TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

de96fa02-d799-4d86-9039-ea663c3d46cd

complete
Chain ID
1
Address
Block Number
Created
Fri, Jan 2, 2026 2:09 AM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
0
Validated
0
Source
Bytecode only
Review Backing
Not yet
Best current signal
Untrusted CALL target/value reachable
crit 0 high 0 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
31184 report.consolidate complete 1 / 1 3 months ago
76918 artifact.fetch complete 1 / 3 2 weeks ago
76919 tool.cast_disasm complete 1 / 3 2 weeks ago
76920 analysis.bundle complete 1 / 3 2 weeks ago
76921 capability.graph complete 1 / 3 2 weeks ago
76922 detector.run complete 1 / 3 2 weeks ago
76923 validation.fork complete 1 / 3 2 weeks ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no
Implementation:
Verified Source: no

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate
Job Status
complete
Attempts
1 / 1
Findings
0
No findings?
yes
Summary
No concrete, exploitable value-extraction path found in the provided runtime bytecode; the only state-changing logic and external calls are gated by an owner check, and other public functions are read-only.
View stderr
[codex:508767] OpenAI Codex v0.77.0 (research preview)
[codex:508767] --------
[codex:508767] workdir: /tmp/codex-multi-4d_3_tol
[codex:508767] model: gpt-5.2-codex
[codex:508767] provider: openai
[codex:508767] approval: never
[codex:508767] sandbox: read-only
[codex:508767] reasoning effort: xhigh
[codex:508767] reasoning summaries: auto
[codex:508767] session id: 019b7c74-da75-7110-861c-e87a189a5c6c
[codex:508767] --------
[codex:508767] user
[codex:508767] You are a profit-focused exploit hunter analyzing EVM bytecode. Your ONLY goal is finding ways to extract value (ETH, tokens, NFTs) from this contract.
[codex:508767] 
[codex:508767] Read `BYTECODE_BUNDLE.txt` completely before concluding.
[codex:508767] 
[codex:508767] ONLY REPORT if you find a CONCRETE, EXPLOITABLE path to profit. We do NOT care about:
[codex:508767] - Gas inefficiency, code quality, or best practices
[codex:508767] - Theoretical vulnerabilities without a clear extraction path
[codex:508767] - Generic footguns (unchecked return values, etc.) unless they enable theft
[codex:508767] - Issues requiring social engineering or off-chain coordination
[codex:508767] 
[codex:508767] PATTERNS WORTH INVESTIGATING in bytecode:
[codex:508767] - CALL/DELEGATECALL with controllable destination or calldata
[codex:508767] - Value transfers (CALL with non-zero value) without prior CALLER/ORIGIN checks
[codex:508767] - SSTORE to low slots (0-10) that might be owner/admin storage
[codex:508767] - ecrecover (signature validation) - look for missing nonce/replay protection
[codex:508767] - External calls before state updates (reentrancy)
[codex:508767] - SELFDESTRUCT with controllable beneficiary
[codex:508767] - Proxy patterns (DELEGATECALL to storage slot) with unprotected upgrade paths
[codex:508767] 
[codex:508767] For each finding, you MUST explain:
[codex:508767] 1. The specific bytecode pattern/offsets that indicate the vulnerability
[codex:508767] 2. The concrete sequence of transactions to extract value
[codex:508767] 3. Why you believe this is exploitable (not just suspicious)
[codex:508767] 
[codex:508767] If you cannot identify a concrete profit path from bytecode alone: set no_findings=true.
[codex:508767] Do NOT hallucinate. Bytecode-only analysis is limited - be honest about uncertainty.
[codex:508767] 
[codex:508767] Output MUST be valid JSON matching the provided schema.
[codex:508767] - severity: info, low, medium, high, critical (use high/critical ONLY for clear extraction paths)
[codex:508767] - category: access_control, reentrancy, math, oracle, upgradeability, auth, other
[codex:508767] mcp startup: no servers
[codex:508767] 
[codex:508767] thinking
[codex:508767] **Checking for skill usage**
[codex:508767] exec
[codex:508767] /bin/bash -lc ls in /tmp/codex-multi-4d_3_tol succeeded in 5ms:
[codex:508767] BYTECODE_BUNDLE.txt
[codex:508767] codex-output-schema.json
[codex:508767] exec
[codex:508767] /bin/bash -lc "sed -n '1,200p' BYTECODE_BUNDLE.txt" in /tmp/codex-multi-4d_3_tol succeeded in 5ms:
[codex:508767] Runtime bytecode bundle for best-effort auditing.
[codex:508767] Note: without verified source, conclusions are low-confidence unless a concrete pattern is visible.
[codex:508767] 
[codex:508767] FILE: runtime_bytecode.hex
[codex:508767] 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
[codex:508767] 
[codex:508767] thinking
[codex:508767] **Preparing to disassemble EVM bytecode**
[codex:508767] exec
[codex:508767] /bin/bash -lc "python - <<'PY'
[codex:508767] from collections import OrderedDict
[codex:508767] import binascii
[codex:508767] import textwrap
[codex:508767] hexstr=open('BYTECODE_BUNDLE.txt').read().split('0x',1)[1].strip()
[codex:508767] # Only runtime bytecode hex (first 0x...?). There might be other after? We'll take first line after 0x.
[codex:508767] # Actually file includes 0x... entire hex string. Use splitlines.
[codex:508767] hexstr=hexstr.splitlines()[0]
[codex:508767] if hexstr.startswith('0x'): hexstr=hexstr[2:]
[codex:508767] code=bytes.fromhex(hexstr)
[codex:508767] # opcode mapping
[codex:508767] opmap={
[codex:508767]     0x00:'STOP',0x01:'ADD',0x02:'MUL',0x03:'SUB',0x04:'DIV',0x05:'SDIV',0x06:'MOD',0x07:'SMOD',0x08:'ADDMOD',0x09:'MULMOD',0x0a:'EXP',0x0b:'SIGNEXTEND',
[codex:508767]     0x10:'LT',0x11:'GT',0x12:'SLT',0x13:'SGT',0x14:'EQ',0x15:'ISZERO',0x16:'AND',0x17:'OR',0x18:'XOR',0x19:'NOT',0x1a:'BYTE',0x1b:'SHL',0x1c:'SHR',0x1d:'SAR',
[codex:508767]     0x20:'SHA3',
[codex:508767]     0x30:'ADDRESS',0x31:'BALANCE',0x32:'ORIGIN',0x33:'CALLER',0x34:'CALLVALUE',0x35:'CALLDATALOAD',0x36:'CALLDATASIZE',0x37:'CALLDATACOPY',0x38:'CODESIZE',0x39:'CODECOPY',0x3a:'GASPRICE',0x3b:'EXTCODESIZE',0x3c:'EXTCODECOPY',0x3d:'RETURNDATASIZE',0x3e:'RETURNDATACOPY',0x3f:'EXTCODEHASH',
[codex:508767]     0x40:'BLOCKHASH',0x41:'COINBASE',0x42:'TIMESTAMP',0x43:'NUMBER',0x44:'DIFFICULTY',0x45:'GASLIMIT',0x46:'CHAINID',0x47:'SELFBALANCE',0x48:'BASEFEE',
