cad40022-aa72-4908-8445-c0c2884e969a
Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?
| ID | Type | Status | Attempts | Heartbeat |
|---|---|---|---|---|
| 31065 | report.consolidate | complete | 1 / 1 | 3 months ago |
| 76204 | artifact.fetch | failed | 1 / 3 | 1 week ago |
| 76205 | tool.cast_disasm | complete | 1 / 3 | 1 week ago |
| 76206 | analysis.bundle | complete | 1 / 3 | 1 week ago |
| 76207 | capability.graph | complete | 1 / 3 | 1 week ago |
| 76208 | detector.run | complete | 1 / 3 | 1 week ago |
| 76209 | validation.fork | complete | 1 / 3 | 1 week ago |
| 113561 | tool.slither | failed | 2 / 2 | 1 week ago |
Traceback (most recent call last):
File "/var/www/tripwire/worker/worker.py", line 198, in main
payload = dispatch_job(job_type, job_id, job_meta, run_data, config, laravel_client)
File "/var/www/tripwire/worker/worker.py", line 114, in dispatch_job
return slither_run.run(job_id, job_meta, run_data, config, log, laravel_client)
~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/var/www/tripwire/worker/jobs/slither_run.py", line 1056, in run
solc_path, solc_meta = _prepare_solc(chosen_version, workspace)
~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/var/www/tripwire/worker/jobs/slither_run.py", line 190, in _prepare_solc
raise RuntimeError(f"solc version {default_version} is too old for supported toolchain")
RuntimeError: solc version 0.3.5 is too old for supported toolchain
[codex:4364] OpenAI Codex v0.77.0 (research preview)
[codex:4364] --------
[codex:4364] workdir: /tmp/codex-multi-bbhpm72e
[codex:4364] model: gpt-5.2-codex
[codex:4364] provider: openai
[codex:4364] approval: never
[codex:4364] sandbox: read-only
[codex:4364] reasoning effort: xhigh
[codex:4364] reasoning summaries: auto
[codex:4364] session id: 019b7a36-6458-7f11-b4c5-809b099a7003
[codex:4364] --------
[codex:4364] user
[codex:4364] You are a profit-focused exploit hunter. Your ONLY goal is finding ways to extract value (ETH, tokens, NFTs) from this contract.
[codex:4364]
[codex:4364] Read `AUDIT_BUNDLE.txt` completely before concluding. Treat `lib/` and `@openzeppelin/` as trusted unless misused.
[codex:4364]
[codex:4364] ONLY REPORT if you find a CONCRETE, EXPLOITABLE path to profit. We do NOT care about:
[codex:4364] - Gas inefficiency, code quality, naming, or best practices
[codex:4364] - Theoretical vulnerabilities without a clear extraction path
[codex:4364] - Centralization risks (admin can rug) - assume admin keys are secure
[codex:4364] - Front-running unless it enables theft beyond MEV
[codex:4364] - DoS, griefing, or issues that don't result in attacker profit
[codex:4364] - Missing events, view function issues, or informational findings
[codex:4364]
[codex:4364] HIGH-VALUE PATTERNS TO HUNT:
[codex:4364] - Reentrancy: external calls before state updates that allow double-withdrawal
[codex:4364] - Access control: missing/bypassable auth on withdraw, transfer, or mint functions
[codex:4364] - Flash loan attacks: borrow -> manipulate -> profit in single tx
[codex:4364] - Price oracle manipulation: TWAP with short window, spot price reads, stale prices
[codex:4364] - Signature replay: missing nonce, chainId, or deadline in permit/meta-tx
[codex:4364] - Proxy hijacking: unprotected initialize(), storage collision, UUPS without auth
[codex:4364] - Accounting errors: rounding that favors attacker, share inflation, first depositor attacks
[codex:4364] - Unchecked external calls: return value ignored on token transfers enabling fake tokens
[codex:4364] - Cross-function reentrancy: state read in function A, modified via reentrant call, used stale in A
[codex:4364]
[codex:4364] For each finding, you MUST provide:
[codex:4364] 1. Exact file and line numbers of vulnerable code
[codex:4364] 2. Step-by-step exploit transaction sequence
[codex:4364] 3. Estimated profit potential (order of magnitude: contract balance, LP reserves, etc.)
