complete
bytecode
findings
Bytecode-only review of implementation 0x62c9e5e52351e02635f48072fa20c03bb650f787. The evidence bundle shows a computed-target DELEGATECALL and multiple computed-target/value CALLs; no auth guards were detected. A CALLCO...
Top findings
-
high
Computed-target DELEGATECALL allows code execution in caller storage if user-controlled
-
medium
Multiple computed-target/value CALLs may enable arbitrary external calls and ETH transfers
-
low
CALLCODE opcode present in runtime bytecode (reachability unclear)