IMM-2026-0025
ACTIVE
Keccak
0x5e67ae1b6eb167fa2c61191e1ad774bc897906f14a6a015794d8360a2b46f90d
Type
BYTECODE
Verdict
MALICIOUS
Confidence
83.0%
Severity
79
Value at risk
$0.00
Created
April 29, 2026 5:23 PM
Envelope
v1
Signed payload
Primary matcher
bytecode
0x5e6f7a8b9c0d1e2f3a4b5c6d7e8f9a0b1c2d3e4f5a6b7c8d9e0f12345abcdef0
Scope
galileo-testnet
home
sepolia
Evidence
redacted public excerpt
Reasoning excerpt
Bytecode of a widely-cloned sandwich-attack contract template, indexed by mevwatch.info and several Etherscan-verified deployments. The template implements the classic two-leg flash-frontrun-backrun pattern against AMM swaps. Verdict is MALICIOUS at moderate-high confidence: the contract's only honest use is sandwich MEV, but the practice itself is contested as 'abusive but legal' rather than fund-theft, which is reflected in the slightly lower severity.
Full evidence (TEE-sealed) is fetchable by holders of the unsealing key. Public mirror carries hash only.
TEE attestation
Curated by human
Heuristically published from a known threat catalog, not derived from a TEE-verified verdict.
Evidence CID
0x96f0036a7360634d8e7c4e3b7bd6264f82af821585b3579bb19df7800762c0b2
Network impact
Live
Since publish
Cache hits
0
SDK check() matches
Agents synced
0
distinct callers
Attacks blocked
0
tx-level intercepts
Pool reverts
0
Uniswap v4 hook
USD protected
$0.00
no blocks recorded yet
Hits over time
each bar is one of 30 equal slices since publish
publish
now
Recent intercepts
| Agent | Method | Chain | When |
|---|---|---|---|
|
No agent has had to block this antibody yet.
Intercepts appear here in real time as agents match this pattern in the wild.
|
|||
| Chain | Tx | State |
|---|---|---|
|
sepolia
|
0x9508da76..eabc | active |