[codex:4364]
[codex:4364] If no concrete profit path exists: set no_findings=true. Do NOT pad with low-severity noise.
[codex:4364]
[codex:4364] Output MUST be valid JSON matching the provided schema.
[codex:4364] - severity: info, low, medium, high, critical (use high/critical ONLY for clear extraction paths)
[codex:4364] - category: access_control, reentrancy, math, oracle, upgradeability, auth, other
[codex:4364] mcp startup: no servers
[codex:4364]
[codex:4364] thinking
[codex:4364] **Reading AUDIT_BUNDLE.txt contents**
[codex:4364] exec
[codex:4364] /bin/bash -lc ls in /tmp/codex-multi-bbhpm72e succeeded in 5ms:
[codex:4364] AUDIT_BUNDLE.txt
[codex:4364] codex-output-schema.json
[codex:4364] contracts
[codex:4364] exec
[codex:4364] /bin/bash -lc 'cat AUDIT_BUNDLE.txt' in /tmp/codex-multi-bbhpm72e succeeded in 5ms:
[codex:4364] This file concatenates first-party Solidity sources only (lib/@openzeppelin excluded).
[codex:4364]
[codex:4364] ================================================================================
[codex:4364] FILE: contracts/Contract.sol
[codex:4364] ================================================================================
[codex:4364] contract DAO {
[codex:4364] function balanceOf(address addr) returns (uint);
[codex:4364] function transferFrom(address from, address to, uint balance) returns (bool);
[codex:4364] uint public totalSupply;
[codex:4364] }
[codex:4364]
[codex:4364] contract WithdrawDAO {
[codex:4364] DAO constant public mainDAO = DAO(0xbb9bc244d798123fde783fcc1c72d3bb8c189413);
[codex:4364] address public trustee = 0xda4a4626d3e16e094de3225a751aab7128e96526;
[codex:4364]
[codex:4364] function withdraw(){
[codex:4364] uint balance = mainDAO.balanceOf(msg.sender);
[codex:4364]
[codex:4364] if (!mainDAO.transferFrom(msg.sender, this, balance) || !msg.sender.send(balance))
[codex:4364] throw;
[codex:4364]
[codex:4364] thinking
[codex:4364] **Assessing old DAO withdraw exploit potential**
[codex:4364] codex
[codex:4364] {"no_findings":true,"summary":"Reviewed `contracts/Contract.sol` from AUDIT_BUNDLE.txt and found no concrete, exploitable path for attacker profit given the fixed DAO address and the send/transferFrom flow.","findings":[]}
[codex:4364] tokens used
[codex:4364] 5,883
[codex:4364] {"no_findings":true,"summary":"Reviewed `contracts/Contract.sol` from AUDIT_BUNDLE.txt and found no concrete, exploitable path for attacker profit given the fixed DAO address and the send/transferFrom flow.","findings":[]}
{
"codex": {
"ran_at": "2026-01-01T15:39:19.691316+00:00",
"returncode": 0
},
"summary": "Reviewed `contracts/Contract.sol` from AUDIT_BUNDLE.txt and found no concrete, exploitable path for attacker profit given the fixed DAO address and the send/transferFrom flow.",
"raw_final": {
"summary": "Reviewed `contracts/Contract.sol` from AUDIT_BUNDLE.txt and found no concrete, exploitable path for attacker profit given the fixed DAO address and the send/transferFrom flow.",
"findings": [],
"no_findings": true
},
"no_findings": true,
"schema_version": 1
}