[codex:508767]     0x50:'POP',0x51:'MLOAD',0x52:'MSTORE',0x53:'MSTORE8',0x54:'SLOAD',0x55:'SSTORE',0x56:'JUMP',0x57:'JUMPI',0x58:'PC',0x59:'MSIZE',0x5a:'GAS',0x5b:'JUMPDEST',
[codex:508767]     0x60:'PUSH1',0x61:'PUSH2',0x62:'PUSH3',0x63:'PUSH4',0x64:'PUSH5',0x65:'PUSH6',0x66:'PUSH7',0x67:'PUSH8',0x68:'PUSH9',0x69:'PUSH10',0x6a:'PUSH11',0x6b:'PUSH12',0x6c:'PUSH13',0x6d:'PUSH14',0x6e:'PUSH15',0x6f:'PUSH16',0x70:'PUSH17',0x71:'PUSH18',0x72:'PUSH19',0x73:'PUSH20',0x74:'PUSH21',0x75:'PUSH22',0x76:'PUSH23',0x77:'PUSH24',0x78:'PUSH25',0x79:'PUSH26',0x7a:'PUSH27',0x7b:'PUSH28',0x7c:'PUSH29',0x7d:'PUSH30',0x7e:'PUSH31',0x7f:'PUSH32',
[codex:508767]     0x80:'DUP1',0x81:'DUP2',0x82:'DUP3',0x83:'DUP4',0x84:'DUP5',0x85:'DUP6',0x86:'DUP7',0x87:'DUP8',0x88:'DUP9',0x89:'DUP10',0x8a:'DUP11',0x8b:'DUP12',0x8c:'DUP13',0x8d:'DUP14',0x8e:'DUP15',0x8f:'DUP16',
[codex:508767]     0x90:'SWAP1',0x91:'SWAP2',0x92:'SWAP3',0x93:'SWAP4',0x94:'SWAP5',0x95:'SWAP6',0x96:'SWAP7',0x97:'SWAP8',0x98:'SWAP9',0x99:'SWAP10',0x9a:'SWAP11',0x9b:'SWAP12',0x9c:'SWAP13',0x9d:'SWAP14',0x9e:'SWAP15',0x9f:'SWAP16',
[codex:508767]     0xa0:'LOG0',0xa1:'LOG1',0xa2:'LOG2',0xa3:'LOG3',0xa4:'LOG4',
[codex:508767]     0xf0:'CREATE',0xf1:'CALL',0xf2:'CALLCODE',0xf3:'RETURN',0xf4:'DELEGATECALL',0xf5:'CREATE2',0xfa:'STATICCALL',0xfd:'REVERT',0xfe:'INVALID',0xff:'SELFDESTRUCT',
[codex:508767] }
[codex:508767] 
[codex:508767] o=0
[codex:508767] out=[]
[codex:508767] while o<len(code):
[codex:508767]     op=code[o]
[codex:508767]     name=opmap.get(op, 'UNKNOWN')
[codex:508767]     if name.startswith('PUSH'):
[codex:508767]         n=op-0x5f
[codex:508767]         data=code[o+1:o+1+n]
[codex:508767]         out.append((o,name,data.hex()))
[codex:508767]         o+=1+n
[codex:508767]     else:
[codex:508767]         out.append((o,name,''))
[codex:508767]         o+=1
[codex:508767] 
[codex:508767] for off,name,data in out:
[codex:508767]     if data:
[codex:508767]         print(f\"{off:04x}: {name} 0x{data}\")
[codex:508767]     else:
[codex:508767]         print(f\"{off:04x}: {name}\")
[codex:508767] PY" in /tmp/codex-multi-4d_3_tol succeeded in 28ms:
[codex:508767] 0000: PUSH1 0x80
[codex:508767] 0002: PUSH1 0x40
[codex:508767] 0004: MSTORE
[codex:508767] 0005: PUSH1 0x04
[codex:508767] 0007: CALLDATASIZE
[codex:508767] 0008: LT
[codex:508767] 0009: PUSH2 0x008e
[codex:508767] 000c: JUMPI
[codex:508767] 000d: PUSH1 0x00
[codex:508767] 000f: CALLDATALOAD
[codex:508767] 0010: PUSH29 0x0100000000000000000000000000000000000000000000000000000000
[codex:508767] 002e: SWAP1
[codex:508767] 002f: DIV
[codex:508767] 0030: PUSH4 0xffffffff
[codex:508767] 0035: AND
[codex:508767] 0036: DUP1
[codex:508767] 0037: PUSH4 0x2f54bf6e
[codex:508767] 003c: EQ
[codex:508767] 003d: PUSH2 0x0090
[codex:508767] 0040: JUMPI
[codex:508767] 
[codex:508767] 
[codex:508767] thinking
[codex:508767] **Analyzing contract functions and storage usage**
[codex:508767] 
[codex:508767] I'm interpreting the disassembled code to identify key functions, their parameters, and storage access patterns. I trace how mappings and arrays in storage slots are queried or updated, and I’m focusing on which functions check ownership, which return values, and where storage writes occur, especially sensitive ones like slot4 for owner and slot updates. This helps map potential access control issues or exploits around value transfers and function visibility.
[codex:508767] thinking
[codex:508767] **Mapping storage writes and access control**
[codex:508767] 
[codex:508767] I'm tracing how the only state-changing function relates to the SSTORE instruction, confirming it modifies storage slots beyond the owner slot to prevent privilege escalation. I’m reviewing calls, parameter decoding, and ownership checks to verify that storage writes happen only through owner-only logic, and no other function enables state changes or funds withdrawal by outsiders. This helps me understand why an exploit seems unlikely.
[codex:508767] exec
[codex:508767] /bin/bash -lc 'tail -n 5 BYTECODE_BUNDLE.txt' in /tmp/codex-multi-4d_3_tol succeeded in 6ms:
[codex:508767] Runtime bytecode bundle for best-effort auditing.
[codex:508767] Note: without verified source, conclusions are low-confidence unless a concrete pattern is visible.
[codex:508767] 
[codex:508767] FILE: runtime_bytecode.hex
[codex:508767] 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
[codex:508767] 
[codex:508767] thinking
[codex:508767] **Analyzing potential bytecode vulnerabilities**
[codex:508767] codex
[codex:508767] {"no_findings":true,"summary":"No concrete, exploitable value-extraction path found in the provided runtime bytecode; the only state-changing logic and external calls are gated by an owner check, and other public functions are read-only.","findings":[]}
[codex:508767] tokens used
[codex:508767] 41,907
[codex:508767] {"no_findings":true,"summary":"No concrete, exploitable value-extraction path found in the provided runtime bytecode; the only state-changing logic and external calls are gated by an owner check, and other public functions are read-only.","findings":[]}
Metadata
{
    "codex": {
        "ran_at": "2026-01-02T02:09:55.522379+00:00",
        "returncode": 0
    },
    "summary": "No concrete, exploitable value-extraction path found in the provided runtime bytecode; the only state-changing logic and external calls are gated by an owner check, and other public functions are read-only.",
    "raw_final": {
        "summary": "No concrete, exploitable value-extraction path found in the provided runtime bytecode; the only state-changing logic and external calls are gated by an owner check, and other public functions are read-only.",
        "findings": [],
        "no_findings": true
    },
    "no_findings": true,
    "schema_version": 1
}

Opcode Heuristics

tool.cast_disasm
Delegatecall
0
Selfdestruct
0
CREATE2
0
CALL-family (heavy)
2
EXT*/BALANCE
0
Total opcodes
1734
Flags
No heuristic flags raised.
