selector": "0x0f7514a2",
            "calldata_variants": [
                "0x0f7514a2",
                "0x0f7514a20000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x1686c909",
            "selector": "0x1686c909",
            "calldata_variants": [
                "0x1686c909",
                "0x1686c9090000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x2dd31000",
            "selector": "0x2dd31000",
            "calldata_variants": [
                "0x2dd31000",
                "0x2dd310000000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x3f31ae3f",
            "selector": "0x3f31ae3f",
            "calldata_variants": [
                "0x3f31ae3f",
                "0x3f31ae3f0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x49fc73dd",
            "selector": "0x49fc73dd",
            "calldata_variants": [
                "0x49fc73dd",
                "0x49fc73dd0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x4e390d3e",
            "selector": "0x4e390d3e",
            "calldata_variants": [
                "0x4e390d3e",
                "0x4e390d3e0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x51e75e8b",
            "selector": "0x51e75e8b",
            "calldata_variants": [
                "0x51e75e8b",
                "0x51e75e8b0000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 517,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 3055,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "call_count": 2,
    "guards_detected": [],
    "untrusted_call_count": 2
}
high other detector ETH value transfer possible 55 no no
view
trace_id: 0xd7852c8041742b453852ef37b878cf3e6d815bbe1e0d21b69d5c60925b84c4e5
call_targets: 0x7b2700f30f2bad7de2602eb2f911c1ce2e01108b
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0xd7852c8041742b453852ef37b878cf3e6d815bbe1e0d21b69d5c60925b84c4e5",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x7b2700f30f2bad7de2602eb2f911c1ce2e01108b"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x0724fda9",
            "selector": "0x0724fda9",
            "calldata_variants": [
                "0x0724fda9",
                "0x0724fda90000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x0f7514a2",
            "selector": "0x0f7514a2",
            "calldata_variants": [
                "0x0f7514a2",
                "0x0f7514a20000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x1686c909",
            "selector": "0x1686c909",
            "calldata_variants": [
                "0x1686c909",
                "0x1686c9090000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x2dd31000",
            "selector": "0x2dd31000",
            "calldata_variants": [
                "0x2dd31000",
                "0x2dd310000000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x3f31ae3f",
            "selector": "0x3f31ae3f",
            "calldata_variants": [
                "0x3f31ae3f",
                "0x3f31ae3f0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x49fc73dd",
            "selector": "0x49fc73dd",
            "calldata_variants": [
                "0x49fc73dd",
                "0x49fc73dd0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x4e390d3e",
            "selector": "0x4e390d3e",
            "calldata_variants": [
                "0x4e390d3e",
                "0x4e390d3e0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x51e75e8b",
            "selector": "0x51e75e8b",
            "calldata_variants": [
                "0x51e75e8b",
                "0x51e75e8b0000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 517,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 3055,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "eth_value_calls": 2,
    "guards_detected": []
}