00000000: PUSH1 0x60 00000002: PUSH1 0x40 00000004: MSTORE 00000005: PUSH1 0x00 00000007: CALLDATALOAD 00000008: PUSH29 0x0100000000000000000000000000000000000000000000000000000000 00000026: SWAP1 00000027: DIV 00000028: DUP1 00000029: PUSH4 0x2e6e504a 0000002e: EQ 0000002f: PUSH2 0x005a 00000032: JUMPI 00000033: DUP1 00000034: PUSH4 0x3ccfd60b 00000039: EQ 0000003a: PUSH2 0x0069 0000003d: JUMPI 0000003e: DUP1 0000003f: PUSH4 0xeedcf50a 00000044: EQ 00000045: PUSH2 0x0078 00000048: JUMPI 00000049: DUP1 0000004a: PUSH4 0xfdf97cb2 0000004f: EQ 00000050: PUSH2 0x00b1 00000053: JUMPI 00000054: PUSH2 0x0058 00000057: JUMP 00000058: JUMPDEST 00000059: STOP 0000005a: JUMPDEST 0000005b: PUSH2 0x0067 0000005e: PUSH1 0x04 00000060: DUP1 00000061: POP 00000062: POP 00000063: PUSH2 0x00ea 00000066: JUMP 00000067: JUMPDEST 00000068: STOP 00000069: JUMPDEST 0000006a: PUSH2 0x0076 0000006d: PUSH1 0x04 0000006f: DUP1 00000070: POP 00000071: POP 00000072: PUSH2 0x0277 00000075: JUMP 00000076: JUMPDEST 00000077: STOP 00000078: JUMPDEST 00000079: PUSH2 0x0085 0000007c: PUSH1 0x04 0000007e: DUP1 0000007f: POP 00000080: POP 00000081: PUSH2 0x0424 00000084: JUMP 00000085: JUMPDEST 00000086: PUSH1 0x40 00000088: MLOAD 00000089: DUP1 0000008a: DUP3 0000008b: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 000000a0: AND 000000a1: DUP2 000000a2: MSTORE 000000a3: PUSH1 0x20 000000a5: ADD 000000a6: SWAP2 000000a7: POP 000000a8: POP 000000a9: PUSH1 0x40 000000ab: MLOAD 000000ac: DUP1 000000ad: SWAP2 000000ae: SUB 000000af: SWAP1 000000b0: RETURN 000000b1: JUMPDEST 000000b2: PUSH2 0x00be 000000b5: PUSH1 0x04 000000b7: DUP1 000000b8: POP 000000b9: POP 000000ba: PUSH2 0x043c 000000bd: JUMP 000000be: JUMPDEST 000000bf: PUSH1 0x40 000000c1: MLOAD 000000c2: DUP1 000000c3: DUP3 000000c4: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 000000d9: AND 000000da: DUP2 000000db: MSTORE 000000dc: PUSH1 0x20 000000de: ADD 000000df: SWAP2 000000e0: POP 000000e1: POP 000000e2: PUSH1 0x40 000000e4: MLOAD 000000e5: DUP1 000000e6: SWAP2 000000e7: SUB 000000e8: SWAP1 000000e9: RETURN 000000ea: JUMPDEST 000000eb: PUSH1 0x00 000000ed: PUSH1 0x00 000000ef: SWAP1 000000f0: SLOAD 000000f1: SWAP1 000000f2: PUSH2 0x0100 000000f5: EXP 000000f6: SWAP1 000000f7: DIV 000000f8: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 0000010d: AND 0000010e: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000123: AND 00000124: PUSH1 0x00 00000126: PUSH20 0xbb9bc244d798123fde783fcc1c72d3bb8c189413 0000013b: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000150: AND 00000151: PUSH4 0x18160ddd 00000156: PUSH1 0x40 00000158: MLOAD 00000159: DUP2 0000015a: PUSH29 0x0100000000000000000000000000000000000000000000000000000000 00000178: MUL 00000179: DUP2 0000017a: MSTORE 0000017b: PUSH1 0x04 0000017d: ADD 0000017e: DUP1 0000017f: SWAP1 00000180: POP 00000181: PUSH1 0x20 00000183: PUSH1 0x40 00000185: MLOAD 00000186: DUP1 00000187: DUP4 00000188: SUB 00000189: DUP2 0000018a: PUSH1 0x00 0000018c: DUP8 0000018d: PUSH2 0x61da 00000190: GAS 00000191: SUB 