View cast disassembly output
00000000: PUSH1 0x80
00000002: PUSH1 0x40
00000004: MSTORE
00000005: PUSH1 0x04
00000007: CALLDATASIZE
00000008: LT
00000009: PUSH2 0x008e
0000000c: JUMPI
0000000d: PUSH1 0x00
0000000f: CALLDATALOAD
00000010: PUSH29 0x0100000000000000000000000000000000000000000000000000000000
0000002e: SWAP1
0000002f: DIV
00000030: PUSH4 0xffffffff
00000035: AND
00000036: DUP1
00000037: PUSH4 0x2f54bf6e
0000003c: EQ
0000003d: PUSH2 0x0090
00000040: JUMPI
00000041: DUP1
00000042: PUSH4 0x42cde4e8
00000047: EQ
00000048: PUSH2 0x00eb
0000004b: JUMPI
0000004c: DUP1
0000004d: PUSH4 0xaa5df9e2
00000052: EQ
00000053: PUSH2 0x0116
00000056: JUMPI
00000057: DUP1
00000058: PUSH4 0xaffed0e0
0000005d: EQ
0000005e: PUSH2 0x0183
00000061: JUMPI
00000062: DUP1
00000063: PUSH4 0xb72a33f2
00000068: EQ
00000069: PUSH2 0x01ae
0000006c: JUMPI
0000006d: DUP1
0000006e: PUSH4 0xc0ee0b8a
00000073: EQ
00000074: PUSH2 0x01d9
00000077: JUMPI
00000078: DUP1
00000079: PUSH4 0xc34c08e5
0000007e: EQ
0000007f: PUSH2 0x026c
00000082: JUMPI
00000083: DUP1
00000084: PUSH4 0xfeae6b39
00000089: EQ
0000008a: PUSH2 0x02c3
0000008d: JUMPI
0000008e: JUMPDEST
0000008f: STOP
00000090: JUMPDEST
00000091: CALLVALUE
00000092: DUP1
00000093: ISZERO
00000094: PUSH2 0x009c
00000097: JUMPI
00000098: PUSH1 0x00
0000009a: DUP1
0000009b: REVERT
0000009c: JUMPDEST
0000009d: POP
0000009e: PUSH2 0x00d1
000000a1: PUSH1 0x04
000000a3: DUP1
000000a4: CALLDATASIZE
000000a5: SUB
000000a6: DUP2
000000a7: ADD
000000a8: SWAP1
000000a9: DUP1
000000aa: DUP1
000000ab: CALLDATALOAD
000000ac: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000000c1: AND
000000c2: SWAP1
000000c3: PUSH1 0x20
000000c5: ADD
000000c6: SWAP1
000000c7: SWAP3
000000c8: SWAP2
000000c9: SWAP1
000000ca: POP
000000cb: POP
000000cc: POP
000000cd: PUSH2 0x0433
000000d0: JUMP
000000d1: JUMPDEST
000000d2: PUSH1 0x40
000000d4: MLOAD
000000d5: DUP1
000000d6: DUP3
000000d7: ISZERO
000000d8: ISZERO
000000d9: ISZERO
000000da: ISZERO
000000db: DUP2
000000dc: MSTORE
000000dd: PUSH1 0x20
000000df: ADD
000000e0: SWAP2
000000e1: POP
000000e2: POP
000000e3: PUSH1 0x40
000000e5: MLOAD
000000e6: DUP1
000000e7: SWAP2
000000e8: SUB
000000e9: SWAP1
000000ea: RETURN
000000eb: JUMPDEST
000000ec: CALLVALUE
000000ed: DUP1
000000ee: ISZERO
000000ef: PUSH2 0x00f7
000000f2: JUMPI
000000f3: PUSH1 0x00
000000f5: DUP1
000000f6: REVERT
000000f7: JUMPDEST
000000f8: POP
000000f9: PUSH2 0x0100
000000fc: PUSH2 0x0453
000000ff: JUMP
00000100: JUMPDEST
00000101: PUSH1 0x40
00000103: MLOAD
00000104: DUP1
00000105: DUP3
00000106: DUP2
00000107: MSTORE
00000108: PUSH1 0x20
0000010a: ADD
0000010b: SWAP2
0000010c: POP
0000010d: POP
0000010e: PUSH1 0x40
00000110: MLOAD
00000111: DUP1
00000112: SWAP2
00000113: SUB
00000114: SWAP1
00000115: RETURN
00000116: JUMPDEST
00000117: CALLVALUE
00000118: DUP1
00000119: ISZERO
0000011a: PUSH2 0x0122
0000011d: JUMPI
0000011e: PUSH1 0x00
00000120: DUP1
00000121: REVERT
00000122: JUMPDEST
00000123: POP
00000124: PUSH2 0x0141
00000127: PUSH1 0x04
00000129: DUP1
0000012a: CALLDATASIZE
0000012b: SUB
0000012c: DUP2
0000012d: ADD
0000012e: SWAP1
0000012f: DUP1
00000130: DUP1
00000131: CALLDATALOAD
00000132: SWAP1
00000133: PUSH1 0x20
00000135: ADD
00000136: SWAP1
00000137: SWAP3
00000138: SWAP2
00000139: SWAP1
0000013a: POP
0000013b: POP
0000013c: POP
0000013d: PUSH2 0x0459
00000140: JUMP
00000141: JUMPDEST
00000142: PUSH1 0x40
00000144: MLOAD
00000145: DUP1
00000146: DUP3
00000147: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000015c: AND
0000015d: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000172: AND
00000173: DUP2
00000174: MSTORE
00000175: PUSH1 0x20
00000177: ADD
00000178: SWAP2
00000179: POP
0000017a: POP
0000017b: PUSH1 0x40
0000017d: MLOAD
0000017e: DUP1
0000017f: SWAP2
00000180: SUB
00000181: SWAP1
00000182: RETURN
00000183: JUMPDEST
00000184: CALLVALUE
00000185: DUP1
00000186: ISZERO
00000187: PUSH2 0x018f
0000018a: JUMPI
0000018b: PUSH1 0x00
0000018d: DUP1
0000018e: REVERT
0000018f: JUMPDEST
00000190: POP
00000191: PUSH2 0x0198
00000194: PUSH2 0x0497
00000197: JUMP
00000198: JUMPDEST
00000199: PUSH1 0x40
0000019b: MLOAD
0000019c: DUP1
0000019d: DUP3
0000019e: DUP2
0000019f: MSTORE
000001a0: PUSH1 0x20
000001a2: ADD
000001a3: SWAP2
000001a4: POP
000001a5: POP
000001a6: PUSH1 0x40
000001a8: MLOAD
000001a9: DUP1
000001aa: SWAP2
000001ab: SUB
000001ac: SWAP1
000001ad: RETURN
000001ae: JUMPDEST
000001af: CALLVALUE
000001b0: DUP1
000001b1: ISZERO
000001b2: PUSH2 0x01ba
000001b5: JUMPI
000001b6: PUSH1 0x00
000001b8: DUP1
000001b9: REVERT
000001ba: JUMPDEST
000001bb: POP
000001bc: PUSH2 0x01c3
000001bf: PUSH2 0x04f1
000001c2: JUMP
000001c3: JUMPDEST
000001c4: PUSH1 0x40
000001c6: MLOAD
000001c7: DUP1
000001c8: DUP3
000001c9: DUP2
000001ca: MSTORE
000001cb: PUSH1 0x20
000001cd: ADD
000001ce: SWAP2
000001cf: POP
000001d0: POP
000001d1: PUSH1 0x40
000001d3: MLOAD
000001d4: DUP1
000001d5: SWAP2
000001d6: SUB
000001d7: SWAP1
000001d8: RETURN
000001d9: JUMPDEST
000001da: CALLVALUE
000001db: DUP1
000001dc: ISZERO
000001dd: PUSH2 0x01e5
000001e0: JUMPI
000001e1: PUSH1 0x00
000001e3: DUP1
000001e4: REVERT
000001e5: JUMPDEST
000001e6: POP
000001e7: PUSH2 0x026a
000001ea: PUSH1 0x04
000001ec: DUP1
000001ed: CALLDATASIZE
000001ee: SUB
000001ef: DUP2
000001f0: ADD
000001f1: SWAP1
000001f2: DUP1
000001f3: DUP1
000001f4: CALLDATALOAD
000001f5: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000020a: AND
0000020b: SWAP1
0000020c: PUSH1 0x20
0000020e: ADD
0000020f: SWAP1
00000210: SWAP3
00000211: SWAP2
00000212: SWAP1
00000213: DUP1
00000214: CALLDATALOAD
00000215: SWAP1
00000216: PUSH1 0x20
00000218: ADD
00000219: SWAP1
0000021a: SWAP3
0000021b: SWAP2
0000021c: SWAP1
0000021d: DUP1
0000021e: CALLDATALOAD
0000021f: SWAP1
00000220: PUSH1 0x20
00000222: ADD
00000223: SWAP1
00000224: DUP3
00000225: ADD
00000226: DUP1
00000227: CALLDATALOAD
00000228: SWAP1
00000229: PUSH1 0x20
0000022b: ADD
0000022c: SWAP1
0000022d: DUP1