00000192: CALL 00000193: ISZERO 00000194: PUSH2 0x0002 00000197: JUMPI 00000198: POP 00000199: POP 0000019a: POP 0000019b: PUSH1 0x40 0000019d: MLOAD 0000019e: DUP1 0000019f: MLOAD 000001a0: SWAP1 000001a1: PUSH1 0x20 000001a3: ADD 000001a4: POP 000001a5: PUSH20 0xbb9bc244d798123fde783fcc1c72d3bb8c189413 000001ba: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 000001cf: AND 000001d0: PUSH4 0x70a08231 000001d5: ADDRESS 000001d6: PUSH1 0x40 000001d8: MLOAD 000001d9: DUP3 000001da: PUSH29 0x0100000000000000000000000000000000000000000000000000000000 000001f8: MUL 000001f9: DUP2 000001fa: MSTORE 000001fb: PUSH1 0x04 000001fd: ADD 000001fe: DUP1 000001ff: DUP3 00000200: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000215: AND 00000216: DUP2 00000217: MSTORE 00000218: PUSH1 0x20 0000021a: ADD 0000021b: SWAP2 0000021c: POP 0000021d: POP 0000021e: PUSH1 0x20 00000220: PUSH1 0x40 00000222: MLOAD 00000223: DUP1 00000224: DUP4 00000225: SUB 00000226: DUP2 00000227: PUSH1 0x00 00000229: DUP8 0000022a: PUSH2 0x61da 0000022d: GAS 0000022e: SUB 0000022f: CALL 00000230: ISZERO 00000231: PUSH2 0x0002 00000234: JUMPI 00000235: POP 00000236: POP 00000237: POP 00000238: PUSH1 0x40 0000023a: MLOAD 0000023b: DUP1 0000023c: MLOAD 0000023d: SWAP1 0000023e: PUSH1 0x20 00000240: ADD 00000241: POP 00000242: ADDRESS 00000243: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000258: AND 00000259: BALANCE 0000025a: ADD 0000025b: SUB 0000025c: PUSH1 0x40 0000025e: MLOAD 0000025f: DUP1 00000260: SWAP1 00000261: POP 00000262: PUSH1 0x00 00000264: PUSH1 0x40 00000266: MLOAD 00000267: DUP1 00000268: DUP4 00000269: SUB 0000026a: DUP2 0000026b: DUP6 0000026c: DUP9 0000026d: DUP9 0000026e: CALL 0000026f: SWAP4 00000270: POP 00000271: POP 00000272: POP 00000273: POP 00000274: POP 00000275: JUMPDEST 00000276: JUMP 00000277: JUMPDEST 00000278: PUSH1 0x00 0000027a: PUSH20 0xbb9bc244d798123fde783fcc1c72d3bb8c189413 0000028f: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 000002a4: AND 000002a5: PUSH4 0x70a08231 000002aa: CALLER 000002ab: PUSH1 0x40 000002ad: MLOAD 000002ae: DUP3 000002af: PUSH29 0x0100000000000000000000000000000000000000000000000000000000 000002cd: MUL 000002ce: DUP2 000002cf: MSTORE 000002d0: PUSH1 0x04 000002d2: ADD 000002d3: DUP1 000002d4: DUP3 000002d5: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 000002ea: AND 000002eb: DUP2 000002ec: MSTORE 000002ed: PUSH1 0x20 000002ef: ADD 000002f0: SWAP2 000002f1: POP 000002f2: POP 000002f3: PUSH1 0x20 000002f5: PUSH1 0x40 000002f7: MLOAD 000002f8: DUP1 000002f9: DUP4 000002fa: SUB 000002fb: DUP2 000002fc: PUSH1 0x00 000002fe: DUP8 000002ff: PUSH2 0x61da 00000302: GAS 00000303: SUB 00000304: CALL 00000305: ISZERO 00000306: PUSH2 0x0002 00000309: JUMPI 0000030a: POP 0000030b: POP 0000030c: POP 0000030d: PUSH1 0x40 0000030f: MLOAD 00000310: DUP1 00000311: MLOAD 00000312: SWAP1 00000313: PUSH1 0x20 00000315: ADD 00000316: POP 00000317: SWAP1 00000318: POP 00000319: PUSH20 0xbb9bc244d798123fde783fcc1c72d3bb8c189413 0000032e: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 