0000022e: DUP1
0000022f: PUSH1 0x1f
00000231: ADD
00000232: PUSH1 0x20
00000234: DUP1
00000235: SWAP2
00000236: DIV
00000237: MUL
00000238: PUSH1 0x20
0000023a: ADD
0000023b: PUSH1 0x40
0000023d: MLOAD
0000023e: SWAP1
0000023f: DUP2
00000240: ADD
00000241: PUSH1 0x40
00000243: MSTORE
00000244: DUP1
00000245: SWAP4
00000246: SWAP3
00000247: SWAP2
00000248: SWAP1
00000249: DUP2
0000024a: DUP2
0000024b: MSTORE
0000024c: PUSH1 0x20
0000024e: ADD
0000024f: DUP4
00000250: DUP4
00000251: DUP1
00000252: DUP3
00000253: DUP5
00000254: CALLDATACOPY
00000255: DUP3
00000256: ADD
00000257: SWAP2
00000258: POP
00000259: POP
0000025a: POP
0000025b: POP
0000025c: POP
0000025d: POP
0000025e: SWAP2
0000025f: SWAP3
00000260: SWAP2
00000261: SWAP3
00000262: SWAP1
00000263: POP
00000264: POP
00000265: POP
00000266: PUSH2 0x04f7
00000269: JUMP
0000026a: JUMPDEST
0000026b: STOP
0000026c: JUMPDEST
0000026d: CALLVALUE
0000026e: DUP1
0000026f: ISZERO
00000270: PUSH2 0x0278
00000273: JUMPI
00000274: PUSH1 0x00
00000276: DUP1
00000277: REVERT
00000278: JUMPDEST
00000279: POP
0000027a: PUSH2 0x0281
0000027d: PUSH2 0x04fc
00000280: JUMP
00000281: JUMPDEST
00000282: PUSH1 0x40
00000284: MLOAD
00000285: DUP1
00000286: DUP3
00000287: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000029c: AND
0000029d: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000002b2: AND
000002b3: DUP2
000002b4: MSTORE
000002b5: PUSH1 0x20
000002b7: ADD
000002b8: SWAP2
000002b9: POP
000002ba: POP
000002bb: PUSH1 0x40
000002bd: MLOAD
000002be: DUP1
000002bf: SWAP2
000002c0: SUB
000002c1: SWAP1
000002c2: RETURN
000002c3: JUMPDEST
000002c4: CALLVALUE
000002c5: DUP1
000002c6: ISZERO
000002c7: PUSH2 0x02cf
000002ca: JUMPI
000002cb: PUSH1 0x00
000002cd: DUP1
000002ce: REVERT
000002cf: JUMPDEST
000002d0: POP
000002d1: PUSH2 0x0431
000002d4: PUSH1 0x04
000002d6: DUP1
000002d7: CALLDATASIZE
000002d8: SUB
000002d9: DUP2
000002da: ADD
000002db: SWAP1
000002dc: DUP1
000002dd: DUP1
000002de: CALLDATALOAD
000002df: SWAP1
000002e0: PUSH1 0x20
000002e2: ADD
000002e3: SWAP1
000002e4: DUP3
000002e5: ADD
000002e6: DUP1
000002e7: CALLDATALOAD
000002e8: SWAP1
000002e9: PUSH1 0x20
000002eb: ADD
000002ec: SWAP1
000002ed: DUP1
000002ee: DUP1
000002ef: PUSH1 0x20
000002f1: MUL
000002f2: PUSH1 0x20
000002f4: ADD
000002f5: PUSH1 0x40
000002f7: MLOAD
000002f8: SWAP1
000002f9: DUP2
000002fa: ADD
000002fb: PUSH1 0x40
000002fd: MSTORE
000002fe: DUP1
000002ff: SWAP4
00000300: SWAP3
00000301: SWAP2
00000302: SWAP1
00000303: DUP2
00000304: DUP2
00000305: MSTORE
00000306: PUSH1 0x20
00000308: ADD
00000309: DUP4
0000030a: DUP4
0000030b: PUSH1 0x20
0000030d: MUL
0000030e: DUP1
0000030f: DUP3
00000310: DUP5
00000311: CALLDATACOPY
00000312: DUP3
00000313: ADD
00000314: SWAP2
00000315: POP
00000316: POP
00000317: POP
00000318: POP
00000319: POP
0000031a: POP
0000031b: SWAP2
0000031c: SWAP3
0000031d: SWAP2
0000031e: SWAP3
0000031f: SWAP1
00000320: DUP1
00000321: CALLDATALOAD
00000322: SWAP1
00000323: PUSH1 0x20
00000325: ADD
00000326: SWAP1
00000327: DUP3
00000328: ADD
00000329: DUP1
0000032a: CALLDATALOAD
0000032b: SWAP1
0000032c: PUSH1 0x20
0000032e: ADD
0000032f: SWAP1
00000330: DUP1
00000331: DUP1
00000332: PUSH1 0x20
00000334: MUL
00000335: PUSH1 0x20
00000337: ADD
00000338: PUSH1 0x40
0000033a: MLOAD
0000033b: SWAP1
0000033c: DUP2
0000033d: ADD
0000033e: PUSH1 0x40
00000340: MSTORE
00000341: DUP1
00000342: SWAP4
00000343: SWAP3
00000344: SWAP2
00000345: SWAP1
00000346: DUP2
00000347: DUP2
00000348: MSTORE
00000349: PUSH1 0x20
0000034b: ADD
0000034c: DUP4
0000034d: DUP4
0000034e: PUSH1 0x20
00000350: MUL
00000351: DUP1
00000352: DUP3
00000353: DUP5
00000354: CALLDATACOPY
00000355: DUP3
00000356: ADD
00000357: SWAP2
00000358: POP
00000359: POP
0000035a: POP
0000035b: POP
0000035c: POP
0000035d: POP
0000035e: SWAP2
0000035f: SWAP3
00000360: SWAP2
00000361: SWAP3
00000362: SWAP1
00000363: DUP1
00000364: CALLDATALOAD
00000365: SWAP1
00000366: PUSH1 0x20
00000368: ADD
00000369: SWAP1
0000036a: DUP3
0000036b: ADD
0000036c: DUP1
0000036d: CALLDATALOAD
0000036e: SWAP1
0000036f: PUSH1 0x20
00000371: ADD
00000372: SWAP1
00000373: DUP1
00000374: DUP1
00000375: PUSH1 0x20
00000377: MUL
00000378: PUSH1 0x20
0000037a: ADD
0000037b: PUSH1 0x40
0000037d: MLOAD
0000037e: SWAP1
0000037f: DUP2
00000380: ADD
00000381: PUSH1 0x40
00000383: MSTORE
00000384: DUP1
00000385: SWAP4
00000386: SWAP3
00000387: SWAP2
00000388: SWAP1
00000389: DUP2
0000038a: DUP2
0000038b: MSTORE
0000038c: PUSH1 0x20
0000038e: ADD
0000038f: DUP4
00000390: DUP4
00000391: PUSH1 0x20
00000393: MUL
00000394: DUP1
00000395: DUP3
00000396: DUP5
00000397: CALLDATACOPY
00000398: DUP3
00000399: ADD
0000039a: SWAP2
0000039b: POP
0000039c: POP
0000039d: POP
0000039e: POP
0000039f: POP
000003a0: POP
000003a1: SWAP2
000003a2: SWAP3
000003a3: SWAP2
000003a4: SWAP3
000003a5: SWAP1
000003a6: DUP1
000003a7: CALLDATALOAD
000003a8: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000003bd: AND
000003be: SWAP1
000003bf: PUSH1 0x20
000003c1: ADD
000003c2: SWAP1
000003c3: SWAP3
000003c4: SWAP2
000003c5: SWAP1
000003c6: DUP1
000003c7: CALLDATALOAD
000003c8: SWAP1
000003c9: PUSH1 0x20
000003cb: ADD
000003cc: SWAP1
000003cd: SWAP3
000003ce: SWAP2
000003cf: SWAP1
000003d0: DUP1
000003d1: CALLDATALOAD
000003d2: SWAP1
000003d3: PUSH1 0x20
000003d5: ADD
000003d6: SWAP1
000003d7: DUP3
000003d8: ADD
000003d9: DUP1
000003da: CALLDATALOAD
000003db: SWAP1
000003dc: PUSH1 0x20
000003de: ADD
000003df: SWAP1
000003e0: DUP1
000003e1: DUP1
000003e2: PUSH1 0x1f
000003e4: ADD
000003e5: PUSH1 0x20
000003e7: DUP1
000003e8: SWAP2
000003e9: DIV
000003ea: MUL
000003eb: PUSH1 0x20
000003ed: ADD
000003ee: PUSH1 0x40
000003f0: MLOAD
000003f1: SWAP1
000003f2: DUP2
000003f3: ADD
000003f4: PUSH1 0x40
000003f6: MSTORE
000003f7: DUP1
000003f8: SWAP4
000003f9: SWAP3
000003fa: SWAP2
000003fb: SWAP1
000003fc: DUP2
000003fd: DUP2
000003fe: MSTORE
000003ff: PUSH1 0x20
00000401: ADD
00000402: DUP4
00000403: DUP4