00000343: AND 00000344: PUSH4 0x23b872dd 00000349: CALLER 0000034a: ADDRESS 0000034b: DUP5 0000034c: PUSH1 0x40 0000034e: MLOAD 0000034f: DUP5 00000350: PUSH29 0x0100000000000000000000000000000000000000000000000000000000 0000036e: MUL 0000036f: DUP2 00000370: MSTORE 00000371: PUSH1 0x04 00000373: ADD 00000374: DUP1 00000375: DUP5 00000376: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 0000038b: AND 0000038c: DUP2 0000038d: MSTORE 0000038e: PUSH1 0x20 00000390: ADD 00000391: DUP4 00000392: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 000003a7: AND 000003a8: DUP2 000003a9: MSTORE 000003aa: PUSH1 0x20 000003ac: ADD 000003ad: DUP3 000003ae: DUP2 000003af: MSTORE 000003b0: PUSH1 0x20 000003b2: ADD 000003b3: SWAP4 000003b4: POP 000003b5: POP 000003b6: POP 000003b7: POP 000003b8: PUSH1 0x20 000003ba: PUSH1 0x40 000003bc: MLOAD 000003bd: DUP1 000003be: DUP4 000003bf: SUB 000003c0: DUP2 000003c1: PUSH1 0x00 000003c3: DUP8 000003c4: PUSH2 0x61da 000003c7: GAS 000003c8: SUB 000003c9: CALL 000003ca: ISZERO 000003cb: PUSH2 0x0002 000003ce: JUMPI 000003cf: POP 000003d0: POP 000003d1: POP 000003d2: PUSH1 0x40 000003d4: MLOAD 000003d5: DUP1 000003d6: MLOAD 000003d7: SWAP1 000003d8: PUSH1 0x20 000003da: ADD 000003db: POP 000003dc: ISZERO 000003dd: DUP1 000003de: PUSH2 0x0416 000003e1: JUMPI 000003e2: POP 000003e3: CALLER 000003e4: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 000003f9: AND 000003fa: PUSH1 0x00 000003fc: DUP3 000003fd: PUSH1 0x40 000003ff: MLOAD 00000400: DUP1 00000401: SWAP1 00000402: POP 00000403: PUSH1 0x00 00000405: PUSH1 0x40 00000407: MLOAD 00000408: DUP1 00000409: DUP4 0000040a: SUB 0000040b: DUP2 0000040c: DUP6 0000040d: DUP9 0000040e: DUP9 0000040f: CALL 00000410: SWAP4 00000411: POP 00000412: POP 00000413: POP 00000414: POP 00000415: ISZERO 00000416: JUMPDEST 00000417: ISZERO 00000418: PUSH2 0x0420 0000041b: JUMPI 0000041c: PUSH2 0x0002 0000041f: JUMP 00000420: JUMPDEST 00000421: JUMPDEST 00000422: POP 00000423: JUMP 00000424: JUMPDEST 00000425: PUSH20 0xbb9bc244d798123fde783fcc1c72d3bb8c189413 0000043a: DUP2 0000043b: JUMP 0000043c: JUMPDEST 0000043d: PUSH1 0x00 0000043f: PUSH1 0x00 00000441: SWAP1 00000442: SLOAD 00000443: SWAP1 00000444: PUSH2 0x0100 00000447: EXP 00000448: SWAP1 00000449: DIV 0000044a: PUSH20 0xffffffffffffffffffffffffffffffffffffffff 0000045f: AND 00000460: DUP2 00000461: JUMP
| Severity | Category | Tool | Title | Confidence | Validated | Confirmed | Details |
|---|---|---|---|---|---|---|---|
| high | other | detector | Untrusted CALL target/value reachable | 60 | yes | yes |
viewtrace_id: 0x5c51108ce6685c042e40de8808f99790783b0620bd807b402b709779f82b7395
call_targets:
0xbb9bc244d798123fde783fcc1c72d3bb8c189413, 0xbf4ed7b27f1d666546e30d74d50d173d20bca754, 0xda4a4626d3e16e094de3225a751aab7128e96526
target_varies:
yes
classification:
target_varies
validation_json{
"sink": "CALL",
"errors": 0,
"status": "confirmed",
"attempts": 1,
"trace_id": "0x5c51108ce6685c042e40de8808f99790783b0620bd807b402b709779f82b7395",
"confirmed": true,