00000404: DUP1
00000405: DUP3
00000406: DUP5
00000407: CALLDATACOPY
00000408: DUP3
00000409: ADD
0000040a: SWAP2
0000040b: POP
0000040c: POP
0000040d: POP
0000040e: POP
0000040f: POP
00000410: POP
00000411: SWAP2
00000412: SWAP3
00000413: SWAP2
00000414: SWAP3
00000415: SWAP1
00000416: DUP1
00000417: CALLDATALOAD
00000418: SWAP1
00000419: PUSH1 0x20
0000041b: ADD
0000041c: SWAP1
0000041d: SWAP3
0000041e: SWAP2
0000041f: SWAP1
00000420: DUP1
00000421: CALLDATALOAD
00000422: SWAP1
00000423: PUSH1 0x20
00000425: ADD
00000426: SWAP1
00000427: SWAP3
00000428: SWAP2
00000429: SWAP1
0000042a: POP
0000042b: POP
0000042c: POP
0000042d: PUSH2 0x0522
00000430: JUMP
00000431: JUMPDEST
00000432: STOP
00000433: JUMPDEST
00000434: PUSH1 0x03
00000436: PUSH1 0x20
00000438: MSTORE
00000439: DUP1
0000043a: PUSH1 0x00
0000043c: MSTORE
0000043d: PUSH1 0x40
0000043f: PUSH1 0x00
00000441: KECCAK256
00000442: PUSH1 0x00
00000444: SWAP2
00000445: POP
00000446: SLOAD
00000447: SWAP1
00000448: PUSH2 0x0100
0000044b: EXP
0000044c: SWAP1
0000044d: DIV
0000044e: PUSH1 0xff
00000450: AND
00000451: DUP2
00000452: JUMP
00000453: JUMPDEST
00000454: PUSH1 0x00
00000456: SLOAD
00000457: DUP2
00000458: JUMP
00000459: JUMPDEST
0000045a: PUSH1 0x02
0000045c: DUP2
0000045d: DUP2
0000045e: SLOAD
0000045f: DUP2
00000460: LT
00000461: ISZERO
00000462: ISZERO
00000463: PUSH2 0x0468
00000466: JUMPI
00000467: INVALID
00000468: JUMPDEST
00000469: SWAP1
0000046a: PUSH1 0x00
0000046c: MSTORE
0000046d: PUSH1 0x20
0000046f: PUSH1 0x00
00000471: KECCAK256
00000472: ADD
00000473: PUSH1 0x00
00000475: SWAP2
00000476: POP
00000477: SLOAD
00000478: SWAP1
00000479: PUSH2 0x0100
0000047c: EXP
0000047d: SWAP1
0000047e: DIV
0000047f: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000494: AND
00000495: DUP2
00000496: JUMP
00000497: JUMPDEST
00000498: PUSH1 0x00
0000049a: DUP1
0000049b: PUSH1 0x00
0000049d: DUP1
0000049e: SWAP2
0000049f: POP
000004a0: PUSH1 0x00
000004a2: SWAP1
000004a3: POP
000004a4: JUMPDEST
000004a5: PUSH1 0x14
000004a7: DUP2
000004a8: LT
000004a9: ISZERO
000004aa: PUSH2 0x04e6
000004ad: JUMPI
000004ae: DUP2
000004af: PUSH1 0x05
000004b1: DUP3
000004b2: PUSH1 0x14
000004b4: DUP2
000004b5: LT
000004b6: ISZERO
000004b7: ISZERO
000004b8: PUSH2 0x04bd
000004bb: JUMPI
000004bc: INVALID
000004bd: JUMPDEST
000004be: ADD
000004bf: SLOAD
000004c0: GT
000004c1: ISZERO
000004c2: PUSH2 0x04d9
000004c5: JUMPI
000004c6: PUSH1 0x05
000004c8: DUP2
000004c9: PUSH1 0x14
000004cb: DUP2
000004cc: LT
000004cd: ISZERO
000004ce: ISZERO
000004cf: PUSH2 0x04d4
000004d2: JUMPI
000004d3: INVALID
000004d4: JUMPDEST
000004d5: ADD
000004d6: SLOAD
000004d7: SWAP2
000004d8: POP
000004d9: JUMPDEST
000004da: DUP1
000004db: DUP1
000004dc: PUSH1 0x01
000004de: ADD
000004df: SWAP2
000004e0: POP
000004e1: POP
000004e2: PUSH2 0x04a4
000004e5: JUMP
000004e6: JUMPDEST
000004e7: PUSH1 0x01
000004e9: DUP3
000004ea: ADD
000004eb: SWAP3
000004ec: POP
000004ed: POP
000004ee: POP
000004ef: SWAP1
000004f0: JUMP
000004f1: JUMPDEST
000004f2: PUSH1 0x01
000004f4: SLOAD
000004f5: DUP2
000004f6: JUMP
000004f7: JUMPDEST
000004f8: POP
000004f9: POP
000004fa: POP
000004fb: JUMP
000004fc: JUMPDEST
000004fd: PUSH1 0x04
000004ff: PUSH1 0x00
00000501: SWAP1
00000502: SLOAD
00000503: SWAP1
00000504: PUSH2 0x0100
00000507: EXP
00000508: SWAP1
00000509: DIV
0000050a: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000051f: AND
00000520: DUP2
00000521: JUMP
00000522: JUMPDEST
00000523: PUSH1 0x00
00000525: DUP1
00000526: PUSH1 0x00
00000528: DUP1
00000529: PUSH1 0x04
0000052b: PUSH1 0x00
0000052d: SWAP1
0000052e: SLOAD
0000052f: SWAP1
00000530: PUSH2 0x0100
00000533: EXP
00000534: SWAP1
00000535: DIV
00000536: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000054b: AND
0000054c: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000561: AND
00000562: CALLER
00000563: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000578: AND
00000579: EQ
0000057a: ISZERO
0000057b: ISZERO
0000057c: PUSH2 0x0584
0000057f: JUMPI
00000580: PUSH1 0x00
00000582: DUP1
00000583: REVERT
00000584: JUMPDEST
00000585: PUSH1 0x00
00000587: SLOAD
00000588: DUP12
00000589: MLOAD
0000058a: LT
0000058b: ISZERO
0000058c: ISZERO
0000058d: ISZERO
0000058e: PUSH2 0x0596
00000591: JUMPI
00000592: PUSH1 0x00
00000594: DUP1
00000595: REVERT
00000596: JUMPDEST
00000597: DUP10
00000598: MLOAD
00000599: DUP12
0000059a: MLOAD
0000059b: EQ
0000059c: DUP1
0000059d: ISZERO
0000059e: PUSH2 0x05a8
000005a1: JUMPI
000005a2: POP
000005a3: DUP12
000005a4: MLOAD
000005a5: DUP12
000005a6: MLOAD
000005a7: EQ
000005a8: JUMPDEST
000005a9: ISZERO
000005aa: ISZERO
000005ab: PUSH2 0x05b3
000005ae: JUMPI
000005af: PUSH1 0x00
000005b1: DUP1
000005b2: REVERT
000005b3: JUMPDEST
000005b4: TIMESTAMP
000005b5: DUP6
000005b6: GT
000005b7: ISZERO
000005b8: ISZERO
000005b9: PUSH2 0x05c1
000005bc: JUMPI
000005bd: PUSH1 0x00
000005bf: DUP1
000005c0: REVERT
000005c1: JUMPDEST
000005c2: PUSH1 0x19
000005c4: PUSH32 0x0100000000000000000000000000000000000000000000000000000000000000
000005e5: MUL
000005e6: PUSH1 0x00
000005e8: PUSH32 0x0100000000000000000000000000000000000000000000000000000000000000
00000609: MUL
0000060a: ADDRESS
0000060b: DUP12
0000060c: DUP12
0000060d: DUP12
0000060e: DUP12
0000060f: DUP12
00000610: PUSH1 0x40
00000612: MLOAD
00000613: PUSH1 0x20
00000615: ADD
00000616: DUP1
00000617: DUP10
00000618: PUSH31 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
00000638: NOT
00000639: AND
0000063a: PUSH31 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
0000065a: NOT
0000065b: AND
0000065c: DUP2
0000065d: MSTORE
0000065e: PUSH1 0x01
00000660: ADD
00000661: DUP9
00000662: PUSH31 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
00000682: NOT
00000683: AND
00000684: PUSH31 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
000006a4: NOT
000006a5: AND
000006a6: DUP2
000006a7: MSTORE
000006a8: PUSH1 0x01
000006aa: ADD
000006ab: DUP8