"trace_mode": "callTracer",
"call_targets": [
"0xbb9bc244d798123fde783fcc1c72d3bb8c189413",
"0xbf4ed7b27f1d666546e30d74d50d173d20bca754",
"0xda4a4626d3e16e094de3225a751aab7128e96526"
],
"matched_probe": null,
"target_varies": true,
"classification": "target_varies"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x2e6e504a",
"selector": "0x2e6e504a",
"calldata_variants": [
"0x2e6e504a",
"0x2e6e504a0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x3ccfd60b",
"selector": "0x3ccfd60b",
"calldata_variants": [
"0x3ccfd60b",
"0x3ccfd60b0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0xeedcf50a",
"selector": "0xeedcf50a",
"calldata_variants": [
"0xeedcf50a",
"0xeedcf50a0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0xfdf97cb2",
"selector": "0xfdf97cb2",
"calldata_variants": [
"0xfdf97cb2",
"0xfdf97cb20000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 402,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
},
{
"pc": 559,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
},
{
"pc": 622,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"call_count": 6,
"guards_detected": [],
"untrusted_call_count": 6
}
|
| high | other | detector | ETH value transfer possible | 55 | yes | yes |
viewtrace_id: 0x5c51108ce6685c042e40de8808f99790783b0620bd807b402b709779f82b7395
call_targets:
0xbb9bc244d798123fde783fcc1c72d3bb8c189413, 0xbf4ed7b27f1d666546e30d74d50d173d20bca754, 0xda4a4626d3e16e094de3225a751aab7128e96526
target_varies:
yes
classification:
target_varies
validation_json{
"sink": "CALL",
"errors": 0,
"status": "confirmed",
"attempts": 1,
"trace_id": "0x5c51108ce6685c042e40de8808f99790783b0620bd807b402b709779f82b7395",
"confirmed": true,
"trace_mode": "callTracer",
"call_targets": [
"0xbb9bc244d798123fde783fcc1c72d3bb8c189413",
"0xbf4ed7b27f1d666546e30d74d50d173d20bca754",
"0xda4a4626d3e16e094de3225a751aab7128e96526"
],
"matched_probe": null,
"target_varies": true,
"classification": "target_varies"
}
witness_json{
"notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
"constraints": [],
"entrypoints": [
{
"calldata": "0x2e6e504a",
"selector": "0x2e6e504a",
"calldata_variants": [
"0x2e6e504a",
"0x2e6e504a0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0x3ccfd60b",
"selector": "0x3ccfd60b",
"calldata_variants": [
"0x3ccfd60b",
"0x3ccfd60b0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0xeedcf50a",
"selector": "0xeedcf50a",
"calldata_variants": [
"0xeedcf50a",
"0xeedcf50a0000000000000000000000000000000000000000000000000000000000000000"
]
},
{
"calldata": "0xfdf97cb2",
"selector": "0xfdf97cb2",
"calldata_variants": [
"0xfdf97cb2",
"0xfdf97cb20000000000000000000000000000000000000000000000000000000000000000"
]
}
]
}
evidence_json{
"examples": [
{
"pc": 402,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
},
{
"pc": 559,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
},
{
"pc": 622,
"opcode": "CALL",
"returndata_checked": null,
"value_expression_category": "computed",
"target_expression_category": "computed"
}
],
"eth_value_calls": 6,
"guards_detected": []
}
|