000006ac: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000006c1: AND
000006c2: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000006d7: AND
000006d8: PUSH13 0x01000000000000000000000000
000006e6: MUL
000006e7: DUP2
000006e8: MSTORE
000006e9: PUSH1 0x14
000006eb: ADD
000006ec: DUP7
000006ed: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000702: AND
00000703: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000718: AND
00000719: PUSH13 0x01000000000000000000000000
00000727: MUL
00000728: DUP2
00000729: MSTORE
0000072a: PUSH1 0x14
0000072c: ADD
0000072d: DUP6
0000072e: DUP2
0000072f: MSTORE
00000730: PUSH1 0x20
00000732: ADD
00000733: DUP5
00000734: DUP1
00000735: MLOAD
00000736: SWAP1
00000737: PUSH1 0x20
00000739: ADD
0000073a: SWAP1
0000073b: DUP1
0000073c: DUP4
0000073d: DUP4
0000073e: JUMPDEST
0000073f: PUSH1 0x20
00000741: DUP4
00000742: LT
00000743: ISZERO
00000744: ISZERO
00000745: PUSH2 0x0763
00000748: JUMPI
00000749: DUP1
0000074a: MLOAD
0000074b: DUP3
0000074c: MSTORE
0000074d: PUSH1 0x20
0000074f: DUP3
00000750: ADD
00000751: SWAP2
00000752: POP
00000753: PUSH1 0x20
00000755: DUP2
00000756: ADD
00000757: SWAP1
00000758: POP
00000759: PUSH1 0x20
0000075b: DUP4
0000075c: SUB
0000075d: SWAP3
0000075e: POP
0000075f: PUSH2 0x073e
00000762: JUMP
00000763: JUMPDEST
00000764: PUSH1 0x01
00000766: DUP4
00000767: PUSH1 0x20
00000769: SUB
0000076a: PUSH2 0x0100
0000076d: EXP
0000076e: SUB
0000076f: DUP1
00000770: NOT
00000771: DUP3
00000772: MLOAD
00000773: AND
00000774: DUP2
00000775: DUP5
00000776: MLOAD
00000777: AND
00000778: DUP1
00000779: DUP3
0000077a: OR
0000077b: DUP6
0000077c: MSTORE
0000077d: POP
0000077e: POP
0000077f: POP
00000780: POP
00000781: POP
00000782: POP
00000783: SWAP1
00000784: POP
00000785: ADD
00000786: DUP4
00000787: DUP2
00000788: MSTORE
00000789: PUSH1 0x20
0000078b: ADD
0000078c: DUP3
0000078d: DUP2
0000078e: MSTORE
0000078f: PUSH1 0x20
00000791: ADD
00000792: SWAP9
00000793: POP
00000794: POP
00000795: POP
00000796: POP
00000797: POP
00000798: POP
00000799: POP
0000079a: POP
0000079b: POP
0000079c: PUSH1 0x40
0000079e: MLOAD
0000079f: PUSH1 0x20
000007a1: DUP2
000007a2: DUP4
000007a3: SUB
000007a4: SUB
000007a5: DUP2
000007a6: MSTORE
000007a7: SWAP1
000007a8: PUSH1 0x40
000007aa: MSTORE
000007ab: PUSH1 0x40
000007ad: MLOAD
000007ae: DUP1
000007af: DUP3
000007b0: DUP1
000007b1: MLOAD
000007b2: SWAP1
000007b3: PUSH1 0x20
000007b5: ADD
000007b6: SWAP1
000007b7: DUP1
000007b8: DUP4
000007b9: DUP4
000007ba: JUMPDEST
000007bb: PUSH1 0x20
000007bd: DUP4
000007be: LT
000007bf: ISZERO
000007c0: ISZERO
000007c1: PUSH2 0x07df
000007c4: JUMPI
000007c5: DUP1
000007c6: MLOAD
000007c7: DUP3
000007c8: MSTORE
000007c9: PUSH1 0x20
000007cb: DUP3
000007cc: ADD
000007cd: SWAP2
000007ce: POP
000007cf: PUSH1 0x20
000007d1: DUP2
000007d2: ADD
000007d3: SWAP1
000007d4: POP
000007d5: PUSH1 0x20
000007d7: DUP4
000007d8: SUB
000007d9: SWAP3
000007da: POP
000007db: PUSH2 0x07ba
000007de: JUMP
000007df: JUMPDEST
000007e0: PUSH1 0x01
000007e2: DUP4
000007e3: PUSH1 0x20
000007e5: SUB
000007e6: PUSH2 0x0100
000007e9: EXP
000007ea: SUB
000007eb: DUP1
000007ec: NOT
000007ed: DUP3
000007ee: MLOAD
000007ef: AND
000007f0: DUP2
000007f1: DUP5
000007f2: MLOAD
000007f3: AND
000007f4: DUP1
000007f5: DUP3
000007f6: OR
000007f7: DUP6
000007f8: MSTORE
000007f9: POP
000007fa: POP
000007fb: POP
000007fc: POP
000007fd: POP
000007fe: POP
000007ff: SWAP1
00000800: POP
00000801: ADD
00000802: SWAP2
00000803: POP
00000804: POP
00000805: PUSH1 0x40
00000807: MLOAD
00000808: DUP1
00000809: SWAP2
0000080a: SUB
0000080b: SWAP1
0000080c: KECCAK256
0000080d: SWAP4
0000080e: POP
0000080f: PUSH1 0x00
00000811: SWAP3
00000812: POP
00000813: PUSH1 0x00
00000815: SWAP2
00000816: POP
00000817: JUMPDEST
00000818: PUSH1 0x00
0000081a: SLOAD
0000081b: DUP3
0000081c: LT
0000081d: ISZERO
0000081e: PUSH2 0x0988
00000821: JUMPI
00000822: PUSH1 0x01
00000824: DUP5
00000825: DUP14
00000826: DUP5
00000827: DUP2
00000828: MLOAD
00000829: DUP2
0000082a: LT
0000082b: ISZERO
0000082c: ISZERO
0000082d: PUSH2 0x0832
00000830: JUMPI
00000831: INVALID
00000832: JUMPDEST
00000833: SWAP1
00000834: PUSH1 0x20
00000836: ADD
00000837: SWAP1
00000838: PUSH1 0x20
0000083a: MUL
0000083b: ADD
0000083c: MLOAD
0000083d: DUP14
0000083e: DUP6
0000083f: DUP2
00000840: MLOAD
00000841: DUP2
00000842: LT
00000843: ISZERO
00000844: ISZERO
00000845: PUSH2 0x084a
00000848: JUMPI
00000849: INVALID
0000084a: JUMPDEST
0000084b: SWAP1
0000084c: PUSH1 0x20
0000084e: ADD
0000084f: SWAP1
00000850: PUSH1 0x20
00000852: MUL
00000853: ADD
00000854: MLOAD
00000855: DUP14
00000856: DUP7
00000857: DUP2
00000858: MLOAD
00000859: DUP2
0000085a: LT
0000085b: ISZERO
0000085c: ISZERO
0000085d: PUSH2 0x0862
00000860: JUMPI
00000861: INVALID
00000862: JUMPDEST
00000863: SWAP1
00000864: PUSH1 0x20
00000866: ADD
00000867: SWAP1
00000868: PUSH1 0x20
0000086a: MUL
0000086b: ADD
0000086c: MLOAD
0000086d: PUSH1 0x40
0000086f: MLOAD
00000870: PUSH1 0x00
00000872: DUP2
00000873: MSTORE
00000874: PUSH1 0x20
00000876: ADD
00000877: PUSH1 0x40
00000879: MSTORE
0000087a: PUSH1 0x40
0000087c: MLOAD
0000087d: DUP1
0000087e: DUP6
0000087f: PUSH1 0x00
00000881: NOT
00000882: AND
00000883: PUSH1 0x00
00000885: NOT
00000886: AND
00000887: DUP2
00000888: MSTORE
00000889: PUSH1 0x20
0000088b: ADD
0000088c: DUP5
0000088d: PUSH1 0xff
0000088f: AND
00000890: PUSH1 0xff
00000892: AND
00000893: DUP2
00000894: MSTORE
00000895: PUSH1 0x20
00000897: ADD
00000898: DUP4
00000899: PUSH1 0x00
0000089b: NOT
0000089c: AND
0000089d: PUSH1 0x00
0000089f: NOT
000008a0: AND
000008a1: DUP2
000008a2: MSTORE
000008a3: PUSH1 0x20
000008a5: ADD
000008a6: DUP3
000008a7: PUSH1 0x00
000008a9: NOT
000008aa: AND
000008ab: PUSH1 0x00
000008ad: NOT
000008ae: AND
000008af: DUP2
000008b0: MSTORE
000008b1: PUSH1 0x20
000008b3: ADD
000008b4: SWAP5
000008b5: POP
000008b6: POP
000008b7: POP
000008b8: POP
000008b9: POP
000008ba: PUSH1 0x20
000008bc: PUSH1 0x40
000008be: MLOAD
000008bf: PUSH1 0x20
000008c1: DUP2
000008c2: SUB
000008c3: SWAP1
000008c4: DUP1
000008c5: DUP5
000008c6: SUB
000008c7: SWAP1
000008c8: PUSH1 0x00
000008ca: DUP7
000008cb: GAS
000008cc: CALL
000008cd: ISZERO
000008ce: DUP1
000008cf: ISZERO
000008d0: PUSH2 0x08dd
000008d3: JUMPI
000008d4: RETURNDATASIZE
000008d5: PUSH1 0x00
000008d7: DUP1
000008d8: RETURNDATACOPY
000008d9: RETURNDATASIZE
000008da: PUSH1 0x00
000008dc: REVERT
000008dd: JUMPDEST
000008de: POP
000008df: POP
000008e0: POP
000008e1: PUSH1 0x20
000008e3: PUSH1 0x40
000008e5: MLOAD
000008e6: SUB
000008e7: MLOAD
000008e8: SWAP1
000008e9: POP
000008ea: DUP3
000008eb: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000900: AND
00000901: DUP2
00000902: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000917: AND
00000918: GT
00000919: DUP1
0000091a: ISZERO
0000091b: PUSH2 0x096d
0000091e: JUMPI
0000091f: POP
00000920: PUSH1 0x03
00000922: PUSH1 0x00
00000924: DUP3
00000925: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
0000093a: AND
0000093b: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
00000950: AND
00000951: DUP2
00000952: MSTORE
00000953: PUSH1 0x20
00000955: ADD
00000956: SWAP1
00000957: DUP2
00000958: MSTORE
00000959: PUSH1 0x20
0000095b: ADD
0000095c: PUSH1 0x00
0000095e: KECCAK256
0000095f: PUSH1 0x00
00000961: SWAP1
00000962: SLOAD
00000963: SWAP1
00000964: PUSH2 0x0100
00000967: EXP
00000968: SWAP1
00000969: DIV
0000096a: PUSH1 0xff
0000096c: AND
0000096d: JUMPDEST
0000096e: ISZERO
0000096f: ISZERO
00000970: PUSH2 0x0978
00000973: JUMPI
00000974: PUSH1 0x00
00000976: DUP1
00000977: REVERT
00000978: JUMPDEST
00000979: DUP1
0000097a: SWAP3
0000097b: POP
0000097c: DUP2
0000097d: DUP1
0000097e: PUSH1 0x01
00000980: ADD
00000981: SWAP3
00000982: POP
00000983: POP
00000984: PUSH2 0x0817
00000987: JUMP
00000988: JUMPDEST
00000989: PUSH2 0x0991
0000098c: DUP7
0000098d: PUSH2 0x0a32
00000990: JUMP
00000991: JUMPDEST
00000992: DUP9
00000993: PUSH20 0xffffffffffffffffffffffffffffffffffffffff
000009a8: AND
000009a9: DUP9
000009aa: DUP9
000009ab: PUSH1 0x40
000009ad: MLOAD
000009ae: DUP1
000009af: DUP3
000009b0: DUP1
000009b1: MLOAD
000009b2: SWAP1
000009b3: PUSH1 0x20
000009b5: ADD
000009b6: SWAP1
000009b7: DUP1
000009b8: DUP4
000009b9: DUP4
000009ba: PUSH1 0x00
000009bc: JUMPDEST
000009bd: DUP4
000009be: DUP2
000009bf: LT
000009c0: ISZERO
000009c1: PUSH2 0x09d7
000009c4: JUMPI
000009c5: DUP1
000009c6: DUP3
000009c7: ADD
000009c8: MLOAD
000009c9: DUP2
000009ca: DUP5
000009cb: ADD
000009cc: MSTORE
000009cd: PUSH1 0x20
000009cf: DUP2
000009d0: ADD
000009d1: SWAP1
000009d2: POP
000009d3: PUSH2 0x09bc
000009d6: JUMP
000009d7: JUMPDEST
000009d8: POP
000009d9: POP
000009da: POP
000009db: POP
000009dc: SWAP1
000009dd: POP
000009de: SWAP1
000009df: DUP2
000009e0: ADD
000009e1: SWAP1
000009e2: PUSH1 0x1f
000009e4: AND
000009e5: DUP1
000009e6: ISZERO
000009e7: PUSH2 0x0a04
000009ea: JUMPI
000009eb: DUP1
000009ec: DUP3
000009ed: SUB
000009ee: DUP1
000009ef: MLOAD
000009f0: PUSH1 0x01
000009f2: DUP4
000009f3: PUSH1 0x20
000009f5: SUB
000009f6: PUSH2 0x0100
000009f9: EXP
000009fa: SUB
000009fb: NOT
000009fc: AND
000009fd: DUP2
000009fe: MSTORE
000009ff: PUSH1 0x20
00000a01: ADD
00000a02: SWAP2
00000a03: POP
00000a04: JUMPDEST
00000a05: POP
00000a06: SWAP2
00000a07: POP
00000a08: POP
00000a09: PUSH1 0x00
00000a0b: PUSH1 0x40
00000a0d: MLOAD
00000a0e: DUP1
00000a0f: DUP4
00000a10: SUB
00000a11: DUP2
00000a12: DUP6
00000a13: DUP8
00000a14: GAS
00000a15: CALL
00000a16: SWAP3
00000a17: POP
00000a18: POP
00000a19: POP
00000a1a: ISZERO
00000a1b: ISZERO
00000a1c: PUSH2 0x0a24
00000a1f: JUMPI
00000a20: PUSH1 0x00
00000a22: DUP1
00000a23: REVERT
00000a24: JUMPDEST
00000a25: POP
00000a26: POP
00000a27: POP
00000a28: POP
00000a29: POP
00000a2a: POP
00000a2b: POP
00000a2c: POP
00000a2d: POP
00000a2e: POP
00000a2f: POP
00000a30: POP
00000a31: JUMP
00000a32: JUMPDEST
00000a33: PUSH1 0x00
00000a35: DUP1
00000a36: PUSH1 0x00
00000a38: SWAP2
00000a39: POP
00000a3a: PUSH1 0x00
00000a3c: SWAP1
00000a3d: POP
00000a3e: JUMPDEST
00000a3f: PUSH1 0x14
00000a41: DUP2
00000a42: LT
00000a43: ISZERO
00000a44: PUSH2 0x0a9f
00000a47: JUMPI
00000a48: DUP3
00000a49: PUSH1 0x05
00000a4b: DUP3
00000a4c: PUSH1 0x14
00000a4e: DUP2
00000a4f: LT
00000a50: ISZERO
00000a51: ISZERO
00000a52: PUSH2 0x0a57
00000a55: JUMPI
00000a56: INVALID
00000a57: JUMPDEST
00000a58: ADD
00000a59: SLOAD
00000a5a: EQ
00000a5b: ISZERO
00000a5c: ISZERO
00000a5d: ISZERO
00000a5e: PUSH2 0x0a66
00000a61: JUMPI
00000a62: PUSH1 0x00
00000a64: DUP1
00000a65: REVERT
00000a66: JUMPDEST
00000a67: PUSH1 0x05
00000a69: DUP3
00000a6a: PUSH1 0x14
00000a6c: DUP2
00000a6d: LT
00000a6e: ISZERO
00000a6f: ISZERO
00000a70: PUSH2 0x0a75
00000a73: JUMPI
00000a74: INVALID
00000a75: JUMPDEST
00000a76: ADD
00000a77: SLOAD
00000a78: PUSH1 0x05
00000a7a: DUP3
00000a7b: PUSH1 0x14
00000a7d: DUP2
00000a7e: LT
00000a7f: ISZERO
00000a80: ISZERO
00000a81: PUSH2 0x0a86
00000a84: JUMPI
00000a85: INVALID
00000a86: JUMPDEST
00000a87: ADD
00000a88: SLOAD
00000a89: LT
00000a8a: ISZERO
00000a8b: PUSH2 0x0a92
00000a8e: JUMPI
00000a8f: DUP1
00000a90: SWAP2
00000a91: POP
00000a92: JUMPDEST
00000a93: DUP1
00000a94: DUP1
00000a95: PUSH1 0x01
00000a97: ADD
00000a98: SWAP2
00000a99: POP
00000a9a: POP
00000a9b: PUSH2 0x0a3e
00000a9e: JUMP
00000a9f: JUMPDEST
00000aa0: PUSH1 0x05
00000aa2: DUP3
00000aa3: PUSH1 0x14
00000aa5: DUP2
00000aa6: LT
00000aa7: ISZERO
00000aa8: ISZERO
00000aa9: PUSH2 0x0aae
00000aac: JUMPI
00000aad: INVALID
00000aae: JUMPDEST
00000aaf: ADD
00000ab0: SLOAD
00000ab1: DUP4
00000ab2: GT
00000ab3: ISZERO
00000ab4: ISZERO
00000ab5: PUSH2 0x0abd
00000ab8: JUMPI
00000ab9: PUSH1 0x00
00000abb: DUP1
00000abc: REVERT
00000abd: JUMPDEST
00000abe: PUSH2 0x2710
00000ac1: PUSH1 0x05
00000ac3: DUP4
00000ac4: PUSH1 0x14
00000ac6: DUP2
00000ac7: LT
00000ac8: ISZERO
00000ac9: ISZERO
00000aca: PUSH2 0x0acf
00000acd: JUMPI
00000ace: INVALID
00000acf: JUMPDEST
00000ad0: ADD
00000ad1: SLOAD
00000ad2: ADD
00000ad3: DUP4
00000ad4: LT
00000ad5: ISZERO
00000ad6: ISZERO
00000ad7: PUSH2 0x0adf
00000ada: JUMPI
00000adb: PUSH1 0x00
00000add: DUP1
00000ade: REVERT
00000adf: JUMPDEST
00000ae0: DUP3
00000ae1: PUSH1 0x05
00000ae3: DUP4
00000ae4: PUSH1 0x14
00000ae6: DUP2
00000ae7: LT
00000ae8: ISZERO
00000ae9: ISZERO
00000aea: PUSH2 0x0aef
00000aed: JUMPI
00000aee: INVALID
00000aef: JUMPDEST
00000af0: ADD
00000af1: DUP2
00000af2: SWAP1
00000af3: SSTORE
00000af4: POP
00000af5: POP
00000af6: POP
00000af7: POP
00000af8: JUMP
00000af9: STOP
00000afa: LOG1
00000afb: PUSH6 0x627a7a723058
00000b02: KECCAK256
00000b03: UNKNOWN(0xBB)
00000b04: SDIV
00000b05: UNKNOWN(0xCA)
00000b06: PUSH26 0x96d1df3f47270c60d5979dce9447058dd0540b3cfec74ddcc4a3
00000b21: DUP15
00000b22: UNKNOWN(0x28)
00000b23: STOP
00000b24: UNKNOWN(0x29)

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
medium other detector Untrusted CALL target/value reachable 45 no no
view
trace_id: 0xb35d880fd4cc58b8de697e7996249f2ebad7fb12ee53c1648101c3c28cb1593d
call_targets: 0x1352921fa98e89c7e0ad785fc5aae1e4768428c6
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0xb35d880fd4cc58b8de697e7996249f2ebad7fb12ee53c1648101c3c28cb1593d",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x1352921fa98e89c7e0ad785fc5aae1e4768428c6"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0xffffffff",
            "selector": "0xffffffff",
            "calldata_variants": [
                "0xffffffff",
                "0xffffffff0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x2f54bf6e",
            "selector": "0x2f54bf6e",
            "calldata_variants": [
                "0x2f54bf6e",
                "0x2f54bf6e0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x42cde4e8",
            "selector": "0x42cde4e8",
            "calldata_variants": [
                "0x42cde4e8",
                "0x42cde4e80000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xaa5df9e2",
            "selector": "0xaa5df9e2",
            "calldata_variants": [
                "0xaa5df9e2",
                "0xaa5df9e20000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xaffed0e0",
            "selector": "0xaffed0e0",
            "calldata_variants": [
                "0xaffed0e0",
                "0xaffed0e00000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xb72a33f2",
            "selector": "0xb72a33f2",
            "calldata_variants": [
                "0xb72a33f2",
                "0xb72a33f20000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xc0ee0b8a",
            "selector": "0xc0ee0b8a",
            "calldata_variants": [
                "0xc0ee0b8a",
                "0xc0ee0b8a0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xc34c08e5",
            "selector": "0xc34c08e5",
            "calldata_variants": [
                "0xc34c08e5",
                "0xc34c08e50000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 2252,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 2581,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "call_count": 2,
    "guards_detected": [
        {
            "pc": 1378,
            "type": "msg_sender_eq_const",
            "value": "0xffffffffffffffffffffffffffffffffffffffff"
        }
    ],
    "untrusted_call_count": 2
}
medium other detector ETH value transfer possible 40 no no
view
trace_id: 0xb35d880fd4cc58b8de697e7996249f2ebad7fb12ee53c1648101c3c28cb1593d
call_targets: 0x1352921fa98e89c7e0ad785fc5aae1e4768428c6
target_varies: no
classification: constant_target
validation_json
{
    "sink": "CALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0xb35d880fd4cc58b8de697e7996249f2ebad7fb12ee53c1648101c3c28cb1593d",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0x1352921fa98e89c7e0ad785fc5aae1e4768428c6"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0xffffffff",
            "selector": "0xffffffff",
            "calldata_variants": [
                "0xffffffff",
                "0xffffffff0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x2f54bf6e",
            "selector": "0x2f54bf6e",
            "calldata_variants": [
                "0x2f54bf6e",
                "0x2f54bf6e0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x42cde4e8",
            "selector": "0x42cde4e8",
            "calldata_variants": [
                "0x42cde4e8",
                "0x42cde4e80000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xaa5df9e2",
            "selector": "0xaa5df9e2",
            "calldata_variants": [
                "0xaa5df9e2",
                "0xaa5df9e20000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xaffed0e0",
            "selector": "0xaffed0e0",
            "calldata_variants": [
                "0xaffed0e0",
                "0xaffed0e00000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xb72a33f2",
            "selector": "0xb72a33f2",
            "calldata_variants": [
                "0xb72a33f2",
                "0xb72a33f20000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xc0ee0b8a",
            "selector": "0xc0ee0b8a",
            "calldata_variants": [
                "0xc0ee0b8a",
                "0xc0ee0b8a0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0xc34c08e5",
            "selector": "0xc34c08e5",
            "calldata_variants": [
                "0xc34c08e5",
                "0xc34c08e50000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 2252,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        },
        {
            "pc": 2581,
            "opcode": "CALL",
            "returndata_checked": null,
            "value_expression_category": "computed",
            "target_expression_category": "computed"
        }
    ],
    "eth_value_calls": 2,
    "guards_detected": [
        {
            "pc": 1378,
            "type": "msg_sender_eq_const",
            "value": "0xffffffffffffffffffffffffffffffffffffffff"
        }
    ]
}